EC
EC
rs can interact with ________ treats each customer in a unique way to fit
who specify search criteria. | Shopping robots advertisers or vendors. | Interactive marketing marketing and advertising with the customer's profile and
needs. | One-to-one marketing
, orders from several buyers are combined into volume ________ is the assurance of data privacy. | Confidentiality
purchases so that better prices can be negotiated. | group __________ are used by consumers to locate |
purchasing ________ is the assurance that online customers or trading shoppingbots
partners cannot falsely deny their purchase or transaction. |
____ are retailers who conduct business in the physical Nonrepudiation __________ are used by consumers to locate the best price
world, in traditional stores | Brick-and-mortar distributors for a desired product | a. shopping bots
________ is the criminal, fraudulent process of attempting
_____ includes retail transactions of products/services from to acquire confidential information by masquerading as a __________ enables the determination of the location of an
businesses to individual shoppers. | B2C trustworthy entity. | Phishing enabled device. | b. GPS
_____ refers to a broader definition of _____. | . E- ________ is the name-based address that identifies an __________ includes software and integration efforts
Commerce, E-Business Internet-connected server. | Domain name intended to increase customer satisfaction and loyalty. | e.
CRM
______ is the electronic delivery of newspapers, ________ is the online B2C business model where
magazines, books, videos, music, and other digitizable manufacturers customize their products and services via __________ is commonly used to broadcast public lectures
information over the Internet. | Online publishing online orders. | Make (build)-to-order and e-seminars, promote the work of new or unknown
musicians, and broadcast international entertainment
_______ is the direct purchasing from internal ________ is the popular term for advanced Internet activities | Webcasting
marketplaces without the approval of supervisors and technology and applications including blogs, wikis, RSS,
without the intervention of a procurement department. | and social bookmarking. | Web 2.0 __________ is the act ferreting out previously unknown
Desktop purchasing patterns and relationships from a set of data. | b. data
________ is the process of determining what the mining
________ are barriers between a trusted network or PC and authenticated entity is allowed to access and what
the untrustworthy Internet. | Firewalls operations it is allowed to perform. | Authorization __________ is the electronic transmission of business
transaction documents directly between the computers of
________ are brick-and-mortar retailers that offer a ________ is the process of scrambling a message in such a trading partners in a standard message format. | e. none of
transactional Web site from which to conduct business. | way that it is difficult, expensive, or time-consuming for an the above - EDI
Click-and-mortar retailers unauthorized person to unscramble it. | Encryption
__________ is the process of planning, implementing, and
________ are data that occur inside the Web environment, ________ is the psychological status of willingness to controlling the flow of goods and services from point of
and they provide a trail of the user's activities in the Web depend on another person or organization. | Trust origin to point of consumption. | d. logistics
site. | Clickstream data
________ is the situation in which an online marketing __________ is/are used to pay for microtransactions |
________ are electronic intermediaries that provide and/or channel upsets the traditional channels due to real or either e-cash or difital cash
control information flow in cyberspace, often aggregating perceived damage from competition. | Channel conflict
information and selling it to others. | Infomediaries __________ is/are used to pay for microtransactions. | d.
________ is viral marketing done by bloggers. | Viral either A or B
________ are firms that sell directly to consumers over the blogging
Internet without maintaining a physical sales channel. | __________ work best with many buyers and many sellers.
Virtual (pure-play) e-tailers ________ matches services, products, and advertising | b. Dynamic exchanges
content with individuals and their preferences. |
________ are tiny graphics files embedded in e-mail Personalization __________, the act of modifying a product or service to
messages and in Web sites that transmit information about fit a given users requirements, is a possible e-commerce
users and their movements to a Web server. | Web bugs ________ refers to an online market, usually B2B, in source of sustainable competitive advantage. | b.
which buyers and sellers exchange goods or services. | E- customization
________ communities belong to a company, an marketplace
association, or a group of companies. | Private ___________ are a popular online publishing technology
________ refers to social networking where members for creating a Web page that | c. Wikis
________ communities open their membership to anyone. | converse and connect with one another using cell phones or
Public other mobile devices. | Mobile social networking ___________ is a crimeware technique used to steal the
identity of target companies to get the identities of their
________ is a deep commitment to rebuy or repatronize a ________ refers to technologies and business practices that customers. | Phishing.
