Final - E-Commerce 2019 Flashcards

1
Q

1) ________ and ________ are typically the most easily identifiable aspects of a company’s business model.

A

B) Value proposition; revenue model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1) All of the following were popular types of online marketing before 2007 except:

A

C) mobile marketing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1) Analysts predict that B2B e-commerce in the United States will grow to approximately ________ by 2022.

A

D) 7.3 trillion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1) Confidentiality is sometimes confused with:

A

A) privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1) E-commerce can be defined as:

A

A) digitally enabled commercial transactions between and among organizations and individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1) One of the first online virtual communities was:

A

A) The Well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A

C) social technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1) Which of the following is a simple but powerful method for strategizing about a business?

A

C) SWOT analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1) Which of the following is not a current trend in online content?

A

B) Readership of newspapers in print form continues to exceed online readership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1) Which of the following is not a major trend in online retail for 2018-2019?

A

D) The number of online buyers begins to plateau.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1) Which of the following statements about Internet usage in the United States is not true?

A

D) Adults in the 25-to-54-age group have the highest percentage of Internet use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

10) All of the following are advantages of online retail except:

A

D) faster delivery of goods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

10) All of the following are potential benefits of B2B e-commerce except:

A

C) lower price transparency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

10) Online traffic is driven by offline brands and shopping.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

10) Which ethical principle tells you that it is wise to assume perfect information markets?

A

B) the New York Times test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

10) Which of the following basic system functionalities is used to display goods on a website?

A

B) digital catalog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

10) Which of the following is a leading social network in Germany?

A

A) Xing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

10) Which of the following is an example of the affiliate revenue model?

A

D) MyPoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

10) Which of the following is the best definition of transaction cost?

A

B) the cost of participating in a market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

10) Which of the following is the first step in the social marketing process?

A

C) fan acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

10) Which of the following occurs first in the process of content convergence related to books?

A

B) media migration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

10) Which of the following statements about data breaches in 2017 is not true?

A

C) According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

11) All of the following are examples of cryptocurrencies except:

A

C) Zelle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

11) Each of the following is one of the top seven social network sites in the United States, in terms of monthly unique visitors, except:

A

B) Myspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

11) EDI began as a(n) ________ system.

A

A) document automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

11) Encouraging users to click a Like button is an example of which step in the social marketing process?

A

D) amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

11) The majority of online shoppers find vendors by clicking on display ads.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

11) The world’s online population was estimated to be around ________ in 2018.

A

B) 3.6 billion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A

B) Risk Aversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

11) Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

A

C) freemium strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

11) Which of the following is not an example of industry structure convergence?

A

D) Apple?s development of the iPad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

11) Which of the following is not one of the central challenges facing the online retail industry?

A

A) lack of physical store presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

11) Which system functionality must your website have to be able to personalize or customize a product for a client?

A

D) customer on-site tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

12) A social consequence of the richness of Internet information is:

A

C) very persuasive messages might reduce the need for multiple independent sources of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

12) All of the following are potential benefits of B2B e-commerce except:

A

B) increased product cycle time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

12) Facebook owns which of the following?

A

C) WhatsApp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

12) The overall rate of online credit card fraud is ________ of all online card transactions.

A

A) less than 1%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

12) Which of the following are the two main components of a systems design?

A

A) logical design and physical design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

12) Which of the following factors is not a significant influence on a company’s competitive environment?

A

C) the availability of supportive organizational structures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

12) Which of the following features of e-commerce technology is related to the concept of network externalities?

A

C) universal standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

12) Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration?

A

C) online supply-push

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

12) Which of the following online advertising formats attracted the least amount of spending in 2018?

A

D) e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

12) Which of the following types of online content is consumed by the lowest percentage of U.S. Internet users?

A

B) magazines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

12) Your Facebook News Feed includes all of the following except:

A

D) Tweets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

13) All of the following can be considered a direct competitor of Priceline except:

A

D) ESPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

13) All of the following have led to the development of outsourcing of manufacturing around the world except:

A

C) environmental concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

13) Downloading a music track owned by a record company without paying for it is an example of a violation of:

A

B) copyright law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

13) Google introduced which of the following changes to its search algorithm to weed out low quality sites from search results?

A

C) Panda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

13) In 2017, Fortune 500 companies used ________ more than Facebook.

A

C) LinkedIn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

13) The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:

A

D) industry convergence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

13) Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

A

C) Adobe Flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

13) Which of the following helps you engage your customers in a conversation?

A

C) on-site blog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

13) Which of the following statements about Facebook Exchange is not true?

A

C) It is a social search engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

13) Which of the following statements is not true about the automobile, and automobile parts and accessories, online retail category?

A

A) Most of the revenue in this category is generated from the sales of automobiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

13) Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?

A

C) The larger the audience reached, the less rich the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

14) Accessing data without authorization on Dropbox is an example of a:

A

B) cloud security issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

14) Ads that appear in a Facebook user’s News Feed are called:

A

C) Page Post Ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

14) Apart from Amazon, the top online retail firms in terms of online sales are all primarily ______ firms.

A

B) omni-channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

14) DRM refers to a combination of ________ for protecting digital content.

A

B) technical and legal means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

14) Interactivity in the context of e-commerce provides which of the following functionalities?

A

D) the enabling of two-way communication between consumer and merchant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

14) On which of the following do users spent the least amount of time per day?

A

C) LinkedIn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

14) The existence of many competitors in any one market segment may indicate:

A

B) the market is saturated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

14) Which of the following features of e-commerce technology can result in work and shopping invading family life?

A

B) ubiquity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

14) Which of the following forms of online advertising is expected to grow the most between 2018 and 2022?

A

D) video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

14) Which of the following is not one of the basic business objectives for an e-commerce site?

A

D) optimize system architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

14) Which of the following statements about B2B marketing is not true?

A

B) Only 10% of B2B marketers use mobile marketing technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

15) ________ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.

A

A) Technological

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

15) About how many hours a month do online social network users spend, on average, on all social networks combined?

A

C) 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

15) All of the following are basic information requirements for a product database except:

A

C) customer ID numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

15) All of the following can be considered a direct or indirect competitor of Amazon except:

A

D) Priceline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

15) Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

15) Supply chain ________ refers to differentiating a firm’s products or prices on the basis of superior supply chain management.

A

C) competition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

15) The costs incurred by merchants in having to change product prices (such as the costs of reentering prices into computer systems) are referred to as which of the following?

A

C) menu costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

15) When did the first online communities form?

A

B) the 1980s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

15) Which of the following is not a digitally native vertical brand?

A

B) Wayfair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

15) Which of the following is not a key factor for establishing e-commerce security?

A

A) data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

15) Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

A

A) Nielsen ratings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

16) A perfect market is one in which:

A

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

16) A(n) ________ market is one that provides expertise and products for a specific industry (i.e., automobiles).

A

A) vertical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

16) BlackPlanet is an example of a(n) ________ social network.

A

C) affinity-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

16) Conficker is an example of a:

A

B) worm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

16) Content convergence describes convergence in the design, production, and ________ of content.

A

B) distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

16) Online retail constitutes about 20% of the total retail market today.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

16) The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

16) Which of the following is a history of your actions on Facebook?

A

B) Timeline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

16) Which of the following refers to any disparity in relevant market information among parties in a transaction?

A

A) information asymmetry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

16) Which of the following search engine algorithm updates targets websites that violate Google?s guidelines?

A

D) Fred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

16) Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site?

A

B) logical design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

17) A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.

A

D) freemium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

17) In 2018, the number of online buyers in the United States was over 190 million.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

17) Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

A

C) incubators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

17) Sprout Social helped Wahl Professional improve its social media presence on which of the following?

A

B) Instagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

17) The essential characteristic of ________ is that they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade.

A

C) Net marketplaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

17) The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

17) Which of the following details the actual hardware components to be used in a system?

A

D) physical design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

17) Which of the following is a physical place you visit in order to transact?

A

B) marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

17) Which of the following is an example of a practice network?

A

D) Doximity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

17) Which of the following is not true about search engine advertising?

A

D) Search engine advertising is the slowest growing type of online advertising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

17) Which of the following is the leading cause of data breaches?

A

C) hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

18) A ________ specifically details how you plan to find customers and to sell your product.

A

D) market strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

18) All of the following marketing tools on Facebook require payment except:

A

A) Brand Pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

18) B2B e-commerce websites tend to serve horizontal markets.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

18) Discuss in depth one ethical, social, or political issue that is presently in the news surrounding the Internet and e-commerce.

A

Answer: A student might answer this issue by focusing on any one of a number of ethical, social, or political issues currently surrounding the Internet and e-commerce. Possible topics include privacy issues, intellectual property rights issues (copyright, patents, or trademarks), taxation, Internet governance issues such as net neutrality and the impact of ?big tech,? and Internet public safety and welfare issues such as the regulation of online pornography, gambling, or the sale of drugs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

18) Personal consumption of retail goods and services accounts for over 80% of total gross domestic product (GDP).

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

18) Software that is used to obtain private user information such as a user’s keystrokes or copies of e-mail is referred to as:

A

A) spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

18) The total number of users or customers an e-commerce business can obtain is a measure of which of the following?

A

C) reach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

18) Total music consumption in hours of day listening to music has increased even as sales of CDs have drastically declined.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

18) Which of the following has the highest penetration of social network usage among the general population?

A

A) North America

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

18) Which of the following is not a practice that degrades the results and usefulness of search engines?

A

A) social search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

18) Which of the following verifies that the business objectives of the system are in fact working?

A

B) acceptance testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

19) According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:

A

C) Nigeria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

19) Amazon’s Associates program is an example of which of the following?

A

C) affiliate marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

19) Describe the five-step process that can be used to analyze an ethical dilemma. What other guidelines are there to help in understanding a complicated ethical or moral situation?

A

Answer: The five-step process is:1. Identify and describe the facts. Find out who did what to whom, and where, when, and how. It helps to get the opposing parties involved in an ethical dilemma to agree on the facts.2. Define the conflict or dilemma and identify the higher-order values involved. Ethical, social, and political issues always reference higher values. Otherwise, there would be no debate. The parties to a dispute all claim to be pursuing higher values (e.g., freedom, privacy, protection of property, and the free enterprise system).3. Identify the stakeholders. Every ethical, social, and political issue has stakeholders: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions. Find out the identity of these groups and what they want. This will be useful later when designing a solution.4. Identify the options that you can reasonably take. You may find that none of the options satisfies all the interests involved, but that some options do a better job than others. Sometimes, arriving at a “good” or ethical solution may not always be a balancing of consequences to stakeholders.5. Identify the potential consequences of your options. Some options may be ethically correct, but disastrous from other points of view. Other options may work in this one instance, but not in other similar instances. Always ask yourself, “What if I choose this option consistently over time?”Other things to consider when appraising an ethical dilemma include basic ethical concepts such as responsibility, accountability, and liability and how these play into the situation. Additionally, you can judge the situation against candidate ethical principles, such as the Golden Rule, the Slippery Slope theory, Universalism, the Collective Utilitarian principle, Risk Aversion theory, the No Free Lunch theory, the New York Times test (Perfect Information rule), and the Social Contract rule. Actions that do not easily pass these guidelines deserve some very close attention and a great deal of caution because the appearance of unethical behavior may do as much harm to you and your company as the actual behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

19) Few large firms today have Electronic Data Interchange (EDI) systems.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

19) In 2018, over 90% of online buyers were expected to make a purchase using a mobile device.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

19) In 2018, which age group had the fastest growing rate of Facebook usage?

