E-Commerce Midterm Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

flashcard set

Earn XP

Description and Tags

Chapters 1-5

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

Which of the following is an example of e-business?

Amazon's Pinterest page

The Amazon.com website

Amazon's inventory control system

An Amazon mobile app

Amazon's inventory control system

2
New cards

(T/F) Price dispersion has been eliminated in e-commerce.

False

3
New cards

E-commerce is available just about everywhere and anytime. This is known as:

information density.

ubiquity.

richness.

reach.

Ubiquity

4
New cards

Which of the following is not true regarding e-commerce today?

The market middlemen disappeared.

There remains considerable persistent price dispersion.

Economists' visions of a friction-free market have not been realized.

Consumers are less price-sensitive than expected.

The market middlemen disappeared.

5
New cards

________ was the first truly large-scale digitally enabled transaction system in the B2C arena.

The Baxter Healthcare system

Telex

The French Minitel

Electronic Data Interchange (EDI)

The French Minitel

6
New cards

Which of the following refers to any disparity in relevant market information among parties in a transaction?

imperfect competition

information asymmetry

dynamic pricing

unfair competitive advantage

information asymmetry

7
New cards

Which of the following can be considered synonymous with the term e-commerce?

the Internet

the Web

e-business

digital commerce

Digital commerce

8
New cards

(T/F) B2B e-commerce is the largest type of e-commerce.

True

9
New cards

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

social e-commerce

consumer-to-consumer (C2C)

business-to-business (B2B)

mobile e-commerce

mobile e-commerce

10
New cards

(T/F) The Internet is a worldwide system of computer networks.

True

11
New cards

All of the following are platforms for C2C e-commerce except:

Etsy.

Facebook Marketplace.

Craigslist.

Walmart.

Walmart

12
New cards

In which year can e-commerce be said to have begun?

2001

1995

1983

1985

1995

13
New cards

Which of the following is an example of an on-demand service company?

Tumblr

Facebook

YouTube

Airbnb

Airbnb

14
New cards

Which of the following statements about the Web is not true?

The Web was the original "killer app."

The Web is the technology upon which the Internet is based.

The Web is both a communications infrastructure and an information storage system.

The Web provides access to pages written in Hypertext Markup Language.

The Web is the technology upon which the Internet is based.

15
New cards

Which of the following is a leading platform for social e-commerce?

Wikipedia

Facebook

eBay

Amazon

Facebook

16
New cards

Which of the following is an example of an e-commerce first mover that failed?

Etsy

eBay

eToys

E* Trade

eToys

17
New cards

Business-to-consumer (B2C) e-commerce in the United States:

  • grew at double-digit rates between 2010 and 2018.

  • has less revenue than C2C e-commerce.

  • now constitutes over 50% of the overall U.S. retail market.

  • is growing more slowly as it confronts its own fundamental limitations.

grew at double-digit rates between 2010 and 2018.

18
New cards

(T/F) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

True

19
New cards

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

  • richness

  • personalization

  • information density

  • ubiquity

Richness

20
New cards

Which of the following describes the basic web policy of large firms during the Invention period?

Maintain a basic, static website depicting the firm's brand.

Use the Web to sell complex goods and services online.

Emphasize the necessity for the Web to generate profits.

Integrate social networks and the mobile platform with website marketing.

Maintain a basic, static website depicting the firm's brand.

21
New cards

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

  • Target

  • Walmart

  • Bluefly

  • Staples

Bluefly

22
New cards

(T/F) A company's strong linkages with its customers increase switching costs.

True

23
New cards

Which element of the business model refers to the presence of substitute products in the market?

  • value proposition

  • competitive environment

  • market opportunity

  • competitive advantage

Competitive environment

24
New cards

Stickiness is an important attribute for which of the following revenue models?

  • affiliate revenue model

  • transaction fee revenue model

  • advertising revenue model

  • subscription revenue model

advertising revenue model

25
New cards

(T/F) Slow followers are sometimes more successful than first movers.

True

26
New cards

Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

  • venture capital investors.

  • crowdfunders.

  • angel investors.

  • incubators.

Incubators

27
New cards

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

  • personalization

  • global reach

  • richness

  • interactivity

Global reach

28
New cards

First movers often fail because:

  • they lack complementary resources needed to sustain their advantages.

