Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
104 Cards in this Set
- Front
- Back
True or False
A company's online inventory control process is an example of e-business, as opposed to e-commerce. |
True
|
|
True or False
Price transparency refers to the ability of merchants to segment the market into groups willing to pay different prices |
False
|
|
True or False
Customization involves changing a delivered product or service based upon a consumer's preferences or past purchasing behavior. |
True
|
|
True or False
Web 2.0 describes a set of applications and technologies that encourage and rely on user- and consumer-generated interactivity and content. |
True
|
|
True or False
E-commerce as we know it today would not exist without the Internet. |
True
|
|
E-commerce can be defined as:
|
The use of the Internet and the Web to transact business.
|
|
Which of the following is not a unique feature of e-commerce technology?
|
Global Broadcasting
|
|
True or False
The integration of video, audio, and text marketing messages into a single marketing message and consuming experience is an example of information density. |
False
|
|
Which of the following qualities is least likely to decrease a consumer's search costs?
|
Richness
|
|
Network externalities are related to which of the following features of e-commerce technology?
|
Universal Standards
|
|
Which of the following describes the basic Web policy of large firms during the period of invention?
|
Maintain a basic, static web site
|
|
Interactivity in the context of e-commerce can be described as:
|
The enabling of two-way communication between consumer & merchant.
|
|
Which of the following is NOT a characteristic of a perfect competitive market?
|
It is highly regulated
|
|
Unfair competitive advantages occur when:
|
One competitor has an advantage others cannot purchase.
|
|
Which of the following is NOT true regarding e-commerce today?
|
The market middlemen disappeared.
|
|
Which of the following is the top online retailer ranked by online sales?
|
Amazon
|
|
Above all, e-commerce is a ________ phenomenon.
|
Technology-driven
|
|
T or F
Information asymmetry refers to any disparity in relevant market information among parties in a transaction. |
True
|
|
T or F
The targeting of marketing messages to specific individuals by adjusting the message to a person's name, interests, and past purchases is called personalization. |
True
|
|
T or F
Internet/Web technology is available just about everywhere and anytime. This is known as ubiquity. |
True
|
|
T or F
Value proposition is the element of the business model addresses the question of why a customer should buy from the firm. |
True
|
|
________ and ________ are typically the most easily identifiable aspects of a company's business model.
|
Value propsition; revenue model
|
|
A perfect market is one in which:
|
There are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.
|
|
An example of a company using the content provider model is:
|
Rhapsody.com
|
|
T or F
Bestbuy.com is an example of the affiliate revenue model. |
False
|
|
T or F
In the subscription revenue model, a Web site that offers users content or services charges a fee for access to some or all of its offerings. |
True
|
|
T or F
The Internet's universal standards decrease the cost of industry and firm operations. |
True
|
|
T or F
A value proposition defines how a company's product or service fulfills the needs of a customer. |
True
|
|
Which of the following is NOT an example of the bricks-and-clicks e-tailing business model?
|
Dell.com
|
|
Over the past decade:
|
The number of exchanges diminished sharply.
|
|
Which element of the business model examines who else occupies the firm's intended marketspace?
|
competitive environment
|
|
T or F
Barriers to entry into the e-tail marketplace are low |
True
|
|
Which of the following would be considered an direct competitor of American Airlines?
|
British Airways
|
|
eBay uses all of the following business models except:
|
content provider
|
|
T or F
A(n) vertical marketplace supplies products and services of interest to particular industries. |
True
|
|
T or F
Most first movers have the complementary resources needed to sustain their advantage. |
False
|
|
What is the primary revenue model for an e-distributor?
|
sales
|
|
Which of the following is not considered a portal?
|
WSJ.com
|
|
T or F
An asymmetry exists whenever one participant in a market has more resources than other participants. |
True
|
|
Which of the following companies utilizes a transaction fee revenue model?
|
E*Trade
|
|
T or F
A(n) business model is a set of planned activities designed to result in a profit in marketplace. |
True
|
|
Exostar is an example of a(n):
|
Industry Consortium
|
|
All of the following are examples of Business-to-Business (B2B) business models except:
|
E-Tailers
|
|
Differentiation refers to situations in which there is little difference between products and the only basis of choosing a product is price.
|
False
|
|
T or F
Packet switching requires a dedicated circuit. |
False
|
|
T or F
IP Protocol is the protocol that provides the Internet addressing scheme. |
True
|
|
T or F
IPv6 provides for 64-bit IP addresses. |
False
|
|
T or F
The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs). |
True
|
|
T or F
FTP is a protocol used to transfer files to and from a server. |
True
|
|
T or F
Internet access providers typically provide faster download speeds than upload speeds to consumers. |
True
|
|
T or F
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: |
Packet Switching
|
|
Which of the following is the core communications protocol for the Internet?