A

D) adults over 65

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

19) The average American adult spends twice as much time-consuming media than time spent at work.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

19) The ratio of impressions to fans is a measure of:

A

D) fan acquisition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

19) Which of the following involves testing a site’s program modules one at a time?

A

C) unit testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

19) Which of the following is not a community provider?

A

C) Blue Nile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

19) Which of the following refers to the complexity and content of a message?

A

A) richness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

2) ________ is the ability to ensure that e-commerce participants do not deny their online actions.

A

A) Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

2) Cord cutters and cord shavers are shrinking the number of pay TV subscribers yearly by approximately:

A

A) 3%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

2) In 2018, B2B e-commerce accounted for approximately ___% of all B2B commerce.

A

C) 46

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

2) Research shows the two key factors shaping the decision to purchase online are utility and trust.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

2) The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

A

C) decreased dramatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

2) The MOTO sector of the retail industry is most similar to the ________ sector.

A

C) online retail sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

2) The technology used by early online communities was limited to mostly:

A

D) bulletin boards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A

D) global reach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

2) Which of the following is an example of e-business?

A

A) Amazon’s inventory control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

2) Which of the following is not true about social marketing?

A

A) More than 50% of Twitter’s ad revenues are generated by desktop users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

2) Which of the following uses a subscription revenue model for books?

A

B) Amazon Kindle Unlimited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

20) Ad blockers operate in a manner similar to which of the following?

A

B) firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

20) Contrary to predictions of analysts made during the early days of e-commerce, the Internet has led to both disintermediation and hypermediation on a widespread basis.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

20) E-commerce is available just about everywhere and anytime. This is known as:

A

C) ubiquity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

20) Most of the time required to maintain an e-commerce site is spent on:

A

C) general administration and making changes and enhancements to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

20) The proliferation of mobile device has led to a decrease in the total amount of time spent with media.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

20) What is the most frequent cause of stolen credit cards and card information today?

A

B) the hacking and looting of corporate servers storing credit card information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

20) Which of the following basic ethical concepts plays an important role in defining privacy?

A

D) due process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

20) Which of the following early leaders in social networking has been reinvented as a music-oriented social network?

A

B) Myspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

20) Which of the following is not a variation of the e-tailer business model?

A

C) market creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

20) Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

A

B) Amplify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

20) Why is B2B e-commerce seen as a potential revenue source for B2B firms?

A

Answer: B2B e-commerce shows promise because purchasing supplies for a firm is a costly process. For example, firms estimate that each corporate purchase order costs at least in overhead. Using B2B e-commerce to automate B2B purchasing could save, overall, trillions of dollars. In turn, this could enable lower prices, increased productivity, and even greater wealth for a nation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

21) All of the following are simple steps for optimizing web page content except:

A

B) segmenting computer servers to perform dedicated functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

21) Consumers are primarily price-driven when shopping on the Internet.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

21) Define and discuss the terms B2B commerce, B2B e-commerce, and supply chains in the context of the history and significance of B2B e-commerce.

A

Answer: Before the Internet, business-to-business transactions were referred to simply as trade or the procurement process. The term B2B commerce refers to all types of inter-firm trade to exchange value across organizational boundaries. B2B commerce includes the following business processes: customer relationship management, demand management, order fulfillment, manufacturing management, procurement, product development, returns, logistics/transportation, and inventory management.The term B2B e-commerce (or B2B digital commerce) refers to that portion of B2B commerce that is enabled by the Internet (including mobile apps) to assist firms in buying and selling a variety of goods to each other. The links that connect business firms in the production of goods and services are referred to as the supply chain.Supply chains are a complex system of organizations, people, business processes, technology, and information, all of which need to work together to produce products efficiently. The process of conducting trade among businesses consumes many business resources. Across the economy this amounts to trillions of dollars spent annually on procurement processes. If a significant portion of this inter-firm trade could be automated and parts of the procurement process assisted by the Internet, millions or even trillions of dollars could be freed up for other uses resulting in increased productivity and increased national economic wealth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

21) The video game industry accounts for the second highest amount of U.S. media revenues.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

21) Ubiquity increases the cognitive energy required to transact in a marketspace.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

21) Which dimension(s) of security is spoofing a threat to?

A

C) integrity and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

21) Which of the following is an example of a company using the content provider model?

A

B) Netflix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

21) Which of the following is not a primary source of ad fraud?

A

D) native advertising that is displayed on a social media site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

21) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

A

D) USA Freedom Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

21) Which of the following now owns LinkedIn?

A

C) Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

21) Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users’ Twitter timeline?

A

D) Twitter Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

22) Identify and describe the major stages in the development of B2B commerce.

A

Answer: B2B commerce has evolved over a 45-year period through several technology-driven stages. The major stages in this evolution were the development of automated order entry systems, electronic data interchange (EDI), digital storefronts, private industrial networks, and Net marketplaces.Automated order entry systems began in the mid-1970s with the use of telephone modems to send digital orders to health care products companies. Modems were eventually replaced by personal computers using private networks in the late 1980s, and by Internet workstations accessing electronic online catalogs in the late 1990s.By the late 1970s, a new form of computer-to-computer communication called electronic data interchange (EDI) emerged. EDI is a communications standard for sharing business documents such as invoices, purchase orders, shipping bills, product stocking numbers (SKUs), and settlement information among a small number of firms. Virtually all large firms have EDI systems, and most industry groups have industry standards for defining documents in that industry.B2B e-commerce websites emerged in the mid-1990s along with the commercialization of the Internet. These storefronts are online catalogs of products made available to the public marketplace by a single supplier.Net marketplaces emerged in the late 1990s as a natural extension and scaling up of the electronic storefronts. These marketplaces bring hundreds to thousands of suppliers ? each with electronic catalogs and potentially thousands of purchasing firms ? into a single Internet-based environment to conduct trade.Private industrial networks also emerged in the late 1990s as natural extensions of EDI systems and the existing close relationships that developed between large industrial firms and their suppliers. Private industrial networks (also referred to as private trading exchanges, or PTXs) are Internet-based communication environments that extend far beyond procurement to encompass truly collaborative commerce. Private industrial networks permit buyer firms and their principal suppliers to share product design and development, marketing, inventory, production scheduling, and unstructured communications. These networks are the most prevalent form of Internet-based B2B commerce, and this will continue into the foreseeable future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

22) Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

22) The fact that e-commerce is conducted based on universal standards decreases search costs for consumers.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

22) The percentage of all e-mail that is spam averaged around ________ in 2017.

A

A) 55%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

22) The time spent on desktop computers and mobile devices now exceeds time spent in front of the television.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

22) Which of the following companies purchased Instagram?

A

C) Facebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

22) Which of the following is not an example of malicious code?

A

D) sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

22) Which of the following is not an example of the bricks-and-clicks e-tailing business model?

A

C) Bluefly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

22) Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

A

B) two-tier architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

22) Which of the following is used to track individuals as they move among thousands of websites?

A

C) advertising networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

22) Which of the following statements about Pinterest is not true?

A

D) Pinterest is the only one of the major social networks that does not accept paid advertising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

23) Barkbox is an example of a subscription-based retail revenue model.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

23) In 2018, the overall retail market in the United States was estimated to be about:

A

B) 5.3 trillion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

23) The a la carte revenue model allows users to pay only for what they use.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

23) The attack on Dyn Inc. in 2016 is an example of which of the following?

A

C) DDoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

23) The concept of a ?sprint? is related to which of the following development methodologies?

A

B) Scrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

23) Universal standards make price discovery more costly, slower, and less accurate.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

23) What is the first step in the procurement process?

A

D) search for suppliers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

23) Which of the following are features of both Pinterest and Twitter?

A

B) hashtags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

23) Which of the following statements about CAN-SPAM is not true?

A

B) CAN-SPAM prohibits unsolicited e-mail (spam).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

23) Which of the following statements about Instagram is not true?

A

D) Instagram users spend more time on Instagram than Facebook users spend on Facebook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

23) Which of the following uses software installed at the ISP level to track user clickstream behavior?

A

C) deep packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

24) All of the following are Pinterest marketing tools except:

A

D) Promoted Accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

24) Beebone is an example of which of the following?

A

B) botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

24) Big data plays an important role in predictive marketing.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

24) Howard Rheingold, one of The Well’s early participants, coined the term ________ to refer to “cultural aggregations that emerge when enough people bump into each other often enough in cyberspace.”

A

B) virtual communities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

24) In general, the key to becoming a successful content provider is to:

A

A) own the content being provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

24) Millennials are the first generation to be born into the digital revolution of the 20th century.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

24) Price transparency refers to the ease with which consumers can find out what merchants pay for products.

A

Answer: FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

24) The last step in the procurement process is:

A

A) sending a remittance payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

24) Which of the following involves creating a skeleton version that focuses on functionality rather than design?

A

B) wireframing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

24) Which of the following statements about Canada’s anti-spam law is not true?

A

B) The law has no impact on companies located within the United States.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

24) Which of the following statements about industry self-regulation regarding privacy is not true?

A

D) Critics argue that the most effective form of industry self-regulation to safeguard privacy are online seal programs that attest to a company’s privacy policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

25) A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared interest.

A

A) practice network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

25) Malware that comes with a downloaded file that a user requests is called a:

A

C) drive-by download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

25) Office supplies are an example of:

A

B) indirect goods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

25) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer’s preferences or past purchasing behavior.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

25) Revenue generated by online TV and movies is expected to grow by nearly 30% between 2018 and 2021.

A

Answer: TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

25) The number of people exposed to pins on Pinterest is a measure of which of the following?

A

D) fan acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

25) The Spokeo case involved a claim for damages based on which of the following?

A

A) Fair Credit Reporting Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

25) What are the challenges faced by automobile manufacturers in selling online?

A

Answer: Currently, U.S. franchising law prohibits automobile manufacturers from selling cars directly to consumers, so automobile retailing is dominated by dealership networks. Automobile manufacturers use the Internet to deliver branding advertising, while dealers focus on generating leads. Consumers typically focus on product and pricing research, which they then use to negotiate with dealers. Direct online automobile sales are currently not common due to the complexity of the vehicle purchasing process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

25) Which form of testing compares a control page with one that is very different?

A

B) new concept test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

25) Which of the following is the most important tool in establishing a relationship with the customer?

A

A) company website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

25) Which of the following uses a subscription-based sales revenue model?

A

D) Dollar Shave Club

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

26) A template test is a form of which type of testing?

A

D) A/B testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

26) All of the following are “traditional” online marketing tools except:

A

C) social marketing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

26) All of the following may lead to a competitive advantage except:

A

C) fewer products.

202
Q

26) Describe the vision of online retailing during the early days of e-commerce. Did these predictions and assumptions turn out to be true?

