Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part I: Multiple Choice (25 questions total, 3 points each) 1. Of all of these forms of e-commerce, which is the largest in terms of

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

Part I: Multiple Choice (25 questions total, 3 points each) 1. Of all of these forms of e-commerce, which is the largest in terms of total dollar value of transactions? a. B2C b. B2B c. C2C. d. B2E. 2. Why might someone who wants to become a hacker purchase an exploit kit? a. An exploit kit would enable a hacker to carry out a Distributed Denial of Service attack; without such a kit, he or she would be limited to just a regular Denial of Service attack. b. With an exploit kit, someone who is not skilled at hacking on his/her own can gain the ability to easily carry out malware attacks. c. Possession of an exploit kit would enable the hacker to establish true credibility with peers in the hacking community. d. An exploit kit would give the hacker access to a content management system. 3. When the contents of a web page are stored as objects in a database, rather than hard-coded in HTML, site content can be updated in real-time (for instance, if a customer buys an item, the inventory count can be reduced by one). This is known as: a. Online cataloging. b. Vertical scaling. c. Mobile-first e-commerce. d. Dynamic page generation. 4. The second phase of e-commerce history described in our textbook is known as the Consolidation Phase, which took place from 2001 to 2006. Which statement below best describes this phase? a. E-commerce continued to grow, but investors paid more attention to business fundamentals. b. E-commerce shrunk considerably, due to the fears that people had about another dot-com crash coming to the markets. c. Thanks to the smartphone, e-commerce gained a much stronger presence during this time, appearing in all aspects of most consumers' lives. d. Because consumers no longer faced the problem of time starvation, the Internet gained a much larger following during this period. 5. Databases that keep track of IP addresses and domain names on the Internet are also known as: a. DNS servers b. SQL servers c. Networking utilities d Tier 1 providers 6. A researcher goes to a lecture to hear a famous Professor speak about astronomy. The researcher takes notes on his laptop using Google Docs. By using Google Docs, the researcher can upload his notes instantaneously to the cloud, and then access them later from any Internet-connected device. Google Docs is an example of a. Infrastructure-as-a-Service (IaaS) b. Platform-as-a-Service (PaaS) c. Software-as-a-Service (SaaS) d. Global Reach 7. CrytoLocker is a type of malware that encrypts the files of its victims, and then demands money from the victim in order to have the files unencrypted. This is an example of: a. Malvertising b. Spyware c. Ransomware. d Bitlocker. 8. Which of the following is NOT a method used by online advertisers to behaviorally target ads? a. Retinal scanning b. Search engine queries c. Data from social network sites d. Data from an individual's web browsing history 9. A system that attempts to identify a user of a particular site or app based on personally identifiable information entered by the user is known as: a. Deterministic cross-device tracking b. Probabilistic cross-device tracking c. XML tagging d. Signature streaming 10. A funding category that includes everything from an entrepreneur's own savings, credit card advances, and the early revenues a company makes from selling its products is known as: a. Incubators. b. Crowdfunding c. Seed capital d. Early-stage venture capital. 11. A company that believes it can deliver a good or service more cheaply than its competitors can, and can therefore charge a lower price to consumers, is engaging in what type of strategy? a. Scope strategy. b. Customer intimacy. c. Market niche/focus. d. Cost competition. 12. A clean energy video produced by the company Shell, featuring a singer named Jennifer Hudson, has been viewed more than 1.7 million times. Many of these views are the result of viewers sharing the video with friends and colleagues. The success of this video is an example of: a. Affiliate marketing. b. Viral marketing. C. Lead generation marketing. d Mobile-first marketing. 13. Which of the following statements most likely describes the value proposition of a company offering a merchant server software package? a. Since you are already selling online, adding a package such as ours will enable you to also sell goods in the offline world. b. "We will provide you access to a world-class network of warehouses, through which you can move merchandise across the continent very quickly." "We'll allow you to focus on your actual business, not the nitty-gritty technical details involved in e-commerce. If you don't know about HTML, hosting a site, or accepting credit card payments online, don't worry -- we'll handle all of that for you in exchange for a monthly fee." d. Your site won't run properly without strong acceptance testing. We can handle the acceptance testing that will ensure you're ready to face the market." 14. Chapter Four in our textbook states that "Hosting, co-location, and cloud services have become a commodity..." What does it mean when a product has become commoditized? a. The product has become so differentiated that sellers have decided to no longer compete. b. Consumers no longer care about the product itself, but only about the impact that the product can have on other products. c. Consumers no longer perceive any meaningful differences between one seller's offering and another seller's offering. d. Because the product has been banned in certain markets, there is no longer any guarantee that particular consumers will be able to easily obtain the product in their home market. 15. A site developer decides to show a blue Buy it Now button on a website for the next 100 customers who visit. Then, for the next 100 customers, they'll show a green "Buy it Now button, and will continue to rotate back and forth between the two in order to see which button drives more sales. This is an example of a. Omni-channel marketing b. Latency routing c. Showroom merchandising d A/B Testing 16. Which of the following is a useful tool for a company that wishes to enable its website users to run a program on the company's server? a. A proprietary e-reader device. b. A modulator-demodulator (modem). c. Low-latency router. d. Common Gateway Interface (CGI). 