  • they are operating in a perfect market.

  • they fail to leverage their competitive assets.

  • their competitive advantage is unfair.

they lack complementary resources needed to sustain their advantages.

29
New cards

Which of the following are Amazon's primary value propositions?

  • selection and convenience

  • management of product delivery

  • reduction of price discovery cost

  • personalization and customization

selection and convenience

30
New cards

A ________ marketplace supplies products and services of interest to particular industries.

  • horizontal

  • vertical

  • differentiated

  • perfect

Vertical

31
New cards

A perfect market is one in which:

  • competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

  • one firm develops an advantage based on a factor of production that other firms cannot purchase.

  • one participant in the market has more resources than the others.

  • there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

32
New cards

Portals primarily generate revenue in all of the following ways except:

  • sales of goods.

  • collecting transaction fees.

  • charging advertisers for ad placement.

  • charging subscription fees.

sales of goods.

33
New cards

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

  • venture capitalists.

  • angel investors.

  • disruptors.

  • crowdfunders.

disruptors

34
New cards

Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

  • subscription revenue model

  • premium strategy

  • advertising revenue model

  • freemium strategy

freemium strategy

35
New cards

(T/F) In the subscription revenue model, a company primarily generates income from the display of ads.

False

36
New cards

All of the following can be considered a direct competitor of Priceline except:

  • Travelocity.

  • Expedia.

  • Orbitz.

  • ESPN.

ESPN

37
New cards

Which of the following is an unfair competitive advantage?

  • superior technology

  • lower product prices

  • brand name

  • access to global markets

brand name

38
New cards

________ and ________ are typically the most easily identifiable aspects of a company's business model.

  • Revenue model; market opportunity

  • Value proposition; revenue model

  • Competitive advantage; competitive environment

  • Market strategy; market opportunity

Value proposition; revenue model

39
New cards

In general, the key to becoming a successful content provider is to:

  • provide online content for free.

  • own the technology by which content is created, presented, and distributed.

  • own the content being provided.

  • provide other services as well as online content.

own the content being provided.

40
New cards

Which of the following does not use a subscription revenue model?

  • Twitter

  • Ancestry

  • eHarmony

  • Apple Music

Twitter

41
New cards

PayPal is an example of which of the following types of payment system?

  • digital checking system

  • digital credit card system

  • online stored value payment system

  • accumulating balance system

online stored value payment system

42
New cards

Accessing data without authorization on Dropbox is an example of a:

  • cloud security issue.

  • sniffing issue.

  • social network security issue.

  • mobile platform security issue.

cloud security issue.

43
New cards

Which dimensions of security is spoofing a threat to?

  • availability and authenticity

  • integrity and authenticity

  • availability and integrity

  • integrity and confidentiality

integrity and authenticity

44
New cards

All of the following are limitations of the existing online credit card payment system except:

  • cost to merchant.

  • social equity.

  • cost to consumers.

  • poor security.

cost to consumers.

45
New cards

Next generation firewalls provide all of the following except:

  • the ability to identify users regardless of the device or IP address.

  • the ability to automatically update applications on a client computer with security patches.

  • the ability to identify applications regardless of the port, protocol, or security evasion tools used.

  • an application-centric approach to firewall control.

the ability to automatically update applications on a client computer with security patches.

46
New cards

(T/F) A Trojan horse appears to be benign, but then does something other than expected.

True

47
New cards

The Data Encryption Standard uses a(n) ________-bit key.

  • 8

  • 56

  • 256

  • 512

56

48
New cards

Which of the following is an example of an integrity violation of e-commerce security?

  • A website is not actually operated by the entity the customer believes it to be.

  • A customer denies that he is the person who placed the order.

  • A merchant uses customer information in a manner not intended by the customer.

  • An unauthorized person intercepts an online communication and changes its contents.

An unauthorized person intercepts an online communication and changes its contents.

49
New cards

Which of the following was designed to cripple Iranian nuclear centrifuges?

  • Shamoon

  • Snake

  • Storm

  • Stuxnet

Stuxnet

50
New cards

Automatically redirecting a web link to a different address is an example of which of the following?