A

Answer: In the early days of e-commerce, entrepreneurial online retailers saw the Web as one of the largest market opportunities in the United States economy. They believed that entering the online retail market would be an easy proposition because the new marketing channel would revolutionize the retail industry. The belief was that the Internet would greatly reduce both search costs and transaction costs, causing consumers to use the Internet to find the lowest prices for products. This would result in consumers being increasingly drawn to the new channel, and only the low-cost, high-service quality e-tailers would survive. Economists assumed that online consumers would be rational and cost-driven rather than brand-name and perceived-value driven.Entrepreneurs also believed that entry costs to the online retail market would be much lower than the costs to establish a physical store, and that they could be more efficient at marketing and order fulfillment than their offline counterparts. They believed they could inexpensively create compelling websites that would attract customers and that these costs would no doubt be far less than the costs of warehouses, fulfillment centers, and physical stores. They severely underestimated the costs to build sophisticated order entry, shopping cart, and fulfillment systems because they believed the technology had already been developed and furthermore believed with technology prices falling every year, updating and building any other necessary systems would be economical.With search engines almost instantaneously connecting consumers to relevant online vendors, customer acquisition costs would also be negligible. As prices fell, the unwieldy and outdated offline merchants would be driven out of business and the new entrepreneurs of the efficient online marketplace would take over. Smart entrepreneurs would exploit first mover advantages to take their place at the head of the online merchant class and the old general merchandisers would be locked out of the market.In some industries, such as apparel, electronics, and digital content, the market would be disintermediated, eliminating the traditional “middlemen” as manufacturers and distributors built a direct relationship with the consumer. The Web would become the dominant channel replacing the physical stores, sales clerks, and sales forces. In other industries, retailers would outsource the warehousing and order-fulfillment functions and a kind of hypermediation would occur in which many intermediaries would perform the functions for the virtual firm.Unfortunately for many failed businesses and investors, these assumptions did not turn out to be correct. The structure of the retail marketplace remained intact, and consumers have proven to be less price sensitive than the economists expected. In online merchandising, the importance of brand names to consumers’ perceptions of quality and service has been extended rather than decreased or eliminated. The retail marketplace was neither disintermediated nor revolutionized. Although an entirely new channel emerged, it today belongs not just to the pure-play, online- only, first movers, but also to omni-channel firms with established brand names.

203
Q

26) E-commerce technologies provide a unique, many-to-many model of mass communication.

A

Answer: TRUE

204
Q

26) Smartphones are an example of technological convergence.

A

Answer: TRUE

205
Q

26) The amount of time visitors spend on a site is a measure of:

A

D) engagement.

206
Q

26) The majority of inter-firm trade involves:

A

C) contract purchasing of direct goods.

207
Q

26) Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

A

B) Curalate

208
Q

26) Which of the following is not an example of a potentially unwanted program (PUP)?

A

C) drive-by download

209
Q

26) Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

A

B) Gramm-Leach-Bliley Act

210
Q

27) All of the following are among those most frequently affected by ad-blocking except:

A

D) online retailers.

211
Q

27) All of the following are examples of direct goods in the auto industry except:

A

D) desktop computers.

212
Q

27) Cannibalization is a major challenge facing book publishers.

A

Answer: FALSE

213
Q

27) Describe the state of the online retail sector today.

A

Answer: Although the online retail sector is one of the smallest segments of the total retail market, constituting only about 10% of the total retail market in 2018, it is growing faster than its offline counterparts, with new functionality and product lines being added every day. During the recession of 2008-2009, online retail revenues were basically flat, but have since resumed their upward trajectory. More people than ever are shopping online, and for most consumers, the advantages of online shopping overcome the disadvantages. While the number of new Internet users in the United States is not growing as rapidly as it was, this slowdown will not necessarily reduce the growth in online retail e-commerce because the average shopper is spending more on the Internet each year and finding many new categories of items to buy. For instance, in 2003, the average annual amount spent online by users was , but by 2018, it had jumped an estimated ,955. Millions of additional consumers more look for information online about purchases they make at offline stores.Offline retailers who have the brand-name recognition, supportive infrastructure, and financial resources have entered the online marketplace successfully and continue to integrate their online operations with their physical store operations to provide an integrated shopping customer experience and leverage the value of their physical stores. Some of the most significant changes in retail e-commerce in 2018 were the continuing growth in social e-commerce, the growing ability of firms to market local services and products using location-based marketing, and, not least, the rapidly growing mobile platform composed of smartphones and tablet computers. In retail circles, smartphones have become a leading shopping tool, while tablets are increasingly both shopping and purchase platforms. Social networks like Facebook, Twitter, Pinterest, Instagram, Snapchat and others have developed into major marketing and advertising platforms. After trials, Facebook, Pinterest, and Instagram have all introduced their own versions of “buy buttons” that allow consumers to more easily purchase goods on a much wider scale. In addition, location-based mobile marketing and advertising solutions such as Groupon have enabled local merchants to inexpensively enter local mobile marketing. Social and local e-commerce are enabled by the tremendous growth in mobile Internet devices, both smartphones and tablet computers. In 2018, U.S. retail m-commerce was expected to generate over billion overall. In 2018, over 80% of online buyers were expected to make a purchase using a mobile device, and it is estimated that this percentage will grow to over 85% by 2022.

214
Q

27) More than two-thirds of Internet users worldwide participate in social networks.

A

Answer: TRUE

215
Q

27) When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test?

A

D) 8

216
Q

27) Which of the following is a core Fair Information Practices (FIP) principle?

A

A) Choice/Consent

217
Q

27) Which of the following is an unfair competitive advantage?

A

A) brand name

218
Q

27) Which of the following is another term for amplification?

A

B) reach

219
Q

27) Which of the following was designed to cripple Iranian nuclear centrifuges?

A

A) Stuxnet

220
Q

27) Why study e-commerce?

A

Answer: E-commerce is a disruptive innovation that is different and more powerful than any of the other technologies we have seen in the past century. E-commerce technologies?and the digital markets that result?have brought about some fundamental, unprecedented shifts in commerce. While other technologies transformed economic life in the twentieth century, the evolving Internet and other information technologies are shaping the twenty-first century.

221
Q

28) All of the following are examples of dark social except:

A

B) tweets.

222
Q

28) An example of an indirect good in the fast-food industry is:

A

B) paper napkins.

223
Q

28) Automatically redirecting a web link to a different address is an example of which of the following?

A

C) pharming

224
Q

28) Facebook is the fastest growing of the most popular social networks.

A

Answer: FALSE

225
Q

28) Identify the eight unique features of e-commerce technology and explain how these features set e-commerce apart from more traditional ways of conducting commercial transactions.

A

Answer: The eight unique features of e-commerce technology are ubiquity, global reach, universal standards, richness, interactivity, information density, personalization/customization, and social technology. The fact that e-commerce is available nearly everywhere, at any time, (ubiquity) extends the marketplace beyond traditional boundaries and removes it from a temporal and geographic location. A marketspace is created in which shopping can take place anywhere, enhancing consumer convenience and reducing shopping costs, whereas in traditional commerce the marketplace is a physical place you must visit in order to transact.The global reach of e-commerce means that commerce is enabled across national and cultural boundaries as never before, with potentially billions of consumers and millions of businesses worldwide included in the marketspace. Traditional commerce, by contrast, is local or regional involving local merchants or national merchants with local outlets.Universal standards (one set of technical media standards) also allow for the seamless enablement of global commerce. In contrast, most traditional commerce technologies differ from one nation to the next. In traditional markets, national sales forces and small retail stores can provide a complex and content-rich message. However, there is generally a trade-off between the richness of the message and the number of consumers who can be reached with the marketing message. In e-commerce the trade-off is no longer necessary.An information rich environment is extended globally. Unlike any other commercial technology of the twentieth century, except perhaps the telephone, e-commerce technologies are interactive, allowing for two-way communication between the seller and the consumer. E-commerce technologies reduce information collection, storage, processing, and communication costs, thereby greatly increasing the prevalence, accuracy, and timeliness of information. This information density (information that is more plentiful, cheaper, and of higher quality) sets e-commerce apart from all other traditional methods of conducting transactions.E-commerce technologies also permit the personalization and customization of marketing messages on a level that was impossible with previous commerce technologies. Marketing messages can be targeted to specific individuals based on their interests and past purchasing behavior, and the product or service can be altered to suit a customer’s preferences and prior behavior. Social technology allows users to easily generate and share content and permits a many-to-many model of mass communications that is different from previous technologies. This supports the creation of new business models and products that support social network services.

226
Q

28) The Nike iD program is an example of which of the following marketing techniques?

A

A) customer co-production

227
Q

28) The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

A

C) benchmarking.

228
Q

28) What is DRM and why is it used?

A

Answer: Digital rights management (DRM) refers to a combination of technical (both hardware and software), and legal means for protecting digital content from unlimited reproduction and distribution without permission. DRM hardware and software encrypt content so it cannot be used without some form of authorization, typically based on a payment. The objective is to control the uses of content after its been sold or rented to consumers. Essentially, DRM can prevent users from purchasing and making copies for widespread distribution over the Internet without compensating the content owners.

229
Q

28) Which of the following gives a business model the most credibility with outside investors?

A

A) the firm’s management team

230
Q

28) Which of the following is not a key industry strategic factor?

A

A) synergies

231
Q

28) Which of the FTC’s Fair Information Practices (FIP) principles requires identification of the collector of data?

A

A) Notice/Awareness

232
Q

29) A community site created by a corporation is called a sponsored community site.

A

Answer: TRUE

233
Q

29) According to the Identity Theft Resource Center, the number of data breaches in 2017 increased by ________ compared to 2016.

A

C) 55%

234
Q

29) All of the following are strategic factors that pertain specifically to a firm and its related businesses except:

A

D) power of customers.

235
Q

29) An ________ is an independently owned, online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment.

A

A) exchange

236
Q

29) As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:

A

D) Facebook?s Lookalike Audience lead generation tool.

237
Q

29) Explain the concept of media convergence.

A

Answer: The term media convergence refers to digitally based changes in technology platform, content, and industry structure. Technological convergence means the integration of previously separate platform functionality into hybrid devices that can combine the functionality of many different existing media platforms such as books, newspapers, television, radio, and stereo equipment.Content convergence has three dimensions: design, production, and distribution. Content design convergence occurs as content created in an older media technology is transferred into a new technology. Historically the initial transference involves little artistic change, but as the artists and producers learn how to use the new tools and how to deliver content more efficiently in the new media, the new capabilities can be fully exploited, and the art becomes measurably different. Content production convergence occurs when content, which is the most significant cost of content, is developed only once using technology that can deliver it to multiple different platforms. Production convergence drives content convergence as new tools are developed for economically producing content for delivery to multiple platforms. For example, the text produced in a word processing program can be easily converted to an HTML or PDF file for online delivery. Distribution convergence occurs when the distributors and ultimate consumers have the devices needed to receive, store, and experience the product.Industry convergence refers to the merger of media enterprises into powerful synergistic combinations that can cross-market content on many different platforms and create new works that use multiple platforms. Traditionally, each type of media ? film, text, music, television ? had its own separate industry, typically composed of very large players. However, the Internet has created forces that make the merger of traditionally separate firms in separate media industries a plausible ? perhaps necessary ? business proposition.

238
Q

29) How has e-commerce changed the marketing of goods?

A

Answer: E-commerce has greatly changed the marketing of goods. Before e-commerce was developed, the marketing and sale of goods was a mass-marketing and sales force-driven process. Marketers viewed consumers as passive targets of advertising campaigns. E-commerce has brought many new possibilities for marketing. The Internet and Web can deliver, to an audience of millions, rich marketing messages with text, video, and audio in a way not possible with traditional commerce technologies such as radio, television, or magazines. Merchants can target their marketing messages to specific individuals by adjusting the message to a person’s name, interests, and past purchases. In addition, much information about the consumer can be gathered from the website the consumer visits. With the increase in information density, a great deal of information about the consumer’s past purchases and behavior can be stored and used by online merchants. The result is a level of personalization and customization unthinkable with existing commerce technologies.