17. A site developer declares, "We should ensure that all of our images come with descriptive alt tags that can be read aloud by specialized software. That way, even blind users can easily understand what the images on our site are meant to convey." This is an example of a(n): a. Personalization tool. b. Hybrid app c. Accessibility rule. d. Physical design 18. Which of the following statements best describes the Payment Card Industry-Data Security Standard (PCI-DSS)? a. PCI-DSS is an industry-mandated standard. It is adhered to by all merchants who accept credit and debit cards (otherwise, they would risk fines and/or other expenses). b. PCI-DSS ensures that credit card fraud cannot occur, because of the security guarantee that comes with each card transaction. c. Because PCI-DSS only applies to CNP (Cardholder Not Present) transactions, its impact is limited; however, it plays an important role in protecting cards overall d. A set of laws mandated by the U.S. government, PCI-DSS holds banks accountable in the event of fraud committed against any cardholder 19. In the offline world, consumers view the same ads that other consumers do. For instance, if I walk past Fenway Park, I see a gigantic "Budweiser advertisement. When I watch TV, I see the same ads for cars that every other viewer sees. Online, however, ads are much more likely to be geared towards the person who actually sees the ad. This is known as: a. Retargeting. b. Ad targeting c. Logical design. d. Augmented Reality (AR). 20. A group of friends enjoys communicating via iMessage, an application that requires the use of an iPhone in order to be able to fully utilize. As more members of the group begin to adopt iMessage, it becomes more valuable to the ones who already have it, since they can now communicate more easily with others in the group. This is an example of what phenomenon? a. Metatagging. b. Network effect. c. Moore's Law. d. Long Tail marketing 21. Don't limit yourself to online ads only, says one friend to another. Of course, you should be online. But you should also consider ways in which you can reach consumers offline --for example, think about the ways you can impact consumers through billboards, print ads on the back covers of magazines, and even local TV ads." What marketing strategy is the friend recommending? a. Dimension reduction. b. Multi-channel marketing. c. Acceptance testing. d. Horizontal scaling. 22. Which of the following is an advantage of using packet-switched communication, rather than circuit-switched communication? a. With packet-switched communication, both parties can be reasonable secure that their data is not being captured, copied, or otherwise interfered with by any third parties along the path between sender and receiver. b. Using a packet-switched system, a company can be assured that the connection to its own facility will never become disconnected. c. With packet-switching in place, a sender will always know the exact time at which a particular message was received by its intended recipient. d Packet-switching is more efficient; with circuit-switching, a dedicated connection must be maintained between two parties, even when no data is being transmitted. 23. A friend of yours is curious about the way the Internet works. You tell her that there is a way in which she can trace the path that a particular group of packets takes as it moves from one computer to another. What is this called? a. Traceroute b. Connection check c. Ping d IPv6 Internet address. 24. Which of the following best describes an e-mail wiretap? a. A tool used by law enforcement to monitor voice transmissions made through Bluetooth-connected devices. b. A program that corrects the spelling or grammar of a person who uses e-mail to communicate (but then makes the content of those e-mails publicly accessible via the Web) c. A method for recording e-mail traffic, generally at the server level, from any particular individual. d. A noise reduction system used by telecommunication providers to ensure that the contents of one user's messages do not create interference with transmissions from another user. 25. How is network keyword advertising different from ordinary keyword advertising? a. With network keyword advertising, the sponsor is entitled to a full refund of charges in the event that consumers do not make purchases Network keyword advertising takes advantage of the full features offered through broadband connectivity. c. Most forms of network keyword advertising are enabled by smart assistants, such as Siri or Alexa d. The main idea behind network keyword advertising, or content advertising is that the ads that appear on a particular page are intended to be relevant to the content on that page. Part II: Fill in the Blank: (10 total, 2 points each). 1. An example of a company or service that uses a subscription revenue model is 2. is a type of technology through which light signals are sent through strands of glass in order to transmit data. _ is an example of a Web 2.0 application used by millions of people every day. 4. A set of standards that all systems or devices in a network agree to use is known as a 5. The ability to change a product based on the needs or wishes of a customer is also known as 6. A(n) is an example of a biometric characteristic used for authentication is an example of a popular C2C e-commerce site. 8. In search results that a user would see when using Google, Bing, or Yahoo, unsponsored or "organic results are shown in addition to __results. _ is a measure of how much data can be transferred over a communications medium within a fixed period of time. 10. A vertical is a site that offers services, products, and information to a specialized marketplace. 9. - Part III: TRUE/FALSE (10 total, 1.5 points each) 1. In an affiliate revenue model, a business directs buyers or potential buyers to another site, and either receives a referral fee per visitor, or a percentage of revenue from the resulting sales. Although the precise size of the deep Web is not known, it is estimated to be far larger than the surface Web. Because online consumers are entirely focused on price when making purchase decisions, there is almost no variation in prices among online sellers. Changing the web server software used to power a site will not change the appearance of the site itself The ability of a customer to control the use of information that he or she provides to an e-commerce merchant is also known as confidentiality. The ranking process used by Google is completely transparent, so a site looking to boost its position in the rankings will know exactly what it needs to do in order to move up. - Rich media ads are more interactive than banner ads, but banner ads are more effective at getting visitors to actually click on the advertiser's website. Price discrimination is not only illegal in the United States, but is also considered unethical. A firewall can come in the form of either hardware or software, and can be used to filter packets coming into, or out of a particular network. The client/server model of computing has helped to distribute the power and reach of the Internet to many people who might not be able to afford the computing equipment that would be required if such a model did not exist

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions