Chapter 10 & 11 Deck Flashcards

1
Q

Which of the following is not a reason for advertising online?

A

Companies can collect personal information from those using their websites and possibly sell this information to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an advantage of setting up an online store (rather than a brick-and-mortar store)

A

Online stores are better able to capture data on its customers and their preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Some potential customers are unwilling to buy online because

A

they cannot see the product itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital marketing uses digital technology to sell products. Which of the following is not an advantage of digital ads from the viewpoint of the seller?

A

if you place a digital ad, you can be sure your ad will be seen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A pricing strategy where the price of an item fluctuates frequently based on complicated algorithms is called

A

dynamic pricing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which statement about content marketing is false?

A

If you write a blog as part of a content marketing campaign, you can be sure it will be read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An empty hotel room brings in no revenue. Then why wouldn’t a hotel manager at a luxury hotel or resort offer a very low, last-minute rate for an unfilled room?

A

to avoid “cheapening” the reputation of the luxury hotel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a recent survey ( ) Americans reported that they do not trust businesses with their personal information online.

A

approximately 45%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which pricing approach calculates the amount that can be spent to make a product by determining how much consumers are willing to pay and then subtracting a reasonable profit?

A

target costing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is false about dynamic pricing?

A

All consumers are happy with dynamic pricing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

( ) are electronic collections of related data that can be accessed by various members of an organization.

A

Databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

By ( ) its customer-based data warehouse, a firm can discover previously unknown relationships between customers in general and certain groups of customers.

A

data-mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ( ) verifies the identity of a computer site and sends you a digital certificate of authenticity stating that it trusts that site.

A

certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You work for a company that manufactures and sells guitars. What type of computer system allows you and others in your organization to quickly find out whether a particular guitar is in stock, determine the expected delivery date, find out your customer’s credit rating, and find the current selling price of the guitar?

A

Enterprise resource planning (ERP) system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In addition to data that you supply willingly, information about you can be gathered online without your knowledge or consent by means of so-called

A

“cookies”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a disadvantage of cloud computing?

A

Security issues, such as unauthorized access to data, increase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An enterprise resource planning system does all of the following except

A

planning operations processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Using a technique called ( ), computer criminals disguise their identities by modifying the addresses of the computers from which they launch their schemes.

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is not a reason why some people regard the Internet as an unsafe place to do business?

A

Encryption permits unauthorized individuals to develop a profile of your buying habits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To convince consumers that it’s safe to buy things over the Internet, businesses must

A
  1. keep credit-card numbers safe
  2. protect passwords
  3. protect personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is dynamic pricing used for?

A

sellers and service providers use this to monitor fluctuations in the prices of consumer’s goods or services as well as consumer demand, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Facebook decided to follow the ( ) and set the price for the Oculus Rift high.

A

skimming approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Starwood Hotels and Resorts used a form of dynamic pricing called a ( ) —analytics software that improves demand forecasting and automatically updates the pricing of its rooms using hundreds of supply and demand variables.

A

Revenue Optimization System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are two ways new technologies are helping supply chain members reduce costs and improve service?

A
  1. Wireless technologies and cloud computing

2. Radio-frequency identification (RFID tags)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

( ) performs computer tasks using services provided over the Internet.

A

cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

( ) uses digital technology to sell products.

A

digital marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

( ) focuses on selling a product to a specific demographic through traditional outreach, such as paid advertisements, television commercials, and direct mail..

A

product marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

( ) is intended to attract potential buyers by building a strong brand reputation through online content.

A

content marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the advantages of product marketing?

A
  1. guaranteed visibility
  2. fast results
  3. straightforward approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the advantages of content marketing?

A
  1. budget-friendly
  2. long-term results
  3. builds customer relationships
31
Q

What is the relationship between content marketing and social media marketing?

A

content marketing creates attention-grabbing content and show this content to customers and others through social media.

32
Q

( ) is used to describe extremely large collections of data, which are analyzed by computers to reveal useful consumer information, such as customer’s buying habits, personal profiles, purchases and social conversations.

A

Big data

33
Q

( ) can be generated internally or acquired through business services companies.

A

Big Data

34
Q

Some of the ways in which Big Data benefits marketing initiatives include:

A
  1. Giving Great Offers to Existing Customers
  2. Identifying New Customers
  3. Making More Profitable Ads
35
Q

The ( ) is an important ethical issue in the collection of data. This right lets individuals decide who should have access to their personal information.

A

right to privacy

36
Q

The items that you got wrong are merely ( )—unprocessed facts. ( ) are data that have been processed, or turned into some useful form.

A

data/information

37
Q

( ) the combination of technologies, procedures, and people who collect and distribute the information needed to make decisions and coordinate and control company-wide activities.

A

information systems (IS)

38
Q

The IS is operated by a senior management team that includes a ( ) who oversees information and telecommunications systems.

A

chief information officer (CIO)

39
Q

A ( ) reports to the CIO and oversees IT planning and implementation.

A

chief technology officer

40
Q

( ) need information for planning, setting objectives, and making major strategic decisions. ( ) need information that helps them allocate resources and oversee the activities under their control. ( ) require information that helps them supervise employees, oversee daily operations, and coordinate activities.

A

top managers/middle managers/first-line managers

41
Q

Caesars relies on an ( ) that allows real-time communication among all its properties.

A

integrated IT system

42
Q

Many large and mid-size companies rely on a highly integrated system called an ( ) to channel information to multiple users.

A

enterprise resource planning (ERP) system

43
Q

An ERP system integrates the computer needs of all business activities ( ) into a single computer system that serves all users.

A

across the enterprise

44
Q

A ( ) is a centralized database in which data from several databases are consolidated and organized so that they can be easily analyzed.

A

data warehouse

45
Q

( ) are generally used by managers at lower levels of the organization—those who run day-to-day business operations and make fairly routine decisions.

A

Operations support systems

46
Q

( ) refers to the application of technology to monitor and control physical processes.

A

Process control

47
Q

Mid- and upper-level managers may use one of four types of ( ) to assist in decision-making activities: management information systems, decision support systems, executive information systems, and expert systems.

A

management support system

48
Q

A ( ) is an interactive system that collects, displays, and integrates data from multiple sources to help managers make nonroutine decisions.

A

decision support system

49
Q

( ) are programs that mimic the judgment of experts by following sets of rules that experts would follow.

A

expert systems

50
Q

An IS, or information system, can be divided into two categories:

A
  1. Those that meet the needs of low-level managers

2. Those that meet the needs of middle- and upper-level managers

51
Q

( ) performs particular tasks, including word processing, creating and managing spreadsheets, designing graphical presentations, and producing high-quality printed documents (desktop publishing).

A

applications software

52
Q

A ( ) links computers that are in close proximity—in the same building or office complex.

A

local area network (LAN)

53
Q

A ( ) covers a relatively large geographical area and connects computers by telephone lines, wireless technology, or satellite.

A

wide area network (WAN)

54
Q

( ) include a number of client machines (the ones used by employees for data input and retrieval) and a server (which stores the database and the programs used to process the data).

A

client-server systems

55
Q

( ) transmit digital data (numeric data, text, graphics, photos, video, and voice) from one computer to another using a variety of wired and wireless communication channels.

A

data communication networks

56
Q

The ( ) is an immense global network comprising smaller interconnected networks linking millions of computers around the world.

A

Internet

57
Q

Companies that link into the Internet infrastructure to connect paying subscribers.

A

Internet service providers

58
Q

The ( ) is a subsystem of computers that can be accessed on the Internet using a special protocol, or language, known as ( ).

A

World Wide Web/hypertext transfer protocol (HTTP)

59
Q

( ) are software (such as Internet Explorer) that locates and displays Web pages.

A

browsers

60
Q

Documents on the Web are called ( ), and they’re stored on ( ).

A

web pages/websites

61
Q

Each Web page is accessed through a unique address called a ( ).

A

uniform resource locator (URL)

62
Q

A computer that retrieves Web pages is called a ( ).

A

webserver

63
Q

A ( ) is a software program that scans Web pages containing specified keywords and provides a list of documents containing them.

A

search engine

64
Q

Private network using Internet technologies that are available only to employees.

A

intranet

65
Q

An ( ) is an intranet that’s partially available to certain parties outside the organization.

A

extranet

66
Q

Why do businesses use the Internet? List four reasons.

A
  1. Presenting information
  2. Selling products
  3. Distributing digital products
  4. Acquiring goods and services
67
Q

Many companies now use a technology called ( ) to process transactions and transmit purchasing documents directly from one IS to another.

A

electronic data interchange

68
Q

A company without a significant physical presence that relies on third parties to produce, warehouse, price, and deliver the products it sells over the Internet.

A

virtual company

69
Q

Businesses that operate in e-commerce presents its own challenges, which are:

A
  1. malicious programs (can wreak havoc to computer systems)
  2. Unauthorized parties gaining access to restricted company websites (stealing funds or goods)
  3. Firewalls
70
Q

A ( ), for example, prevents a Web server from servicing authorized users; the culprit demands a ransom to stop the attack.

A

denial-of-service attack

71
Q

Companies that use the Internet to create and sell intellectual property (such as songs, movies, and software) face the problem of ( ).

A

piracy

72
Q

One effective method for protecting computer-stored information is ( )—the process of encoding data so that only individuals (or computers) armed with a secret code (or key) can decode it.

A

encryption

73
Q

A commonly used encryption scheme is a ( ), which directs the user’s browser to ask a site to authenticate itself.

A

secure sockets layer (SSL)