  • pharming

  • sniffing

  • DDoS attack

  • social engineering

pharming

51
New cards

What is the first step in developing an e-commerce security plan?

  • Perform a security audit.

  • Create a security organization.

  • Perform a risk assessment.

  • Develop a security policy.

Perform a risk assessment.

52
New cards

Which of the following dimensions of e-commerce security is not provided for by encryption?

  • confidentiality

  • message integrity

  • nonrepudiation

  • availability

availability

53
New cards

Asymmetric key cryptography is also known as:

public key cryptography.

54
New cards

Which of the following statements about blockchain is not true?

  • A blockchain system is a transaction processing system.

  • A blockchain system is inherently centralized.

  • A blockchain system is composed of a distributed network of computers.

  • Cryptocurrencies are based on blockchain technology.

A blockchain system is inherently centralized.

55
New cards

________ is the ability to ensure that e-commerce participants do not deny their online actions.

  • Authenticity

  • Nonrepudiation

  • Availability

  • Integrity

Nonrepudiation

56
New cards

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

  • a backdoor.

  • spyware.

  • a browser parasite.

  • adware.

spyware

57
New cards

(T/F) The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True

58
New cards

A digital certificate contains all of the following except the:

  • subject's private key.

  • digital signature of the certification authority.

  • digital certificate serial number.

  • subject's public key.

subject's private key.

59
New cards

________ typically attack governments, organizations, and sometimes individuals for political purposes.

  • Tiger teams

  • Hacktivists

  • Crackers

  • Bounty hunters

Hacktivists

60
New cards

Which of the following is the leading cause of data breaches?

  • hackers

  • theft of a computer

  • DDoS attacks

  • accidental disclosures

Hackers

61
New cards

In the address, which of the following is the top-level domain?

.com

62
New cards

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

  • client/server computing

  • IPv6

  • fiber optics

  • Wi-Fi

client/server computing

63
New cards

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

  • Web servers

  • packet servers

  • routers

  • IP servers

routers

64
New cards

A(n) ________ allows users to easily add and edit content on a web page.

  • wiki

  • blog

  • podcast

  • RSS feed

wiki

65
New cards

The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

  • Mozilla.

  • Internet Explorer.

  • Mosaic.

  • Netscape Navigator.

Mosaic

66
New cards

________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

  • Finger

  • Ping

  • Telnet

  • Tracert

Ping

67
New cards

Which of the following was the most popular web browser as of August 2018?

  • Internet Explorer

  • Safari

  • Firefox

  • Chrome

Chrome

68
New cards

The Transport Layer of TCP/IP is responsible for which of the following?

  • addressing, packaging, and routing messages

  • placing packets on and receiving them from the network medium

  • providing a variety of applications with the ability to access the services of the lower layers

  • providing communication with the application by acknowledging and sequencing the packets to and from the application

providing communication with the application by acknowledging and sequencing the packets to and from the application

69
New cards

The Web runs in which layer of Internet architecture?

  • Network Technology Substrate layer

  • Middleware Services layer

  • Transport Services and Representation Standards layer

  • Applications layer

Applications layer

70
New cards

When talking about the physical elements of the Internet, the term redundancy refers to:

  • multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

  • transmitting multiple copies of a single packet to safeguard against data loss.

  • delays in messages caused by the uneven flow of information through the network.

  • the use of tiered high-speed switching computers to connect the backbone to regional and local networks.

multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

71
New cards

The major technologies used with wireless local area networks are:

  • Bluetooth and 3G.

  • WiMax and 3G.

  • Wi-Fi and Bluetooth.

  • Wi-Fi and WiMax.

Wi-Fi and Bluetooth.

72
New cards

________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.

  • Client/server computing

  • Cloud computing

  • Mobile computing

  • P2P computing

Cloud computing

73
New cards

Which of the following is the core communications protocol for the Internet?

  • TLS

  • FTP

  • net

  • TCP/IP

TCP/IP

74
New cards

Which of the following was the original purpose of the Internet?

  • to enable government agencies to track civilian communications

  • to provide a network that would allow businesses to connect with consumers

  • to link large mainframe computers on different college campuses

  • to develop a military communications system that could withstand nuclear war

to link large mainframe computers on different college campuses

75
New cards

(T/F) A private cloud is operated for the benefit of multiple firms.