239
Q

29) The incremental cost of building the next unit of a good is called the:

A

C) marginal cost.

240
Q

29) The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.

A

Answer: TRUE

241
Q

29) Which of the following statements about Foursquare is not true?

A

C) The growth in Foursquare?s revenue since 2015 has been driven primarily by significant increases in the numbers of users of its Swarm app.

242
Q

29) Which of the FTC’s Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

A

B) Choice/Consent

243
Q

3) ________ is the ability to identify the person or entity with whom you are dealing on the Internet.

A

B) Authenticity

244
Q

3) How much time a month does the average person spend using the Facebook app on mobile devices?

A

C) about 13 hours

245
Q

3) Which element of the business model addresses what a firm provides that other firms do not and cannot?

A

D) value proposition

246
Q

3) Which of the following can be considered synonymous with the term e-commerce?

A

B) digital commerce

247
Q

3) Which of the following is a community of members who self-identify with a demographic or geographic category?

A

C) affinity community

248
Q

3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A

B) privacy

249
Q

3) Which of the following is not one of the main stages of the online purchasing process?

A

D) conversation

250
Q

3) Which of the following is not one of the seven major segments of the retail industry?

A

A) electronics and computers

251
Q

3) Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one’s customers?

A

C) social media

252
Q

3) Which of the following U.S. media channels generates the most revenue?

A

A) broadcast television/pay TV

253
Q

3) Which of the following was the first step in the development of B2B e-commerce?

A

B) automated order entry systems

254
Q

30) According to Ponemon Institute’s 2017 survey, which of the following was not among the causes of the most costly cybercrimes?

A

D) botnets

255
Q

30) An ________ primarily serves businesses that primarily buy direct goods on a spot purchasing basis.

A

C) exchange

256
Q

30) Describe the evolution of social networks from their earliest appearance.

A

Answer: The earliest social networks, in the mid-1980s and 1990s were community bulletin boards, or discussion groups, like The Well. In the early 2000s, technology changed, bringing in blogging, photo sharing features. As the Internet user population expanded, more and more socially oriented sites appeared, including Facebook, allowing users to share content directly with each other. More recently, in the late 2000s and early 2010s, as the Internet became available to browse (and post to) via mobile devices, more and more photo and video sharing social networks have emerged, such as Pinterest and Instagram. A new crop of social networks launched since 2008 (i.e., Snapchat and WhatsApp) focus on messaging.

257
Q

30) Describe the three basic revenue models for digital content delivery.

A

Answer: There are three revenue models for delivering content on the Internet. The two “pay” models are subscription (usually “all you can eat,” meaning the amount of content that you can consume is unlimited), and a la carte (pay only for what you use). The third model uses advertising revenue to provide content for free, often with a “freemium” option, which makes additional content available for a cost. In many cases, all three of the models work in tandem and cooperatively: free content can drive customers to paid content, as streaming services like Pandora and Spotify have discovered.

258
Q

30) Scrum is a type of agile development.

A

Answer: TRUE

259
Q

30) The lower the ________ compared to revenue, the higher the gross profit.

A

B) cost of sales

260
Q

30) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A

A) Require firms to have consumers affirmatively opt-in before PII is collected.

261
Q

30) Which of the following allows Facebook to track user behavior on other sites?

A

B) Like button

262
Q

30) Which of the following statements about a free pricing strategy is false?

A

B) The free pricing strategy was born in the early days of the Web.

263
Q

30) Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

A

C) mobile e-commerce

264
Q

30) Which type of investor typically becomes interested in a startup company after it has begun generating revenue?

A

D) venture capital investors

265
Q

31) “Do Not Track” falls under which of the following principles in the FTC’s current privacy framework?

A

B) Simplified Choice

266
Q

31) ________ typically attack governments, organizations, and sometimes individuals for political purposes.

A

D) Hacktivists

267
Q

31) Creating multiple variations of information goods and selling these to different market segments at different prices is called:

A

D) versioning.

268
Q

31) Discuss the structure of the U.S. media content industry.

A

Answer: The U.S. media content industry prior to 1990 was composed of many smaller independent corporations specializing in content creation and distribution in the separate industries of film, television, book and magazine publishing, and newspaper publishing. During the 1990s and into this century, after an extensive period of consolidation, huge entertainment and publishing media conglomerates emerged. The U.S. media industry is still organized largely into three separate vertical stovepipes: print, movies, and music. Each segment is dominated by a few key players. Generally, there is very little crossover from one segment to another. Typically, newspapers do not also produce Hollywood films, and publishing firms do not own newspapers or film production studios. The purchase of the Washington Post in 2013 by Jeff Bezos, the founder of Amazon, and an Internet mogul in his own right, was an anomaly. Even within media conglomerates that span several different media segments, separate divisions control each media segment. In the past, delivery content firms, such as Comcast, Altice, AT&T, Verizon, Sprint, and Dish Network were not involved in content creation, but instead just moved content produced by others across cable, satellite, and telephone networks. However, within the last several years, this has begun to change. Comcast led the way with the acquisition of a majority interest in NBC Universal. AT&T’s merger with Time Warner and Verizon’s purchase of Yahoo, along with its previous acquisition of AOL, are signs that the telecommunications companies are moving into the content and distribution market, as well as the Internet advertising industry, in a major way as revenues from traditional cable Internet and wireless business slow.

269
Q

31) Gross margin is defined as gross profit:

A

B) divided by net sales revenues.

270
Q

31) The liquidity of a market is measured by all of the following except:

A

A) price transparency.

271
Q

31) Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.

A

Answer: TRUE

272
Q

31) Which of the following is a leading platform for social e-commerce?

A

D) Facebook

273
Q

31) Which of the following is another name for a revenue model?

A

C) financial model

274
Q

31) Which of the following is not true about Facebook News Feed Page Post Ads?

A

C) They cannot contain links.

275
Q

32) ________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers.

A

A) Spot

276
Q

32) All of the following are fixed price strategies except:

A

D) yield management.

277
Q

32) All of the following can be considered examples of the market creator business model except:

A

D) Twitter.

278
Q

32) Business-to-consumer (B2C) e-commerce in the United States:

A

A) grew at double-digit rates between 2010 and 2018.

279
Q

32) If a large number of Internet users set Facebook as their primary destination on their web browser, should Facebook be considered a portal?

A

Answer: Student answers will vary but should include reference to social networks broadening their offerings to become more portal-like. An example answer is: While Facebook can be a primary destination, the goal of Facebook is to keep users occupied and communicating with each other. One of the main goals of a portal is to provide avenues to third party content and other areas of the Internet. Although social networks are aiming to include portal-like features, to keep and grow audiences, the primary goals of a portal currently don’t include social sharing.

280
Q

32) In general, the annual system maintenance cost will roughly parallel the development cost.

A

Answer: TRUE

281
Q

32) IoT botnets became the preferred platform for launching DDoS attacks in 2017.

A

Answer: TRUE

282
Q

32) Which of the following has not been purchased or invested in by a wealthy individual with ties to the technology industry?

A

D) The New Yorker

283
Q

32) Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?

A

B) Twitter

284
Q

32) Which of the following is not categorized as an operating expense?

A

A) the cost of products being sold

285
Q

32) Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?

A

C) differential privacy software

286
Q

33) ________ is defined by company using its competitive advantage to gain in surrounding markets.

A

C) Leverage

287
Q

33) A multi-tier architecture typically includes only a web server and a database server.

A

Answer: FALSE

288
Q

33) A Trojan horse appears to be benign, but then does something other than expected.

A

Answer: TRUE

289
Q

33) Companies are not permitted to collect personal information from children under the age of ________ without parental consent.

A

C) 13

290
Q

33) MRO goods are also known as direct goods.

A

Answer: FALSE

291
Q

33) Operating margin is defined as:

A

A) operating income or loss divided by net sales revenues.

292
Q

33) What business models do social networks use?

A

Answer: The most popular general social networks, such as Facebook, have adopted an advertising model, and make money from ads displayed to users. There are number for profit and non-profit networks that stay afloat from user donations, member dues, premium services, or through sponsorship financing.

293
Q

33) Which of the following has the highest share of the e-book market?

A

A) Amazon

294
Q

33) Which of the following involves getting customers to pass along a company’s marketing message to friends, family, and colleagues?

A

B) viral marketing

295
Q

33) Which of the following is an example of a pay-for-privacy (PFP) approach?

A

A) AT&T?s GigaPower service

296
Q

33) Which of the following is not true about the use of apps?

A

B) Users still spend less time using apps than they do using desktops or mobile websites.

297
Q

34) A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n):

A

B) angel investor.

298
Q

34) All of the following are required for information to be considered a trade secret except:

A

C) it must be unique.

299
Q

34) Discuss the impact social networks have had on how businesses operate, communicate, and serve their customers.

A

Answer: Social networks have had an important impact on how businesses operate, communicate, and serve their customers. The most visible business firm use of social networks is as a marketing and branding tool. The most popular social network tool for large corporate businesses is LinkedIn, with 98% of the Fortune 500 using LinkedIn. Twitter is the second most popular, used by 88%, while 85% use Facebook. A less visible marketing use of networks is as a powerful listening tool which has strengthened the role of customers and customer feedback systems. Social networks are where corporate brands and reputations are formed, and firms today take very seriously the topic of “online reputation,” as evidenced by social network posts, commentary, chat sessions, and Likes. In this sense, social network sites have become an extension of corporate customer relationship management systems and extend existing market research programs. Beyond branding, social network sites are being used increasingly as advertising platforms to contact a somewhat younger audience than websites and e-mail, and as customers increasingly shift their eyeballs to social networks. Rosetta Stone, for instance, uses its Facebook page to display videos of its learning technology, encourage discussions and reviews, and post changes in its learning tools. Public social networks like Facebook have not been used extensively in firms as collaboration tools thus far. However, in 2016, Facebook launched its Workplace app, designed to spur collaboration and networking inside large firms. Over 14,000 organizations worldwide use this relatively new app.

300
Q

34) Group M, the world?s largest advertising buyer, requires which of the following in order for an ad to be considered viewable?

A

C) 100% of the pixels must be in view for at least one second

301
Q

34) Phishing attacks rely on browser parasites.

A

Answer: FALSE

302
Q

34) Purchasing managers are key players in the procurement process.

A

Answer: TRUE

303
Q

34) Web services are loosely coupled, reusable software components based on XML and other open protocols and standards that enable an application to communicate with another application without requiring any custom programming.

A

Answer: TRUE

304
Q

34) What is another name for pro forma earnings?

A

C) earnings before income taxes, depreciation, and amortization (EBITDA)

305
Q

34) Which of the following happened during the time period when newspapers used a print-centric business model?

A

A) Google launched its search engine.

306
Q

34) Which of the following is an example of an on-demand service company?

A

B) Airbnb

307
Q

34) Which of the following was the object of the FTC’s highest penalty for a COPPA violation to date?

A

A) Disney’s Playdom

308
Q

35) ________ of procurement officers use auctions to purchase goods.

A

C) Over one third

309
Q

35) ________ were the most troubled segment of the print publishing industry in 2017.

A

C) Newspapers

310
Q

35) According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A

C) cleared web browser history and cookies

311
Q

35) Describe the major issues surrounding the decision to build and/or host your own e-commerce site or to outsource some aspects of site development. Include the advantages and disadvantages of each decision.

A

Answer: If you decide to build an e-commerce site in-house, you will need a multi-skilled staff including programmers, graphic artists, web designers, and project managers. You will also have to select and purchase software and hardware. Building a site from scratch involves a great deal of risk, and the costs can be high because many of the required elements of an e-commerce site such as shopping carts, credit card authentication and processing, inventory management, and order processing are quite complex. Specialized firms have already perfected these tools and your staff will often have to learn to build these features themselves. The advantage is that you and your staff may be able to build a site that exactly suits the specific needs of your company. Another advantage is that you will be developing a skilled staff and consequently acquiring an invaluable supply of in-house knowledge that will enable your firm to change the site if necessary due to the rapidly changing business environment.If, on the other hand, you decide to purchase an expensive site-building package, you will have to evaluate different packages to decide which one will be best suited to your firm’s needs. This can be a lengthy process and some packages may have to be modified. Additional vendors may have to be hired to execute the modifications, and this can cause the costs to mount rapidly.You can also purchase less expensive, prebuilt templates, but you will be limited to the functionality already built into the template. You can choose templates from merchant-solution vendors such as Yahoo Small Business or use the templates from a site-building tool such as WordPress. Brick-and-mortar retailers can generally design a site themselves because they have a skilled staff in place and have made large investments in information technology, such as databases and telecommunications. They will usually use outside vendors to build the e-commerce applications for the site. Medium-size startups will often purchase a prepackaged site-building tool and make modifications as necessary. Small startups that only require a simple virtual storefront will usually use a template.The hosting decision is independent from the building decision, but the two are usually considered at the same time. Most businesses choose to outsource hosting because it is generally less expensive than it would be for them to purchase the hardware and the physical space, lease the communications lines, and hire the staff. Large hosting firms can build the telecommunication links and emergency power supplies and achieve economies of scale by establishing huge “server farms” in strategic locations around the country. If you host your own site, you must also build the security and backup capabilities yourself.Another option is co-location in which a firm purchases or leases a web server and has total control over its operation, but the server is located in the vendor’s physical facility. In a co-location agreement, the vendor maintains the facility, the machinery, and the communication lines. Small ISPs may not be able to provide service that is as reliable as the large providers. The disadvantage of outsourcing hosting is that as your business grows, you may need more power or services than the hosting company can provide. This is the main reason that firms will decide to host their own sites, but the costs will almost always be higher than if they had chosen an outsourcing firm.

312
Q

35) WannaCry is an example of ransomware.

A

Answer: TRUE

313
Q

35) What does the term supply chain visibility refer to and what benefits does it bring?

A

Answer: The term supply chain visibility refers to the ability of a firm to monitor the output of its first and second tier suppliers, track and manage supplier orders, and manage transportation and logistics suppliers who are moving the products. When a supply chain is visible, you know when suppliers’ products will arrive, and you have accurate tracking of your goods. The benefit of a visible supply chain is that the firm can produce accurate production schedules and develop more accurate financial forecasts.

314
Q

35) Which of the following is a platform for B2B e-commerce?

A

D) Go2Paper

315
Q

35) Which of the following is based on the idea of complete price transparency in a perfect information marketplace?

A

A) the Law of One Price

316
Q

35) Which of the following is most similar to Pinterest?

A

B) Instagram

317
Q

35) Which of the following is not a key element of an elevator pitch?

A

C) legal structure

318
Q

35) Which of the following is not considered a current asset?

A

A) long-term investments

319
Q

36) A value proposition defines how a company’s product or service will generate revenue for the firm.

A

Answer: FALSE

320
Q

36) All of the following are benefits of auctions except:

A

C) decreased price transparency.

321
Q

36) All of the following are platforms for C2C e-commerce except:

A

A) Walmart

322
Q

36) All of the following might be part of a website’s middle-tier layer except:

A

C) legacy corporate applications.

323
Q

36) Current liabilities are debts of the firm that will be due within:

A

C) one year.

324
Q

36) Define the procurement process. What are the seven basic steps in the procurement process?

A

Answer: The procurement process refers to the way business firms purchase the goods they need to produce the goods they will ultimately sell to consumers. Firms purchase goods from a set of suppliers that in turn purchase their inputs from another set of suppliers. These firms are linked in a series of connected transactions. The supply chain refers to this series of transactions, which links sets of firms that do business with each other. It includes not only the firms themselves but also the relationships between them and the processes that connect them. There are seven steps in the procurement process: searching for suppliers for specific products; qualifying the sellers and the products they sell; negotiating prices; credit terms, escrow requirements, quality, and scheduling delivery; issuing purchase orders; sending invoices; goods are shipped; and the buyer sends a payment. Each step is composed of separate substeps that must be recorded in the information systems of the buyer, seller, and shipper.

325
Q

36) Spoofing is the attempt to hide a hacker’s true identity by using someone else’s e-mail or IP address.

A

Answer: TRUE

326
Q

36) Which of the following industries accounts for the highest percentage of spending on online advertising?

A

B) retail

327
Q

36) Which of the following statements about the General Data Protection Regulation (GDPR) is not true?

A

C) The GDPR eliminate the right to be forgotten.

328
Q

36) Which of the following statements about the newspaper industry is not true?

A

D) Newspaper circulation revenues have declined dramatically since 2000.

329
Q

36) Which social marketing proved the most effective for ExchangeHunterJumper.com?

A

A) Facebook

330
Q

37) ________ is the market leader in C2C auctions.

A

B) eBay

331
Q

37) All of the following are examples of social networks except:

A

C) Y Combinator.

332
Q

37) All of the following are major trends in B2B e-commerce in 2018-2019, except:

A

A) a movement toward implementing highly centralized supply chains to reduce risk.

333
Q

37) Exploit kits can be purchased by users to protect their computers from malware.

A

Answer: FALSE

334
Q

37) For a quick check of a firm’s short-term financial health, examine its:

A

A) working capital.

335
Q

37) Real markets are imperfect.

A

Answer: TRUE

336
Q

37) The leading web server software is:

A

A) Apache.

337
Q

37) Which of the following is not a privacy advocacy group?

A

B) TIO

338
Q

37) Which of the following refers to the number of interactions among members of a group and reflects the “connectedness” of the group, even if these connections are forced on users?

A

C) social density

339
Q

37) Which of the following statements about native advertising is not true?

A

B) Native advertising is a new form of advertising found only online.

340
Q

37) Which of the following statements about online magazine publishing is not true?

A

B) Only about 10% of tablet computer owners read magazine content once a week.

341
Q

38) A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

A

Answer: TRUE

342
Q

38) All of the following are basic functionality provided by web servers except:

A

D) a shopping cart.Answer: D

343
Q

38) All of the following are weaknesses of EDI except:

A

B) EDI lacks universal standards.

344
Q

38) B2B e-commerce is the largest type of e-commerce.

A

Answer: TRUE

345
Q

38) Information asymmetries enable some firms to have an edge over others.

A

Answer: TRUE

346
Q

38) Magazine digital advertising revenues are expected to _______ for the next few years.

A

A) remain relatively flat

347
Q

38) Which of the following is an automated, auction-based method for matching demand and supply for online display ads?

A

C) programmatic advertising

348
Q

38) Which of the following is not a risk or cost of Internet auctions?

A

C) price transparency

349
Q

38) Which of the following measures the percentage of sales revenue a firm can retain after all expenses are deducted from gross revenues?

A

B) net margin

350
Q

38) Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?

A

B) dark social

351
Q

38) Which of the following was the first state law in the United States requiring owners of commercial websites or online services to post a privacy policy.

A

D) California Online Privacy Protection Act

352
Q

39) FREAK is an example of a software vulnerability.

A

Answer: TRUE

353
Q

39) In the United States, Google is not required to remove results from its search engine if requested.

A

Answer: TRUE

354
Q

39) List and briefly explain the main types of e-commerce.

A

Answer: The main types of e-commerce are business-to-consumer (B2C), in which online businesses attempt to reach individual consumers; business-to-business (B2B), in which businesses focus on selling to other businesses; consumer-to-consumer (C2C), which provides a market in which consumers can sell goods to each other; mobile e-commerce (m-commerce), which refers to the use of wireless digital devices to enable online transactions; social e-commerce, which is commerce enabled by social networks and online social relationships; and local e-commerce, which is e-commerce that is focused on engaging the customer based on his or her geographical location.

355
Q

39) Research has found that most of the ad impressions served across display advertising platforms are not viewable.

A

Answer: TRUE

356
Q

39) Slow followers are sometimes more successful than first movers.

A

Answer: TRUE

357
Q

39) The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ________ costs.

A

A) equipment

358
Q

39) Which of the following is a method of inventory cost management that seeks to eliminate excess inventory?

A

C) just-in-time production

359
Q

39) Which of the following is a real-time bidding system that allows advertisers to target their ads to specific users based on personal information provided by Facebook?

A

B) FBX

360
Q

39) Which of the following is not one of the top three players in e-book publishing?

A

D) Google

361
Q

39) Which of the following is used to process certificates and private/public key information?

A

B) Secure Sockets Layer/Transport Layer Security

362
Q

39) Which of the following provides a financial snapshot of a company’s assets and liabilities (debts) on a given date?

A

C) balance sheet

363
Q

4) All of the following statements about the MOTO sector are true except:

A

B) the MOTO sector is also referred to as the specialty store sector.

364
Q

4) By 2020, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?

A

D) 113 billion

365
Q

4) In 2017, the various entertainment industries together accounted for about __% of total media industry revenues, while the print media industries collectively accounted for about ___%.

A

B) 76%, 24%

366
Q

4) In developing an e-commerce presence, what questions must be asked and answered about the firm’s target audience?

A

Answer: Without a clear understanding of a firm’s target audience, it is difficult to develop a successful e-commerce presence. There are two primary questions: who is the target audience and where can they best be reached? A target audience can be described in several ways: demographics, behavior patterns (lifestyle), current consumption patterns (online vs. offline purchasing), digital usage patterns, content creation preferences (blogs, social networks, sites like Pinterest), and buyer personas (profiles of your customer). Understanding the demographics of the firm’s target audience is usually the first step. Demographic information includes age, income, gender, and location.

367
Q

4) PredictWallStreet is an example of a(n):

A

A) interest-based social network.

368
Q

4) The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.

A

Answer: FALSE

369
Q

4) What is the approximate Internet penetration rate for individuals that have attained less than a high-school education?

A

B) 65%

370
Q

4) What is the first step in analyzing an ethical dilemma?

A

D) Identify and describe the facts.

371
Q

4) Which element of the business model refers to the presence of substitute products in the market?

A

B) competitive environment

372
Q

4) Which of the following is an example of an integrity violation of e-commerce security?

A

D) An unauthorized person intercepts an online communication and changes its contents.

373
Q

4) Which of the following terms refers to the links that connect business firms with one another to coordinate production?

A

A) supply chain

374
Q

40) All of the following are solutions to the problem of high monitoring costs except:

A

A) seller rating systems.

375
Q

40) All of the following statements about e-commerce in the United States in 2018 are true except:

A

A) social e-commerce generated more revenue than mobile e-commerce.

376
Q

40) In the subscription revenue model, a company primarily generates income from the display of ads.

A

Answer: FALSE

377
Q

40) The existence of substitute products is a key industry strategic factor.

A

Answer: TRUE

378
Q

40) The highest amount of online advertising spending is for online video ads.

A

Answer: FALSE

379
Q

40) The main objective of the GDPR is to strengthen the rights of citizens to their own personal information and to strengthen oversight of firms to ensure that they implement these individual rights.