preferred product or service consistently in the future, free the workforce from the constraints of legacy
thereby causing repetitive same-brand purchasing. | communication and productivity tools such as email. | ___________ is an advertising strategy that uses word-of-
Customer loyalty Enterprise 2.0 mouth marketing in which customers promote a product or
service by telling others about it. | Viral marketing
________ is a marketing arrangement by which an ________ refers to the integration of computers and
organization refers consumers to the selling company's wireless communications in order | b. telematics ___________ is commonly used to broadcast public
Web site. | Affiliate marketing lectures and e-seminars, promote | b. Webcasting
________ refers to the mapping and measuring of
________ is a marketplace in which an intermediary relationships and information flows among people, groups, ___________ is commonly used to broadcast public
arranges barter transactions. | Bartering exchange organizations, computers, and other information- or lectures and e-seminars, promote the work of new or
knowledge-processing entities. | Social network analysis unknown musicians, and broadcast international
________ is an umbrella term for any of several entertainment activities. | Webcasting
arrangements that allow a vendor of content in electronic ________ refers to the portion of an e-seller's business
form to control the material and restrict its usage. | Digital processes through which customers interact, including the ____________ can be supported more effectively and
rights management seller's portal, electronic catalogs, a shopping cart, a search efficiently through direct buyer | a. Strategic purchases
engine, and a payment gateway. | Front end
________ is money invested in a business by an individual, ____________ can be supported more effectively and
a group of individuals, or a funding company in exchange ________ refers to the second-generation of Internet-based efficiently through direct buyerseller offline or online
for equity in the business. | Venture capital services that let people | c. Web 2.0 negotiations, which can be done in private exchanges or
private trading rooms in public exchanges. | Strategic
________ is online advertising that focuses on social ________ refers to the second-generation of Internet-based purchases
networking sites. | Social network advertising services that let people collaborate and share information
online in new ways, such as social networks and wikis. | ____________ can be supported more effectively and
________ is online marketing, facilitated by the Internet, Web 2.0 efficiently through direct buyer seller offline or online
by which marketers and advertisers can interact directly
1
negotiations, which can be done in private exchanges or _______________ are online markets owned and operated A ________ is a data file that is placed on a user's hard
private trading rooms in public exchanges. | Strategic by a single company and may be either sell-side or buy- drive by a remote Web server, frequently without
purchases side. | Private e-marketplaces disclosure or the user's consent that collects information
about the user's activities at a site. | cookie
____________ is an EIPP many-to-many model with a _______________ are systems where only routine
third party acting as an intermediary, collecting or transaction processing and information flow take place A ________ is a group of people who have some kind of
aggregating invoices from multiple sellers and payments between two or more organizations using a standard commercial or business relationship. | business network
from multiple buyers. | Consolidator protocol, such as electronic data interchange (EDI). |
Interorganizational information systems A ________ is a group of people with a common interest
____________ is the electronic delivery of newspapers, who interact on the Internet. | virtual (Internet) community
magazines, books, videos, | a. Online publishing _______________ is the process of making the selected
applications and projects a | a. Project management A ________ is a social network whose primary objective is
____________ is the electronic delivery of newspapers, to facilitate business connections and activities. | business
magazines, books, videos, music, and other digitizable _______________ is the process of making the selected social network
information over the Internet | Online publishing applications and projects a reality by hiring staff;
purchasing equipment; licensing, purchasing, or writing A ________ is an auction in which a seller entertains bids
_____________ are a popular online publishing technology software; and contracting vendors. | Project management from buyers, and bidders increase the price sequentially. |
for creating a Web page that can be edited by anyone with forward auction
a standard Web browser | Wikis _______________ means that the communication and
collaboration are done in real time | *Synchronous A ________ is someone whose advice or view carries some
_____________ are extremely busy customers willing to weight in making a final purchasing decision. | influencer
shop online in order to free up time. | Leading edgers ________________ are customers who are willing to shop
online because they dislike | d. Shopping avoiders A __________ application is one that the company
_____________ are small online payments typically under depends upon for its well-being. | e. mission critical
US$10: | E-micropayments ________________ are customers who are willing to shop
online because they dislike going to grocery stores. | A __________ is an existing, often relatively |
_____________ is the continuous evaluation of progress Shopping avoiders legacyapplication
toward the organizations | d. strategy assessment
________________ are financial institutions that provides A __________ is an existing, often relatively inefficient
_____________ is the continuous evaluation of progress a customer with a payment | b. Issuing banks application developed for an old platform. | e. legacy
toward the organizations strategic goals, resulting in application
corrective action and, if necessary, strategy reformulation. | ________________ are financial institutions that provides
strategy assessment a customer with a payment card. | Issuing banks A __________ is operated by a trusted third party that
offers bandwidth and other value added services to
_____________ occurs when B2B eliminates a distributor ________________ are gateways to storefronts and e- facilitate interconnectivity among multiple organizations. |
or a retailer. | Disintermediation malls. | a. Shopping portals b. value added network (VAN)
_____________ refers to the buying and selling of goods ________________ are those who are young and A ___________ is suitable for mobile users who need to
and services; servicing of customers; collaborating with comfortable with technology. | c. New technologists make very short-range deviceto-device wireless
business partners; and conducting electronic transactions connections within a small space, such as a single room,
within an organization. | E-business ________________ means that the communication and and most | a. personal area network
collaboration are done in real | a. Synchronous
______________ are sites that evaluate and verify the A ___________ is suitable for mobile users who need to
trustworthiness of e-tailers | c. Trust verification sites ________________ means that the communication and make very short-range device-to-device wireless
collaboration are done in real time. | Synchronous connections within a small space, such as a single room,
______________ involves using various computer-based and most commonly with Bluetooth | personal area network
tools and techniques to | a. Knowledge creation ________________ provide connectivity among
merchants, customers, and financial | c. Payment A ___________ is suitable for mobile users who need to
______________ is a business strategy that enables processing services make very short-range device-to-device wireless
manufacturers to control and share | c. Product lifecycle connections within a small space, such as a single room,
management ________________ provide connectivity among and most commonly with Bluetooth. | personal area
merchants, customers, and financial networks enabling network
______________ is a business strategy that enables authorization and payments is called the: | Payment
manufacturers to control and share product-related data as processing services A ____________ has capabilities that can be used to
part of product design and development efforts. | Product perform routine tasks that require intelligence such as
lifecycle management _________________ recognizes that ______________ are providing customers with assistance based on their
the core of a business and | c. Customer relationship movements on a Web site | software agent
______________ is the assurance that data are accurate or management; customers
that a message has not been altered. | Integrity A ____________ has capabilities that can be used to
_________________ recognizes that ______________ are perform routine tasks that require intelligence such as
______________ offer Internet Merchant Accounts, which the core of a business and that a companys success depends providing customers with assistance based on their
are special accounts for credit card authorization and on effectively managing its relationships with them. | movements on a Web site. | software agent
payment processing. | Acquiring banks Customer relationship management; customers
A ____________ is a companys method of doing business
______________ provides customers with exactly what ___________________ are a major source of uncertainty to generate revenue to sustain itself. | business model
they want, when and where they want it. Effective in supply chains. | d. Demand forecasts
communication between the supply chain and the factory A _________________ is a wealthy individual who
floor is needed to make it happen | Demand-driven ____________is the transfer of documents and computer contributes personal funds and possibly expertise at the
manufacturing files while video | b. Data conferencing earliest stage of business development. | angel
______________ refers to the tendency of customers to ________is an advertising strategy that uses word-of- A B2B consortium has the potential to reduce prices of
stay at Web sites longer and | d. Stickiness mouth marketing in which | a. viral marketing individual products, thus enabling and encouraging
consortium members to buy more. | T
______________ refers to the tendency of customers to A
stay at Web sites longer and come back more often. | A botnet is: | a coordinated network of computers that can
Stickiness A ________ is a collaborative online encyclopedia jointly
written by volunteers. | wiki scan for and compromise other computers and launch DOS
attacks.
A ________ is a company's method of doing business to
generate revenue to sustain itself. | business model
2
A botnet is: | a huge number of hijacked Internet computers a company submits its surplus to the exchange and receives A domain name is: | b. intangible property protected by law
that have been set up to forward traffic, including spam and points of credit, which the company can then use to buy
viruses, to other computers on the Internet. items that it needs. | bartering exchange A duty is | a legal claim that others not interfere with a
protected interest
A botnet is: | d. a coordinated network of computers that A company that creates and manages many-to-many
can scan for and compromise other computers markets is called a: | market maker. A duty is | a legal obligation not to interfere with a
protected interest
A brick-and-mortar organization performs its primary A company that manages application servers in a centrally
business offline, selling physical products by means of controlled location rather than on a customer's site is called A file containing customer status and customer information
physical agents. | True a(n) | application service provider (ASP) that is used when processing transactions to identify known
problem customers is a: | negative list.
A broader definition of EC that includes not just the buying A company that sells products directly to the end consumer
and selling of goods and services, but also servicing is considered a B2C firm. | True A file is encrypted, and then decrypted using the same key.
customers, collaborating with business partners, and What type of encryption is described? | Private key
conducting electronic transactions within an organization A company uses a third-party's Web site to help them find
best defines: | e-business clients. When the sale is made, the third party helps broker A firewall is configured to examine not only the header of
and arrange shipment of the items. The third party is an incoming messages but also their contents. What type of
A business model is a description of how an organization online intermediary. | True firewall is described? | Stateful packet inspection
intends to generate revenue through its business operations.
| TRUE A company-based acquisition site that uses e-procurement A firm that operates both physical stores and an online e-
methods such as reverse auctions, negotiations, or group tail site is said to be a click-and-mortar business selling in a
A business model is a method of doing business by which a purchasing to overcome the manual searching of e-stores _____. | multichannel business model
company can generate revenue to sustain itself. | True and e-malls, is referred to as a(n) ________ | buy-side e-
marketplace. A firm that operates both physical stores and an online e-
A business model is an analysis of the organizations tail site is said to be a click-and-mortar business selling in a
customers and, from that, a discussion of how that A company-based acquisition site that uses e-procurement | multichannel business model.
organization will achieve profitability and sustainability by methods such as reverse auctions, negotiations, or group
delivering goods and services to those customers. | T purchasing, to overcome the manual searching of e-stores A focal point for all corporate training and learning
and e-malls is referred to as a(n): | buy-side e-marketplace activities, including online ones best describes: | learning
A business model outlines how the organization or the EC center.
project will generate revenue through sales, transaction A companys internal operations and its relationships with
fees, advertising fees, affiliate fees, or other revenue suppliers and other business partners are frequently: | as A free Internet news service that broadcasts personalized
sources. | False complex as customer-facing applications such as taking an news and information, including seminars, in categories
order online. selected by the user is known as | Webcasting.
A business model outlines how the organization, or the EC
project, will generate revenue through sales, transaction A competitive advantage derived from __________ is A good example of dynamic pricing occurs in where prices
fees, advertising fees, affiliate fees, or other revenue generally considered the best approach for a company. | vary and final prices are determined by the forces of supply
sources | False d.improved value chain and/or supply chain efficiency and demand. | auctions
A business such as Apple Computers making online A consortium trading exchange (CTE) or consortia is most A government agency uses an online reverse auction to
transactions with its trading partners is an example of: | appropriate for fragmented markets with large numbers of satisfy the tendering system | d. e-Procurement
B2B both buyers and sellers. | F
A government agency uses an online reverse auction to
A business using B2C business model trades with other A consumer who purchases an item for a business can be satisfy the tendering system requirements specified by law.
businesses. | False described as an organizational buyer. | False This is an example of: | e-Procurement
A card that draws the payment amount directly from the A cookie is a data file that is placed on a users hard drive A group of bidders artificially inflate the price of an item to
users checking account is | d. debit card by a remote Web server only when the users gives full scare off other bidders. They then back out at the last
consent to collect information about the users activities at a minute, leaving one of them with a relatively low bid.
A card that draws the payment amount directly from the site. | F What type of fraud is this? | Bid shielding
users checking account is called a(n): | debit card
A corporation uses the Internal Revenue Service's Web site A hacker uses special software to access a server on your
A category of Internet applications that helps connect to learn how to pay its estimated quarterly income taxes. network. What type of attack is this? | Technical
friends, business partners, or individuals with specific This is an example of: | G2B
interests by providing free services such as photo A has capabilities that can be used to perform routine tasks
presentation, e-mail, blogging, and so on using a variety of A corporation uses the Internal Revenue Service's Web site that require intelligence such as providing customers with
tools best describes: | social networking. to learn how to pay its | d. E2E assistance based on their movements on a Web site. |
software agent
A citizen surfing the Internet is a netizen. | True A corporation uses the Internal Revenue Service's Web site
to learn how to pay its estimated quarterly income taxes. A host-based intrusion detection system (IDS): | a. Resides
A click-and-mortar retailer is a combination of both the This is an example of: | E2E on the server that is being monitored where it can detect
brick-and-mortar retailer and an online transactional Web whether critical or
site. | TRUE A criticism of Web 2.0 is the inability to create new
business models. | FALSE A host-based intrusion detection system (IDS): | Resides on
a column of data in a relation is also called : | an attribute the server that is being monitored where it can detect
A CRM system hosted and maintained by an ASP is whether critical or security-related files have been
A commercial portal offers broad content targeted to a called? | On-demand CRM tampered with or whether a user has attempted to access
narrow audience. | False files that he or she is not authorized to use.
A CVN: | Compares the verification number on a card to
A common inefficiency in procurement management is issuer records A is a companys method of doing business to generate
spending too much time on MROs and not enough time on revenue to sustain itself. | business model
high value items. | True a database management system is | a program
A is a form of business alliance composed of several
A company allows peoples to watch a sports competition in A decision by a judge that may be used as a standard in business partners that share the costs and resources for the
real-time for a fee. So that companys revenue follows: | similar cases that follow is referred to as | legal precedent development or production of a product or service. | virtual
Subscription Model corporation
A decision by a judge that may be used as a standard in
similar cases that follow is referred to as: | legal precedent A is a private corporate network | intranet
A key feature of social media is that users control and use A major shortcoming with authentication services is: | a. A mode is purchasing where prices are negotiated or
the media, often at little or no cost. | TRUE two different authenticators may come up with different discounted is , which refers to nonfixed prices, such as
opinions regarding the those in auctions or stock markets. | dynamic pricing
A large e-tailer, such as Amazon.com, for example, uses all
of these services and also employs auction services, A major shortcoming with authentication services is: | two A music company can file a ________ against YouTube
payments services, logistics support, and more. This different authenticators may come up with different and MySpace for any interference with the ability to profit
phenomenon is called | hypermediation opinions regarding the authenticity and description of a from its IP or for profiting from the recording industrys
given item. property without authorization and compensation | lawsuit
A large number of EC companies, especially e-tailing and or civil charge
B2B ones, failed from 1999 to 2005 for each of the A management tool that assesses organizational progress
following reasons EXCEPT: | The companies failed to toward strategic goals by measuring performance in a A network that uses the Internet to link ent intranets best
register with search engines, such as Google. number of different area is | balanced scorecard defines: | extranet.
A large organizations can develop an effective procurement A market maker bills a buyer for reviewing several seller A new type of e-commerce refers to the localization of
system by creating an internal marketplace that combines contracts and making a recommendation on what to buy products and services through mobile device and context
the catalogs of all its approved suppliers into a single and from whom. The revenue model being used in this aware computing technologies is called ___________ | L-
internal electronic catalog, which is searched for product example is the: | fee for service model. Commerce
availability and delivery times. | T
A market maker charges a percentage on every buy and sell A niche e-tailer may be able to support an online effort that
A law that makes it a crime to send commercial e-mail made in the exchange. The revenue model in place in this may not have enough customers in any particular local
messages with false or misleading message headers or exchange is the: | transaction fee model. market. | True
misleading subject lines is: | CAN-SPAM.
A market maker evaluates an exchange between a buyer in A payment card that provides the holder with credit to
A legally binding contract requires a few basic elements. the United States and a seller in Spain to ensure that import make purchases up to a limit fixed by the card company
Which of the following is not one of those elements? | laws for the U.S. are followed. This is an example of the and charges relatively high interest rates on unpaid
agreement market maker: | maintaining exchange policies and balances is the: | credit card.
infrastructure.
A limitation of e-bartering for businesses is that excess A piece of software that integrates departments and
capacity items such as office space, storage, factory space; A market maker evaluates an exchange between a buyer in functions across a company to serve all of the company's
idle facilities; and labor cannot be bartered. | F the United States and a | b. maintaining exchange needs is what type of system? | ERP
infrastructure.
A major block in the widespread implementation of A plan for organizing the underlying infrastructure and
collaborative commerce is: | the lack of universally A market maker evaluates an exchange between a buyer in applications of a site best describes: | EC architecture.
accepted standards. the United States and a seller in Spain to ensure that import
laws for the U.S. are followed. This is an example of the A podcast is distinguished from other digital audio formats
A major entertaining company has four studios that have market maker: | maintaining exchange infrastructure. by : | c. its ability to be downloaded automatically, using
been in the same location for more than ten years. The software capable of reading feed
company includes a page on its Web site with addresses, A market maker evaluates an exchange between a buyer in
phone numbers, and general e-mail addresses for each of the United States and a seller in Spain to ensure that import A podcast is distinguished from other digital audio formats
these studios. None of this information has changed since laws for the U.S. are followed. This is an example of the by: | its ability to be downloaded automatically, using
the Web site was developed. This is an example of market maker: | maintaining exchange policies. software capable of reading feed formats such as RSS
____________ content | static
A market maker organizes an e-marketplace. | True A portal is an information gateway that attempts to address
A major entertainment company has four studios that have information overload by enabling people to search and
been in the same location for more than ten years. The A market mechanism that uses a competitive process in access relevant information from disparate IT systems and
company includes a page on its Web site with addresses, which a seller solicits consecutive bids from buyers or a the Internet, using advanced search and indexing
phone numbers, and general e-mail addresses for each of buyer solicits bids from sellers best defines | auction. techniques, such as Googles desktop. | T
these studios. None of this information has changed since
A market mechanism that uses a competitive process in A portal is an Internet gateway to a large variety of
the Web site was developed. This is an example of
which a seller solicits consecutive bids from buyers or a information and services. | True
________ content. | static
buyer solicits bids from sellers best defines: | auction.
A major limitation of RFID currently is the restriction of A portal that acts as a gateway to other portals and Web
A marketer that uses e-mail to advertise to potential sites operated by an organization is called a(n) | corporate
the environments in which RFID tags are easily read. | T
customers is called a: | viral marketer. intranet portal.
A major objective of Web 2.0 is to enhance creativity,
A marketplace in which sellers and buyers exchange goods a primary key can be a: | composite
information sharing, and collaboration. | TRUE
and services for money (or other goods and services), but
A major problem in B2C is the increasing rate of online do so electronically defines ________. | marketspace A private e-marketplace in which one company sells either
fraud. | TRUE standard and/or customized products to qualified
companies defines ________. | buy-side e-marketplace
4
A pure-play e-tailer dedicates the majority of their capital A suite of network protocols designed to enable different A type of broker that helps consumers compare different
to online sales, with offline sales lagging behind. | False kinds of wireless devices is called: | Wireless Application stores is a: | shopping facilitator.
Protocol.
A retail company that sell directly to consumers over the A type of e-book referred to as the ____________ is a truly
Internet without maintaining a physical sales channel. That A summary of a message, converted into a string of digits multimedia, online-only book that has hyperlinks, three-
is a example of _______________ | Pure-play e-tailers after the hash has been applied, best describes: | message dimensional text and display, graphics, audio, and video. It
digest. supports nonlinear exploration of topics. | rubics-cube
A retailer is a sales intermediary, a seller that operates hyperlink book
between manufacturers and customers. | T A supply chain can be broken into three major parts. The
part of the supply chain includes the activities of a A type of e-book referred to as the ___________is a truly
A revenue model describes how a company will generate company with its suppliers and their connections with their multimedia, online-only | d. rubics-cube hyperlink book
profits. | True suppliers. | upstream
A type of e-book referred to as the is a truly multimedia,
a row of data in a relation is also called: | a tuple A supply chain can be broken into three major parts. The online-only book that has hyperlinks, three-dimensional
part of the supply chain includes all of the in-house text and display, graphics, audio, and video. It supports non
A scheme for securing e-payments using public key processes used in transforming the inputs received from the linear exploration of topics | rubics-cube hyperlink book
encryption and various technical components best suppliers into the organizations outputs. | internal
describes: | public key infrastructure. A type of mobile social networking where the company
A supply chain can be broken into three major parts. The does not have a relationship with a wireless carrier is: | off-
A searchable database of computer hardware that meets a part of the supply chain includes all the activities involved deck.
strict set of environmental criteria best describes: | in delivering the products to the final customers. |
Electronic Product Environmental Assessment Tool. downstream A type of online mall that is basically a directory organized
by product type best describes | referring directory.