|
TCP/IP
|
|
The Internet Layer of TCP/IP is responsible for which of the following?
|
addressing, packaging and routing messages
|
|
T or F
An IPv4 address is expressed as a 32-bit number that appears as a series of four separate numbers separated by periods. |
True
|
|
The natural language convention used to represent IP addresses is called the:
|
Domain Name System
|
|
The addresses used by browsers to identify the location of content on the Web are called:
|
Uniform Resource Locators
|
|
Which of the following protocols is used to send mail to a server?
|
SMTP
|
|
The backbone of the Internet is formed by Network Service Providers (NSPs).
|
True
|
|
The "hubs" where the backbone owners connect with one another are called:
|
Internet Exchange Points (IXPs)
|
|
In the United States, there are two main types of cellular networks, CDMA and:
|
GSM
|
|
The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:
|
Mosiac
|
|
In the address http://www.ggc.edu, which of the following is the top-level domain?
|
.edu
|
|
Which of the following is a Web 2.0 service or application?
|
Wikis
|
|
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
|
VoIP
|
|
T or F
Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use. |
True
|
|
T or F
A virus does not need to be activated by a user in order for it to replicate itself. |
False
|
|
T or F
A Trojan horse appears to be benign, but then does something other than expected. |
True
|
|
T or F
The use of a digital signature helps to ensure integrity, authenticity, and nonrepudiation. |
True
|
|
T or F
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. |
True
|
|
T or F
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution. |
True
|
|
All of the following are factors in contributing to the increase in cybercrime EXCEPT:
|
The Internet's similarity to telephone networks.
|
|
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
|
Confidentiality
|
|
T or F
Nonrepudiation refers to the ability to ensure that e-commerce participants do not deny their online actions. |
True
|
|
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
|
Authenticity
|
|
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
|
Availability
|
|
T or F
Privacy refers to the ability to ensure that messages and data are only available to those authorized to view them. |
False
|
|
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
|
Spyware
|
|
What is the most frequent cause of stolen credit cards and card information today?
|
The hacking and looting of corporate servers storing credit card information
|
|
All of the following are examples of malicious code except:
|
Bots
|
|
All the following statements about symmetric key encryption are true except:
|
Symmetric key encryption is computationally slower.
|
|
If you used a symmetric key encryption for large documents, with public key encryption to encrypt and send the symmetric key, you would be using a digital:
|
Envelope
|
|
Which of the following dimensions of e-commerce security is not provided for by encryption?
|
Availability
|
|
All of the following are methods of securing channels of communication except:
|
FTP
|
|
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
|
Firewall
|
|
T or F
The sole purpose of marketing communications is sales. |
False
|
|
T or F
Online advertising methods include sponsorships, e-mail marketing, and referrals. |
True
|
|
T or F
Sending e-mail marketing messages is more costly than sending direct mail marketing messages. |
False
|
|
Which of the following is not one of the current trends in Internet advertising?
|
Spending on search engine advertising is overtaken by video ads.
|
|
Which of the following is not one of the advantages of online advertising?
|
Online costs versus benefits are well established and understood.
|
|
T or F
Banner ads is the most effective online advertising format. |
False
|
|
Which of the following forms of online advertising is growing the fastest?
|
Paid search
|
|
The size of a leaderboard is:
|
728 x 90 pixels
|
|
If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be:
|
Unique visitors
|
|
Which of the following types of display ads is 160 × 600 pixels?
|
Wide skyscraper
|
|
Which of the following is NOT true about search engine advertising?
|
Search engine advertising is the fastest growing type of online advertising.
|
|
A typical response rate for an e-mail campaign would be ________ percent.
|
5
|
|
Direct e-mail marketing refers to marketing e-mails sent to:
|
Recipients who have expressed an interest in receiving messages from that advertiser.
|
|
Promoted Trends is an example of which of the following types of online advertising?
|
Social network advertising
|
|
Impressions are a measure of the:
|
number of times an ad is served
|
|
Hits are a measure of the number of http requests.
|
True
|
|
CTR is a measure of the:
|
Percentage of times an ad is clicked
|
|
T or F
Acquisition rate is a measure of the percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages. |
True
|
|
Conversion rate is a measure of the:
|
percentage of visitors who become customers.
|
|
T or F
A(n) affiliate relationship permits a firm to place its logo, banner ad, or text link on another firm's Web site from which users of that site can click through to the originating site. |
True
|