A

Answer: TRUE

380
Q

40) What is the Internet of Things (IoT) and what security issues and challenges does it raise?

A

Answer: The Internet of Things (IoT) involves the use of the Internet to connect a wide variety of sensors, devices, and machines, and is powering the development of a multitude of smart connected things, such as home electronics (smart TVs, thermostats, home security systems, and more). IoT also includes connected cars, medical devices and industrial equipment that supports manufacturing, energy, transportation, and other industrial sectors.Unfortunately, IoT raises a host of security issues similar to existing security challenges, but even more challenging, given the need to deal with a wider range of devices, operating in a less controlled, and global environment. In a world of connected things, the devices, the data produced and used by the devices, and the systems and applications supported by those devices, can all potentially be attacked. For instance, many IoT devices, such as sensors, are intended to be deployed on a much greater scale than traditional Internet-connected devices, creating a vast quantity of interconnected links that can be exploited. Existing tools, methods, and strategies need to be developed to deal with this unprecedented scale. Many instances of IoT consist of collections of identical devices that all have the same characteristics, which magnifies the potential impact of security vulnerabilities.Many IoT devices are anticipated to have a much longer service life than typical equipment, which raises the possibility that devices may “outlive” the manufacturer, leaving them without long-term support that creates persistent vulnerabilities. Many IoT devices are intentionally designed without the ability to be upgraded, or the upgrade process is difficult, which raises the possibility that vulnerable devices cannot or will not be fixed, leaving them perpetually vulnerable. Many IoT devices do not provide the user with visibility into the workings of the device or the data being produced, nor alert the user when a security problem arises, so users may believe an IoT device is functioning as intended when in fact, it may be performing in a malicious manner. Finally, some IoT devices, such as sensors, are unobtrusively embedded in the environment such that a user may not even be aware of the device, so a security breach might persist for a long time before being noticed.

381
Q

40) Which of the following is not an example of a native digital news site?

A

D) USA Today

382
Q

40) Which of the following social networks allows a user to buy products directly on its site and pay with Apple Pay?

A

C) Pinterest

383
Q

40) Which of the following statements about cloud-based B2B systems is not true?

A

A) Much of the expense of the system is shifted from the B2B network provider to the firm.

384
Q

40) Which of the following would you use to verify that links on web pages are valid?

A

D) site management tools

385
Q

41) ________ is a method for ensuring that suppliers precisely deliver ordered parts at a specific time and to a particular location.

A

B) Tight coupling

386
Q

41) All of the following are examples of open source CMSs except:

A

D) WordPress

387
Q

41) Define the term economic viability and explain the factors involved in assessing a firm’s economic viability.

A

Answer: Economic viability refers to the ability of a firm to survive during a specified time period as a profitable business firm. To analyze the economic viability of a firm, both strategic and financial assessments are conducted.Strategic approaches to economic viability focus on both the industry in which a firm operates and the firm itself. Industry factors to examine include barriers to entry, which are expenses such as high capital costs, or intellectual property such as patents or copyrights held by other firms, and make it difficult for new entrants to join the industry.The power of the suppliers and power of the customers in the industry must also be considered. If suppliers are sufficiently powerful, they can charge higher prices, whereas if the manufacturers or retailers are more powerful, they can bargain effectively for lower prices from their suppliers. The relative power of the customers determines whether they will be able to shop among the firm’s competitors, thus keeping prices down. The existence of substitute products in an industry can also drive prices down if consumers have access to products with a similar function that they determine will fill their needs just as adequately. The industry value chain must be evaluated to determine if the chain of production and distribution for the industry is changing in ways that will benefit or harm the firm. Finally, the nature of the intra-industry competition must be evaluated to determine if the competition within the industry is based on differentiated products and services, price, the scope of the offerings or the focus of the offerings, and whether any imminent changes in the nature of the competition will benefit or harm the firm.The strategic factors to analyze include the firm value chain, the core competencies of the firm, the synergies available to the firm, the technology used by the firm, and the social and legal challenges facing the firm. The firm value chain must be evaluated to determine if the firm has adopted business systems that will enable it to operate at peak efficiency and whether there are any looming technological changes that might force the firm to change its processes or methods. The core competencies of a firm are its unique skills that cannot be easily duplicated. When analyzing the economic viability of a firm it is important to consider whether technological changes might invalidate these competencies. Synergies refer to the availability to the firm of the competencies and assets of related firms that it owns or with which it has formed strategic partnerships. The firm’s current technology must be evaluated to determine if it has proprietary technologies that will allow it to scale with demand and if it has developed the customer relationship, fulfillment, supply chain management, and human resources systems that it will need to be viable. Finally, the social and legal challenges facing the firm should be examined to determine if the firm has considered consumer trust issues such as the privacy and security of personal information and if the firm may be vulnerable to legal challenges.The financial factors to analyze are the firm’s revenues, cost of sales, gross margin, operating expenses, operating margin, and net margin. Revenues must be examined to determine if they are growing and at what rate. Cost of sales is the cost of the products sold including all related costs. The lower the cost of sales compared to revenue, the higher the gross profit. Gross margin is calculated by dividing gross profit by net sales. If the gross margin is improving consistently, the economic outlook for the firm is enhanced. Operating expenses such as marketing, technology, and administrative costs should be evaluated to determine if the firm’s needs in the near interim will necessitate increased outlays. Large increases in operating expenses may result in net losses for the firm. Operating margin tells us if the firm’s current operations are covering its operating expenses, not including interest expenses and other non-operating expenses. Net margin is calculated by dividing net income or net loss by net sales. It evaluates the net profit or loss for each dollar in sales. For example, a net margin of 12% indicates that a firm is making 12 cents on each dollar in sales. These figures can be found on a firm’s consolidated statement of operations and summary balance sheet. A thorough strategic and financial analysis will often reveal the true economic prospects for a firm in the near to medium term.

388
Q

41) Define the terms tiger team, white hat, black hat, and grey hat and discuss the difference between them.

A

Answer: Groups of hackers called tiger teams are sometimes used by corporate security departments to test their own security measures. By hiring hackers to break into the system from the outside, the company can identify weaknesses in the computer system?s armor. These ?good hackers? became known as white hats because of their role in helping organizations locate and fix security flaws. White hats do their work under contract, with agreement from the target firms that they will not be prosecuted for their efforts to break in. Hardware and software firms such as Apple, Microsoft, Intel, HP, and many others pay bounties of ,000 to ,000 to white hat hackers for discovering bugs in their software and hardware.In contrast, black hats are hackers who engage in the same kinds of activities but without pay or any buy-in from the targeted organization, and with the intention of causing harm. They break into websites and reveal the confidential or proprietary information they find. These hackers believe strongly that information should be free, so sharing previously secret information is part of their mission.Somewhere in the middle are the grey hats, hackers who believe they are pursuing some greater good by breaking in and revealing system flaws. Grey hats discover weaknesses in a system?s security, and then publish the weakness without disrupting the site or attempting to profit from their finds. Their only reward is the prestige of discovering the weakness. Grey hat actions are suspect, however, especially when the hackers reveal security flaws that make it easier for other criminals to gain access to a system.

389
Q

41) Evidence suggests that real-time customer chat increases the dollar value of transactions.

A

Answer: TRUE

390
Q

41) In 2018, about ________ of Americans accessed the Internet solely via a mobile device.

A

B) 16%

391
Q

41) The Jumpstart Our Business Startups (JOBS) Act, and issuance of enabling regulations by the Securities and Exchange Commission, allows a start-up company to use crowdfunding to solicit investors to invest in small and early-stage startups.

A

Answer: TRUE

392
Q

41) The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

A

Answer: TRUE

393
Q

41) Which of the following involves using a variety of tools to encourage users to interact with content and brand?

A

B) engagement

394
Q

41) Which of the following magazines underwent a digital remaking following the introduction of a metered paywall in 2014?

A

B) The New Yorker

395
Q

41) Which of the following types of auctions “shields the brand” of the seller?

A

B) Name Your Own Price auction

396
Q

42) Advantages of dynamic page generation include all of the following except:

A

D) client-side execution of programming.

397
Q

42) Consumers tend to look at native ads more frequently than they look at display ads.

A

Answer: TRUE

398
Q

42) The Federal Communications Commission’s privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017.

A

Answer: TRUE

399
Q

42) What is a sniffing attack and how does it differ from a MitM attack?

A

Answer: A sniffer is a type of eavesdropping program that monitors information traveling over a network. When used legitimately in a sniffing attack, hackers use sniffers to steal proprietary information from a network, including passwords, e-mail messages, company files, and confidential reports. A man-in-the-middle (MitM) attack also involves eavesdropping but is more active than a sniffing attack, which typically involves passive monitoring. In a MitM attack, the attacker can intercept communications between two parties who believe they are directly communicating with one another, when in fact the attacker is controlling the communications.

400
Q

42) Which of the following allows the consumer to enter a maximum price and the auction software automatically places incremental bids, up to that maximum price, as their original bid is surpassed?

A

B) proxy bidding

401
Q

42) Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?

A

C) amplification

402
Q

42) Which of the following is not a major business trend in e-commerce in 2018-2019?

A

B) Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

403
Q

42) Which of the following is not an example of a virtual merchant?

A

D) Dell

404
Q

42) Which of the following is the most common model for online newspaper access for U.S. newspapers with circulations over 50,000?

A

D) metered subscription model

405
Q

42) Why is the management team such an important element of a business model?

A

Answer: A strong management team gives a model instant credibility to outside investors, immediate market-specific knowledge, and experience in implementing business plans. A strong management team may not be able to salvage a weak business model, but the team should be able to change the model and redefine the business as it becomes necessary.

406
Q

43) ________ occurs when sellers agree informally or formally to set floor prices below which they will not sell on auction items.

A

B) Price matching

407
Q

43) A(n) ________ system continuously links the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating order entry systems.

A

D) SCM

408
Q

43) Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.

A

Answer: Malicious code includes a variety of threats such as viruses, worms, Trojan horses, ransomware, and bot programs. A virus is a computer program that can replicate or make copies of itself and spread to other files. Viruses can range in severity from simple programs that display a message or graphic as a “joke” to more malevolent code that will destroy files or reformat the hard drive of a computer, causing programs to run incorrectly. Worms are designed to spread not only from file to file but from computer to computer and do not necessarily need to be activated in order to replicate. A Trojan horse is not itself a virus because it does not replicate but it is a method by which viruses or other malicious code can be introduced into a computer system. It appears benign and then suddenly does something harmful. For example, it may appear to be only a game and then it will steal passwords and mail them to another person. A backdoor is a feature of worms, viruses, and Trojans that allow attackers to remotely access compromised computers. Ransomware is a type of malware (often a worm) that locks your computer or files to stop you from accessing them. Bot programs are a type of malicious code that can be covertly installed on a computer when it is attached to the Internet. Once installed, the bot responds to external commands sent by the attacker, and many bots can be coordinated by a hacker into a botnet.

409
Q

43) Lead generation marketing firms specialize in inbound marketing.

A

Answer: TRUE

410
Q

43) Omni-channel merchants are also referred to as:

A

B) bricks-and-clicks companies.

411
Q

43) The TrustArc program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information, and to make it more likely that appropriate ads are shown to users.

A

Answer: FALSE

412
Q

43) Which of the following cannot be used to retrieve objects from a database?

A

D) HTML

413
Q

43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

A

D) Open Graph

414
Q

43) Which of the following is not a major technology trend in e-commerce in 2018-2019?

A

D) Growth of the Internet of Things slows down.

415
Q

43) Which of the following statements about the online newspaper audience is not true?

A

B) Online readership of newspapers is growing at more than 30% a year

416
Q

43) Who are the e-commerce enablers and why are they important?

A

Answer: E-commerce enablers provide the hardware, operating system software, networks and communications technology, applications software, web design, consulting services, and other tools required for e-commerce. While these firms may not be conducting e-commerce per se (although in many instances, e-commerce in its traditional sense is in fact one of their sales channels), as a group they have perhaps profited the most from the development of e-commerce.

417
Q

44) ________ is a subscription-based retailer using predictive marketing and Big Data?

A

B) Stitch Fix

418
Q

44) All of the following are major social trends in e-commerce in 2018-2019 except for:

A

C) concerns about the U.S. Supreme Court ruling that online businesses do not need to collect state sales tax.

419
Q

44) Collaborative commerce systems:

A

D) foster sharing sensitive internal information with suppliers and purchasers.

420
Q

44) Define elevator pitch and describe its key elements.

A

Answer: An elevator pitch is a short two-to-three-minute presentation aimed at convincing investors to invest. The key elements of an elevator pitch are an introduction, in which you state your name and position, your company’s name and a tagline in which you compare what your company does to a well-known company; background, in which you state the origin of your idea, and the problem you are trying to solve, the industry size/market opportunity, in which you provide brief facts about the size of the market; revenue model/numbers/growth metrics, in which you provide insight into your company’s revenue model and results thus far, how fast it is growing, and early adopters, if there are any; funding, in which you state the amount of funds you are seeking and what it will help you achieve; and finally exit strategy, in which you explain how your investors will achieve a return on their investment.

421
Q

44) Facebook’s Messenger app allows users to make payments to advertisers via Stripe or PayPal without having to leave the app.

A

Answer: TRUE

422
Q

44) In what ways has the European environment turned against American firms such as Facebook and Google?

A

Answer: The EU General Data Protection Regulation (GDPR) is clearly aimed at Facebook, Google, Twitter, and other ad-based online businesses that build collections of personal data by tracking individuals across the Web, merging that data with data from firms and data brokers in order to build comprehensive digital images (profiles) and to target these persons with ads. Google and Facebook are both extremely popular in Europe, and dominate their markets, but at the same time are widely criticized for invading privacy and not protecting PII. European regulators and politicians point to Facebook allowing Cambridge Analytica, a political consulting firm, to gain access to over 100 million user accounts in 2016 and a 2018 data breach of 50 million Facebook accounts as evidence that Facebook is unable to protect the privacy of Europeans. Google is also in the cross-hairs of EU regulators for its monopoly on search in the EU, abuse of that monopoly by ranking Google services above others on its search pages, and abuse of its ownership of the Android operating system by requiring smartphone manufacturers to pre-install Google apps on Android phones, as well as evading taxes on revenues earned in EU countries. Both firms, along with Microsoft?s Windows 10 operating system, are accused of ?deceit by design? through the use of threats against users who choose strong privacy protections on their services, and screen designs that encourage users to give up as much personal information as possible.

423
Q

44) Next generation firewalls provide all of the following except:

A

C) the ability to automatically update applications with security patches.

424
Q

44) The top four display ad companies together account for almost 60% of U.S. display ad revenues.

A

Answer: TRUE

425
Q

44) Which of the following monitors and controls access to a main web server, and implements firewall protection?

A

A) proxy server

426
Q

44) Which of the following types of auctions is perfect for sellers that have many identical items to sell?

A

C) Dutch Internet auctions

427
Q

44) Who was the first major fiction writer to create an e-book-only volume of a new work?

A

B) Stephen King

428
Q

45) All of the following types of auctions involve single units except:

A

B) a Dutch Internet auction.

429
Q

45) Asymmetric key cryptography is also known as:

A

A) public key cryptography.

430
Q

45) Define organizational development and describe its importance in relation to the implementation of a business plan and strategy.

A

Answer: Organizational development is a plan that describes how the company will organize the work that needs to be accomplished in the business plan or strategy. Typically, work is divided into functional departments, such as production, shipping, marketing, customer support, and finance. Jobs within these functional areas are defined, and then recruitment begins for specific job titles and responsibilities. Typically, in the beginning, generalists who can perform multiple tasks are hired. As the company grows, recruiting becomes more specialized. For instance, at the outset, a business may have one marketing manager. But after two or three years of steady growth, that one marketing position may be broken down into seven separate jobs done by seven individuals.All firms ? new ones in particular ? need an organization to efficiently implement their business plans and strategies. Many e-commerce firms and many traditional firms that attempt an e-commerce strategy have failed because they lacked the organizational structures and supportive cultural values required to support new forms of commerce.

431
Q

45) Facebook’s Search functionality includes everyone’s public posts, Likes, photos, and interests, and makes them available to all users of Facebook, even those who are not friends.

A

Answer: TRUE

432
Q

45) How is it possible to measure the strength of privacy policies?

A

Answer: Very little attention has been paid to measuring the strength of privacy policies for individual companies, comparing them to other companies, and understanding how privacy policies have changed over time at a specific company. However, researchers have developed a measure of privacy policies by applying 10 privacy policy principles when reviewing policies. These principles are as follows:? Can the privacy policy be easily found, reviewed, and understood by users?? Does the privacy policy fully disclose how personal information will and will not be used by the organization? Is information about users ever shared or sold without users’ explicit permission?? Can users decide if they want to participate?? Can users decide and actively indicate that they agree to be profiled, tracked, or targeted?? Can users decide how and if their sensitive information is shared?? Are users able to change any information that they input about themselves?? Can users decide who can access their information?? Are users notified promptly if their information is lost, stolen, or improperly accessed?? Can users easily report concerns and get answers?? Do users receive a copy of all disclosures of their information?The dimensions are measured on a four-point scale from 0 to 4 (0 meaning the privacy policy fails to meet the criterion and 4 indicating the criterion was fully achieved).

433
Q

45) The concept of “customer satisfaction” is broader than the concept of “customer experience.”

A

Answer: FALSE

434
Q

45) Together Amazon and Apple account for ________ of the e-book market.

A

D) 92%

435
Q

45) Virtual merchants face potentially large costs for all of the following except:

A

B) building and maintaining physical stores.

436
Q

45) Which of the following is not a characteristic of the use of social networks in B2B e-commerce?

A

D) They are always private.

437
Q

45) Which of the following statements about the mobile platform is not true?

A

B) Over 220 Americans used tablet computer apps in 2018.

438
Q

45) Which of the following technologies is used to separate the design and presentation of content from the content creation process?

A

D) CMS

439
Q

46) A(n) ________, in which the highest bidder wins, is the most common form of auction.

A

C) English auction

440
Q

46) All of the following are important trends in B2B e-commerce in 2018-2019, except:

A

B) the migration of B2B hardware and software to cloud computing and cloud apps.

441
Q

46) All of the following statements about Amazon are true except:

A

A) in 2016, Amazon purchased Jet.com, one of its discount competitors.

442
Q

46) All the following statements about symmetric key cryptography are true except:

A

C) symmetric key cryptography is computationally slower.

443
Q

46) Around what percentage of Amazon’s top 100 selling e-books are now self-published?

A

D) 44%

444
Q

46) Bundling is the process of selling two or more products together for a price that is less than the sum of the two product’s individual prices.

A

Answer: TRUE

445
Q

46) Describe the fantasy sport business and the issues it raises.

A

Answer: Two firms dominate the online fantasy sports market: DraftKings and FanDuel. Both firms advertise heavily during college and professional sports games. In fantasy sports, players assemble their ideal fantasy teams, drafting real-life athletes to their team, and then, based on the performance of those players in real games, they can win significant prizes. The most popular sports are college football and basketball, and professional football and baseball. Players are given a budget that they can use to draft players, and some of the combined fees for each game make up the pool for which players compete. Entry fees range widely from less than a dollar, to over ,000. Fantasy sports were exempted from the Unlawful Internet Gambling Enforcement Act of 2006 (UIGEA) under industry pressure from the then much smaller fantasy sports business. The industry argued that fantasy sports are not gambling, but instead games of skill like chess or Scrabble.As the industry has grown to billion-dollar venture capital valuations, however, and with allegations of cheating customers, deceptive practices, lack of transparency, and insider irregularities, state and federal legislators are holding hearings and considering regulations. In 2015, the New York State attorney general told both DraftKings and FanDuel to stop taking entries from New York State residents because, in the state’s opinion, their operations constituted illegal gambling and the sites engaged in false and misleading advertising. Citibank cut off credit card processing for both sites.After lengthy legislative hearings and strong support from sports fans, New York reversed its position, agreeing that when played fairly, fantasy sports is a game of skill, not gambling. The governor signed legislation legalizing fantasy sports as a state regulated industry, claiming it would add billion to the state’s education fund. The sites also agreed to pay million in fines. In November 2016, DraftKings and FanDuel proposed to merge. Together the two companies control more than 90% of the U.S. market. In June 2017, the FTC, along with the attorneys general of California and the District of Columbia, sued to block the merger and in July 2017 the companies decided to abandon the plan.

446
Q

46) Facebook does not sell display ads.

A

Answer: FALSE

447
Q

46) First movers often fail because:

A

B) they lack complementary resources needed to sustain their advantages.

448
Q

46) MySQL is which of the following?

A

A) open source database software

449
Q

46) Which of the following describes the basic web policy of large firms during the Invention period?

A

D) Maintain a basic, static website depicting the firm’s brand.

450
Q

47) According to Amazon, around how many indie authors have sold more than 1 million copies of their books?

A

B) 100

451
Q

47) All of the following are basic functionality provided by e-commerce merchant server software except:

A

B) marketing analytics.

452
Q

47) All of the following are challenges faced by bricks-and-clicks firms except:

A

D) building a brand name.

453
Q

47) All of the following use an advertising revenue model except:

A

D) Walmart.

454
Q

47) Brand pages on Facebook typically attract more visitors than a brand’s website.

A

Answer: TRUE

455
Q

47) Define privacy, information privacy, the right to be forgotten, and informed consent.

A

Answer: Privacy is the moral right of individuals to be left alone, free from surveillance or interference from other individuals including the state.Information privacy includes both the right to prohibit certain information from being collected by either governments or businesses, and the right to control the use of whatever information is collected about you. The core concept is the control of your own personal information.The right to be forgotten is the claim of individuals to be able to edit and delete personal information online.Informed consent means that an individual has knowledge of all the material facts needed to make a rational decision and consent has been given to collect information. In the United States, business firms and government agencies can gather transaction data from the marketplace and use it for other marketing purposes without the informed consent of the individual. In Europe, on the other hand, this is illegal. European businesses can only use transaction data to support the current transaction if they have asked for and received the informed consent of the individual.

456
Q

47) EDI document structures are defined by:

A

C) industry committees.

457
Q

47) How are blogs being used for marketing?

A

Answer: Blogs have been around for a decade and are a part of the mainstream online culture. Around 30 million people write blogs, and around 84 million read blogs. Blogs play a vital role in online marketing. Although more firms use Twitter and Facebook, these sites have not replaced blogs, and in fact often point to blogs for long-form content. Because blog readers and creators tend to be more educated, have higher incomes, and be opinion leaders, blogs are ideal platforms for ads for many products and services that cater to this kind of audience. Because blogs are based on the personal opinions of the writers, they are also an ideal platform to start a viral marketing campaign. Advertising networks that specialize in blogs provide some efficiency in placing ads, as do blog networks, which are collections of a small number of popular blogs, coordinated by a central management team, and which can deliver a larger audience to advertisers.