A seller has his friend bid on his auction to help drive up A supply chain can be broken into three major parts:
the price. What type of fraud is this? | Shilling upstream, internal, and downstream. | T A typical EC fulfillment process involves all of the
following activities EXCEPT: | b. Just-in-time inventory
A sell-side marketplace deals with one seller and many A supply chain involves activities that take place during the management.
potential buyers. | True entire product life cycle, from dirt to dust. | T
A user profile defines customer preferences, behaviors, and
A single company that deploy an E-Commerce system by A supply chain involves activities that take place during the demographic traits of a particular customer. | T
build up a website where their services are sold. What kind entire , from dirt to dust. | product life cycle
of EC system they have? | storefront A user profile defines customer preferences, behaviors, and
A supply chain is the flow of materials. | False demographics and can be generated by observing what the
A smart card containing a small gold plate on the face that user does online. | TRUE
when inserted in a smart card reader makes contact and A system that locates, extracts, and provides specific
passes data to and from the embedded microchip is a: | answers to user questions expressed in natural language A VMI system helps a firm manage its internal inventory. |
contact card. best describes: | automated question-answer. False
A software agent that surveys user's reading interests, then A technique known as web page hijacking | a. enables a A VPN relies on a special protocol understood only by the
uses machine learning to find new Web pages and news malicious Web master to displace the pages of an EC Web VPN software to transmit packets, a technique called
articles using neural-network-based collaborative filtering site in the Search __________. | a. encryption
technology is called: | a learning agent.
A technique known as web page hijacking | enables a A vulnerability | d. is a weakness in software or other
A special network model that enables transindustry malicious Web master to displace the pages of an EC Web mechanisms that a hacker can use directly to gain
collaboration is the which connects all Internet business site in the Search Engine Results Pages (SERPS) to redirect
services. | business-to-exchange (or B2X) customers to another site. A vulnerability | is a weakness in software or other
mechanisms that a hacker can use directly to gain access to
A special type of intermediary in e-commerce is the B2B A technology that is used to electronically transfer routine a system or network.
_____ which connect manufacturers with business buyers, documents, such as invoices and purchase orders, and for
such as retailers or resellers in the computer industry. | e- financial transactions is _____. | electronic data interchange A Web site asks users to fill out a questionnaire about
distributor themselves. The Web site then personalizes to the user and
A technology that is used to electronically transfer routine makes recommendations. What type of personalization is
A specific outcome of the strategy initiation phase is a documents, such as invoices and purchase orders, and for being used? | Rule-based filtering
clear statement of the companys ________________, financial transactions is ___________. | Electronic data
which summarizes the customer segment, competitor interchange A Web site offering content created by a third party
target, and the core differentiation of ones product from the transparently to customers is an example of: | Syndication.
offerings of competitors. | value proposition A technology that is used to electronically transfer routine
documents, such as invoices and purchase orders, and for A Web-based seller of CDs carefully monitors the prices
A specific outcome of the strategy initiation phase is the , financial transactions is . | Electronic data interchange charged by its competitors for identical products. This
which includes the vision, mission, value proposition, company has the ability to change a given price within
goals, capabilities, constraints, strengths, and weaknesses A third party that operates an exchange and in many cases, three minutes in response to changes by competitors. This
of the company. | company analysis also owns the exchange is known as a(n): | market maker is an example of EC: | agility.
A specific outcome of the strategy initiation phase is the , A traditional brick-and-mortar store with a mature Web site A(n) ________ is a type of pop-up ad that appears after a
which includes the vision, mission, value proposition, uses a click-and-mortar strategy to do all of the following user clicks a link and remains | c. interstitial
goals, capabilities, constraints, strengths, and weaknesses EXCEPT: | reduce refunds and exchanges.
of the company. | company analysis A(n) ________ is an HTML coding statement that
A traditional brick-and-mortar store with a mature Web site describes the content of a Web page | c. meta-tag
A specific outcome of the strategy initiation phase is the uses a click- and | a. reduce refunds and exchanges.