False

76
New cards

(T/F) The term latency refers to a delay that can be experienced in packet-switched networks.

True

77
New cards

Which of the following is not one of the basic technological foundations of the Internet?

  • TCP/IP

  • FTP

  • client/server computing

  • packet switching

FTP

78
New cards

Applications for Android operating system-based smartphones are typically written in which of the following?

  • ActiveX

  • Swift

  • ColdFusion

  • Java

Java

79
New cards

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

  • routing.

  • the File Transfer Protocol.

  • packet switching.

  • the Transmission Control Protocol.

Packet switching

80
New cards

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

  • assigned numbers and names (ANN) system

  • uniform resource locator system

  • domain name system

  • Internet protocol addressing schema

domain name system

81
New cards

Which system functionality must your website have to be able to personalize or customize a product for a client?

  • an inventory management system

  • customer on-site tracking

  • an ad server

  • a site tracking and reporting system

customer on-site tracking

82
New cards

Which of the following is a simple but powerful method for strategizing about a business?

  • SLDC

  • SWOT analysis

  • benchmarking

  • DevOps

SWOT analysis

83
New cards

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

  • system testing.

  • split testing.

  • funnel testing.

  • benchmarking.

Benchmarking

84
New cards

In order from beginning to end, the major steps in the SDLC are:

  • systems analysis/planning; systems design; building the system; testing; and implementation.

  • systems design; testing; building the system; and implementation.

  • systems analysis/planning; implementation; building the system; and testing.

  • systems analysis/planning; systems design; building the system; implementation; and testing.

systems analysis/planning; systems design; building the system; testing; and implementation.

85
New cards

What are the two most important management challenges in building a successful e-commerce presence?

  • identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

  • building a team with the right skill sets and closely managing the development process

  • having an accurate understanding of your business environment and an achievable business plan

  • developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

86
New cards

The primary way a website is able to personalize the content presented to a visitor is through the use of:

  • accessibility rules.

  • site management tools.

  • cookies.

  • privacy policies.

cookies

87
New cards

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

  • offline media

  • e-mail

  • website

  • social media

social media

88
New cards

(T/F) In general, the annual system maintenance cost will roughly parallel the development cost.

True

89
New cards

All of the following are basic functionality provided by e-commerce merchant server software except:

  • a shopping cart.

  • credit card processing.

  • a product catalog.

  • marketing analytics.

Marketing analytics

90
New cards

Which of the following helps you engage your customers in a conversation?

  • product database

  • shopping cart

  • on-site blog

  • site tracking and reporting system

on-site blog

91
New cards

Which of the following involves creating a skeleton version that focuses on functionality rather than design?

  • Scrum

  • web services

  • DevOps

  • wireframing

wireframing

92
New cards

The concept of a "sprint" is related to which of the following development methodologies?

  • Scrum

  • prototyping

  • component-based development

  • DevOps Apache

Scrum

93
New cards

Which of the following monitors and controls access to a main web server, and implements firewall protection?

  • mail server

  • list server

  • proxy server

  • groupware server

proxy server

94
New cards

MySQL is which of the following?

  • web server software

  • scripting language embedded in HTML documents

  • website analytics software

  • open source database software

open source database software

95
New cards

Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site?

  • physical design

  • logical design

  • co-location plan

  • testing plan

logical design

96
New cards

Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?

  • RESS

  • AWD

  • RWD

  • mobile first design

mobile first design

97
New cards

Which of the following are the two main components of a systems design?

  • behavioral design and technological design

  • logical design and physical design

  • front-end systems and back-end systems

  • business objectives and technology requirements

logical design and physical design

98
New cards

Which of the following is used to process certificates and private/public key information?

  • Secure Sockets Layer/Transport Layer Security

  • File Transfer Protocol

  • HTTP

  • data capture tools

Secure Sockets Layer/Transport Layer Security

99
New cards

Which of the following verifies that the business objectives of the system are in fact working?

  • acceptance testing

  • system testing

  • unit testing

  • implementation testing

acceptance testing

100
New cards

All of the following are website design features that annoy customers except:

  • multi-browser functionality.

  • splash pages.

  • slow-loading pages.

  • pop-under ads.

multi-browser functionality.