458
Q

47) It is estimated that by 2022, the size of the B2B market will reach:

A

D) 7.3 trillion.

459
Q

47) Priceline is an example of a(n):

A

D) Name Your Own Price auction.

460
Q

47) The Data Encryption Standard uses a(n) ________-bit key.

A

B) 56

461
Q

48) ________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.

A

A) Application servers

462
Q

48) ________ was sued by the Justice Department for violating antitrust laws in connection with e-books.

A

C) Apple

463
Q

48) A(n) ________ supply chain is one in which the labor conditions in low-wage, underdeveloped producer countries are visible and morally acceptable to ultimate consumers in more developed industrial societies.

A

D) accountable

464
Q

48) All of the following are challenges for catalog merchants except:

A

D) building sophisticated order entry and fulfillment systems.

465
Q

48) All of the following statements about public key cryptography are true except:

A

B) public key cryptography ensures authentication of the sender.

466
Q

48) Discuss the Authors Guild’s lawsuit against Google with respect to Google’s Library Project and explain why the courts ultimately ruled in Google’s favor.

A

Answer: Google’s Library Project involved an effort by Google to scan all the books in several university and public libraries, and then make snippets and parts of the book available online without receiving permission from the publishers or paying royalties. Google said it would never show a full page, just relevant portions of a page in response to searches. In 2005, the Authors Guild and the large book publishers filed a lawsuit seeking to prevent Google from implementing the Library Project. Google argued that the Library Project constituted fair use of publishers’ copyrighted works because it only published snippets. Moreover, Google claimed that it was simply helping libraries do what they are intended to do, namely, lend books. Library lending is considered a fair use following an agreement in the late 1930s with publishers, and such lending was codified into the Copyright Act of 1976. Google claimed that helping libraries make books more available to the public was in the broader public interest and extended existing rights of libraries to encourage book availability. In 2013, a federal court finally found in favor of Google without reservation by ruling that Google’s scanning and making snippets of text available to the public was “fair use” under U.S. copyright law. The judge believed the project had a broad public purpose of making it easier for students, researchers, teachers, and the general public to find books, while also preserving consideration for author and publisher rights. The Google project was “transformative” in the court’s view, giving books a new character and purpose, making it easier to discover old books, and leading to increased sales. The Supreme Court ruled in 2016 that Google’s Library Project was fair use, and the matter is settled from a legal perspective. In the meantime, the project itself has stalled, and efforts to scan so-called orphan books in libraries where the copyright holder could not be identified have ended. Google now appears less than enthusiastic about pursuing the project, in part, analysts believe, because the project offered no hope of ever making a return on the investment and created a rift with the author and publishing community upon which it depends for content against which to show ads.

467
Q

48) How do the Interactive Advertising Bureau?s new standard ad unit portfolio and guidelines released in July 2017 differ from its earlier guidelines for display ads.

A

Answer: For many years, IAB categorized display ads based on fixed pixel sizes, such as a medium rectangle (300 x 250 pixels), large rectangle (336 x 280 pixels), leaderboard (728 x 90 pixels), and half-page (300 x 600 pixels) (the top performing sizes, according to Google). However, in July 2017, the IAB released the final version of its new standard ad unit portfolio, based on aspect ratio and size range, rather than fixed pixel size, allowing for flexible sizing and delivery of a more consistent ad experience across multiple screen sizes and devices. Ad types are now identified as horizontal (typically placed at the top or bottom of the screen), vertical (typically placed on the right or left edge of the screen), tiles (typically placed in a grid layout), or full page (which cover the full screen of the device in either a portrait or landscape layout). The guidelines are based on HTML5 technology and cover all types of display ads, as well as new ad experiences such as augmented reality, virtual reality, 360-degree ads, and emoji ads, among others. Another important aspect of the new guidelines is their incorporation of LEAN principles. LEAN is an acronym that stands for lightweight, encrypted, AdChoices-supported, and non-invasive advertising. In an attempt to enhance consumer acceptance of advertising, the standard contains guidelines with respect to animations, ad expansions, close buttons, user initiation, interstitials (ads that appear before, in-between, or after the primary content), video and auto-play video and audio. LEAN also includes a list of disruptive ad experiences that are no longer permitted, such as pop-up ads (ads that overlay or cover the content after the user has started viewing the content), auto expansion (ads that expand without user initiation), auto-play video with audio, and flashing animations.

468
Q

48) Promoted Video is the source of over 50% of Twitter?s ad revenue.

A

Answer: TRUE

469
Q

48) Which of the following is not considered a portal?

A

C) Amazon

470
Q

48) Which of the following is not one of the top factors a business should consider when planning an Internet auction?

A

C) location of auction

471
Q

48) Which of the following statements about the Web is not true?

A

A) The Web is the technology upon which the Internet is based.

472
Q

49) ________ production is a set of production methods that focuses on the elimination of waste throughout the customer value chain.

A

C) Lean

473
Q

49) All of the following are features of WPA3 except:

A

B) it enables the creation of a VPN.

474
Q

49) Discuss the changes that Google has made to its search algorithms to improve search results and user experience.

A

Answer: Google makes frequent changes to their search algorithms to improve search results and user experience. Google, for instance, reportedly makes over 600 search engine changes in a year. Most are small unannounced tweaks. Recent major changes have included Panda, Penguin, Hummingbird, Knowledge Graph, an unnamed algorithm that has been nicknamed Mobilegeddon, and Possum. Panda was introduced in 2011 to weed out low quality sites from search results. Those sites with thin content, duplicate content, content copied from elsewhere on the Web, and content that did not attract high-quality hits from other sources were systematically pushed down in the search results. Google introduced Penguin in 2012 to punish websites and their SEO marketing firms who were manipulating links to their site in order to improve their rankings. The Google search engine rewards sites that have links from many other sites. What some marketers discovered is that Google could not tell the quality of these back links, and they began to manufacture links by putting their clients onto list sites, creating multiple blogs to link to their clients’ site, and paying others to link to their clients’ sites. Penguin evaluates the quality of links to a site and pushes down in the rankings those sites that have poor-quality back links. Google introduced Hummingbird in September 2013. Rather than evaluate each word separately in a search, Google’s semantically informed Hummingbird will try to evaluate an entire sentence.Semantic search more closely follows conversational search, or search as you would ordinarily speak it to another human being. Google introduced Knowledge Graph in 2012 as an effort to anticipate what you might want to know more about as you search on a topic or answer questions you might not thought of asking. Since 2013, results of Knowledge Graph appear on the right of the screen and contain more information about the topic or person you are searching on. Not all search terms have a Knowledge Graph result. Google displays information based on what other users have searched for in the past, as well as its database on over 500 million objects (people, places, and things), and some 18 billion facts. In 2015, Google released a new algorithm update (nicknamed Mobilegeddon) that made the “mobile-friendliness” of websites a much stronger ranking factor for mobile searches. Websites that are not optimized for mobile now have a much lower ranking in mobile search results. Starting in November 2015, Google also began lowering the search rank of mobile websites that display an ad that obscures the screen and asks users whether they would like to install the site’s mobile app, because such ads are less mobile-friendly. In 2016, Google introduced Possum, an algorithm update that varies search results based on the user’s location; so, for example, the closer a user is to a business’s address, the more likely it is to appear among the local results. In 2017, Google released the Fred algorithm, which targets websites that violate Google’s guidelines, primarily blogs with low-value, ad-centered content. Throughout 2018, Google also released several unnamed core algorithm updates, about which it did not provide many details.

475
Q

49) How does Apple?s Intelligent Tracking Prevention (ITP) technology work?

A

Answer: ITP uses machine learning techniques in the browser (not on a central server) to identify which cookies represent a tracking threat and prevents them from communicating with their servers, disarming them. Safari notifies the user when a cookie attempts to connect to a third-party server, asking users if they want to allow it. If tracking cookies make three attempts to communicate with external servers in 24 hours despite user choices, they are eliminated from the browser.

476
Q

49) In 2017, book publishing revenues:

A

C) experienced a sizeable decrease.

477
Q

49) In 2018, there were more than ________ Internet hosts.

A

D) 1 billion

478
Q

49) Pinterest’s users are predominantly women.

A

Answer: TRUE

479
Q

49) Portals primarily generate revenue in all of the following ways except:

A

C) sales of goods.

480
Q

49) The profit a seller makes at auction is a function of all of the following except:

A

D) watch lists.

481
Q

49) The term supply-push refers to:

A

A) making products prior to orders being received based on estimated demand.

482
Q

49) Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

A

B) ODBC

483
Q

5) ________ is the ability to ensure that an e-commerce site continues to function as intended.

A

C) Availability

484
Q

5) A website designed around a community of members who self-identify with a demographic or geographic category is classified as a(n):

A

B) affinity community.

485
Q

5) All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except:

A

D) targeted banner ads.

486
Q

5) All of the following were factors that precipitated the growth of MOTO except:

A

B) the growth of the cellular phone industry.

487
Q

5) Automated order entry systems:

A

A) show goods from a single seller.

488
Q

5) By 2020, spending on social marketing will triple the amount spent on mobile marketing.

A

Answer: FALSE

489
Q

5) E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers.

A

Answer: TRUE

490
Q

5) What are the phases, activities, and milestones for developing an e-commerce presence for a typical start-up website over a one-year period?

A

Answer: A one-year e-commerce presence timeline might include the following phases, activities, and milestones. Phase 1/Planning, in which an e-commerce presence would be envisaged and personnel developed, with a milestone of creating a mission statement; Phase 2/Website development, in which content would be acquired, a site design developed, and hosting arranged for the site, with a milestone of creating a website plan; Phase 3/Web implementation, in which keywords and metatags would be developed, search engine optimization strategies deployed, and potential sponsors identified, with a creation of a functional website as the milestone; Phase 4/Social media plan, in which appropriate social platforms and content for products and services would be identified, with the creation of a social media plan as the milestone; Phase 5/Social media implementation, in which a Facebook, Twitter, Pinterest and other social media presence would be developed, with a functioning social media presence as the milestone; and Phase 6/Mobile plan, in which a mobile plan would be developed with options for porting the website to the mobile platform considered, and with a mobile media plan as the relevant milestone. Phase 6/Mobile plan might also be the first phase for a firm that wanted to employ mobile first design.

491
Q

5) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A

C) the Collective Utilitarian principle

492
Q

5) Which of the following are Amazon’s primary value propositions?

A

B) selection and convenience

493
Q

5) Which of the following statements about Millennials is not true?

A

B) Millennials overwhelmingly prefer e-books to printed books.

494
Q

50) ________ is defined as the use of digital technologies to permit organizations to work together to design, develop, build, and manage products through their life cycles.

A

D) Collaborative commerce

495
Q

50) ________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.

A

C) Herd behavior

496
Q

50) All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:

A

B) high cost structures.

497
Q

50) All of the following can be considered a precursor to e-commerce except:

A

A) the development of the smartphone.

498
Q

50) All of the following statements about PKI are true except:

A

C) PKI guarantees that the verifying computer of the merchant is secure.

499
Q

50) In 2018, Millennials made up almost 65% of Snapchat’s monthly active U.S. users.

A

Answer: FALSE

500
Q

50) The basic value proposition of community providers is:

A

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.