________________, which | a. company analysis A(n) ________ is defined as a group of people that have
A traditional brick-and-mortar store with a mature Web site some kind of commercial or business relationship such as
A specific outcome of the strategy initiation phase is the uses a click- and mortar strategy to do all of the following the relationships between sellers and buyers, buyers among
________________, which includes the vision, mission, EXCEPT: | reduce refunds and exchanges. themselves, buyers and suppliers, and colleagues and other
value proposition, goals, capabilities, constraints, strengths, colleagues. | business network
and weaknesses of the company. | company analysis A transaction completed electronically between two
businesses over the Internet, extranets, intranets or private A(n) _________ is a document retrieval system designed to
A suite of network protocols designed to enable different networks is a B2B transaction. | True help find information stored on a computer system, such as
kinds of wireless devices is | a. Wireless Application on the Web, inside corporate or proprietary files, or in a
Protocol. personal computer | search engine
5
A(n) __________ is a private corporate network that uses A(n) is a computer system capable of integrating, storing, offline-sales online. | three in four Internet users age 14 and
standard Internet protocols and interfaces. | e. intranet editing, analyzing, sharing, and displaying spatial over
information. | geographical information system
A(n) __________ is a pseudo private data network that According to data from eMarketer, approximately
uses public bandwidth in combination with a tunneling A(n) is a single point of access through a Web browser to _______________shop online | b. three in four Internet
protocol and security procedures. | c.virtual private network help users find relevant and accurate business information users age 14 and over
(VPN) and reduce information overload. | information portal
According to data from eMarketer, approximately shop
A(n) ____________ is an HTML coding statement that A(n) is a type of pop-up ad that appears after a user clicks a online and/or research offline-sales online | three in four
describes the content of a Web page and is used by search link and remains while content is loading to capture the Internet users age 14 and over
engines to index the sites content so that it can be found. | user's attention for a short time, either as a promotion or a
meta-tag lead-in to the site's homepage or to advertise a product or a According to Inmon, B2C clickstream data can reveal
service. | interstitial information each of the following EXCEPT: | What goods
A(n) ____________ is an order-processing technology that the customer wanted to but could not find.
allows customers to accumulate items they wish to buy A(n) is an HTML coding statement that describes the
while they continue to shop. | Electronic shopping cart content of a Web page and is used by search engines to According to Internet statistics, 67 percent of consumers
index the site's content so that it can be found. | meta-tag abandoned their shopping carts because of the lack of
A(n) _____________ is a single point of access through a satisfactory product information. | T
Web browser to help users find relevant and accurate A(n) is an online third party that brokers B2B transactions
business information and reduce information overload. | between a buyer and seller. | intermediary According to O'Reilly (2005), Web 2.0 Level 1
information portal applications operate offline but gain features from going
A(n) takes place between sellers and buyers in one industry online. | True
A(n) _____________ is an online third party that brokers or for one commodity, such as flowers, cars, or cattle. |
B2B transactions between a buyer and seller. | intermediary vertical auction According to research, customer satisfaction with an
Internet store: | drops dramatically when certain Web site
A(n) _____________ takes place between sellers and A... application is one that the company | mission critical features fail to perform properly, such as the contents
buyers in one industry or for one | b. vertical auction reliability, loading speed, or usefulness.
A______________ is a company, university, or nonprofit
A(n) _____________ takes place between sellers and organization that supports promising businesses in their According to the ________ revenue model, customers pay
buyers in one industry or for one commodity, such as initial stages of development. | incubator a fixed amount, usually monthly, to receive some type of
flowers, cars, or cattle | vertical auction service. | subscription fees
A_______________ is a form of business alliance
A(n) _____________ takes place between sellers and composed of several business | c. virtual corporation According to the _____________ model, an organization
buyers in one industry or for one commodity, such as can increase brand awareness or even generate sales by
flowers, cars, or cattle. | vertical auction A_______________ is a form of business alliance Web-based word-of-mouth marketing or promoting a
composed of several business partners that share the costs product or service to other people. | viral marketing
A(n) ______________ is a company, university, or and resources for the development or production of a
nonprofit organization that supports promising businesses product or service. | virtual corporation According to the __________________ revenue model,
in their initial stages of development | incubator companies receive commissions for referring customers to
A__________________ Web site does little more than others EC Web sites. | affiliate fees
A(n) ______________ is a type of pop-up ad that appears provide information about the business and its products. |
after a user clicks a link and remains while content is informational According to the __________________ revenue model,
loading to capture the users attention for a short time, either customers page a fixed amount, usually monthly, to receive
as a promotion or a lead-in to the sites homepage or to acceptable use policy (AUP) | Policy that informs users of some type of service. | subscription fees
advertise a product or a service. | interstitial their responsibilities when using company networks,
wireless devices, customer data, and so forth. According to the Business Environment Impact Model,
A(n) ______________ is defined as a group of people that ___________ provide support to organizations activities
have some kind of commercial or business relationship acceptance testing | Determining whether a Web site meets and to actual performance, countering business pressures. |
such as the relationships between sellers and buyers, buyers the original business objectives and vision. EC and IT
among themselves, buyers and suppliers, and colleagues
and other colleagues. | business network access control | Mechanism that determines who can According to the Business Environment Impact Model,
legitimately use a network resource. provide support to organizations activities and to actual
A(n) ________________ is an exact duplicate of the performance, countering business pressures. | EC and IT
original Web site physically located on a Web server on Access control involves authorization and authentication. |
another continent | mirror site True According to the CSI Computer Crime and Security
Survey, firewalls were the most commonly used defense
A(n) _________________ is a computer system capable of Access to a network ought to be based on: | a. the policy of technologies in 2008. | FALSE
integrating, storing, editing, | a. geographical information least privilege where access to network resources are
system blocked and According to the CSI Computer Crime Security Survey, the
most frequently occurring computer attacks were from
A(n) _________________ is a computer system capable of Access to a network ought to be based on: | the policy of viruses in 2008. | TRUE
integrating, storing, editing, analyzing, sharing, and least privilege where access to network resources are
displaying spatial information | geographical information blocked and permitted only when needed to conduct According to the EC consumer behavior model, personal
system business. characteristics and environmental characteristics are
classified as: | independent variables
A(n) _________________ is a computer system capable of According to a survey by Credit Research Foundation, the
integrating, storing, editing, analyzing, sharing, and major reasons companies turn to EIPP solutions are all of According to the model, an organization can increase brand
displaying spatial information. | geographical information the following EXCEPT: | elimination of billing disputes awareness or even generate sales by Web-based word-of-
system mouth marketing or promoting a product or service to other
According to an Australian Government 2.0 task force people. | viral marketing
A(n) _________________ is a wealthy individual who report, by embracing Government 2.0 governments can: |
contributes personal funds and possibly expertise at the do all of the above. According to the revenue model, companies receive
earliest stage of business development | angel commissions for referring customers to others EC Web
According to an InformationWeek survey of business sites. | affiliate fees
A(n) __________________ Web site does little more than technology experts, wikis are the most useful Web 2.0 tools
provide information about the business and its products | in Enterprise 2.0. | FALSE According to the revenue model, customers page a fixed
informational amount, usually monthly, to receive some type of service. |
According to data from eMarketer, approximately subscription fees
____________________ shop online and/or research
6
ad management | Methodology and software that enable All click-and-mortar retailers started life as a traditional All of the following are benefits of e-auctions to buyers
organizations to perform a variety of activities involved in storefront with a physical retail presence only and over except: | can liquidate large quantities quickly.
Web advertising (e.g., tracking viewers, rotating ads). time adopted an online transactional capability as well
(brick only to brick-and-click). | F All of the following are benefits of letters of credit (LCs)
ad views | The number of times users call up a page that EXCEPT: | LCs are cheap and easy to establish.
has a banner on it during a specific period; known as All of the following about RFID are true EXCEPT: | an
impressions or page views. RFID tag can hold 20 times the amount of information a All of the following are correct about market research
bar code can hold..100 feet methods EXCEPT: | Direct mail marketing methods are
Address Verification System (AVS) | Detects fraud by usually cost-effective.
comparing the address entered on a Web page with the All of the following about RFID are true EXCEPT: | An
address information on file with the cardholders issuing RFID tag can hold 20 times the amount of information a All of the following are critical success factors (CSFs) of
bank. bar code can hold, and the tag can be read through the Old Economy EXCEPT: | Create new partnerships, stay
cardboard, wood, and plastic at a range of up to 100 feet. with core competency.
Addressing mission-critical, high-volume transaction
processes is the goal of: | production workflow All of the following about RFID are true EXCEPT: | an All of the following are elements of a companys strategy
applications. RFID tag can hold 20 times the amount of information a EXCEPT: | c. day-to-day operations.
bar code can hold, and the tag can be read through
Advantages of the electronic job market for employers cardboard, wood, and plastic at a range of up to 100 feet All of the following are examples of e-government
include each of the following except | charging online <456> EXCEPT: | a company sells army and navy surplus
processing fees. supplies at auction over the Internet.
All of the following about RFID are true EXCEPT: | b. an
Advantages of the electronic market for job seekers include RFID tag can hold 20 times the amount of information a All of the following are examples of interactive
each of the following except | competing with less qualified bar code can hold, entertainment EXCEPT: | purchasing theatre tickets online.
applicants.
All of the following about the strategic planning process All of the following are important security functions of
Advertisement model | 1400712649430 are true EXCEPT: | d. The strategic planning process proxy servers except: | d. They improve network
begins with strategy formulation. performance.
Advertising in chat rooms, blogs, or social networks can
achieve each of the following EXCEPT: | They improve a All of the following about wireless wide area networks All of the following are potential benefits from auctions to
companys search engine ranking. (WWAN) are true EXCEPT: | a. The single WWAN sellers EXCEPT: | c. sellers are always anonymous.
network standard insures compatibility of handsets within
Advertising in chat rooms, blogs, or social networks can All of the following are potential drawbacks of e-learning
and
achieve each of the following | c. they can be used as one- EXCEPT: | b. knowledge retention is lower than in
to-one connections between a company and its customers All of the following about wireless wide area networks traditional classrooms.
(WWAN) are true EXCEPT: | The single WWAN network
Advertising in chat rooms, blogs, or social networks can All of the following are potential sources of revenue for an
standard insures compatibility of handsets within and
achieve each of the following EXCEPT: | they can be used between countries. exchange EXCEPT: | shipping and handling fees.
as one-to-one connections between a company and its
customers All of the following are potential sources of revenue for
All of the following apply to EC in developing economies
online independent travel agents EXCEPT: | direct
EXCEPT: | Developing economies struggle with various
affiliate marketing | A marketing arrangement by which an issues that create too many business and technology risks marketing revenues.
organization refers consumers to the selling companys Web to justify investment in those economies at this time.
site. All of the following are problems in implementing e-
Government EXCEPT: | b. the technology needed to
All of the following apply to instant video EXCEPT: | d.
Affiliate marketing refers to using banner advertisements to The highest quality approach is to add video cameras to the implement stage 6 of the Deloitte transformation process
bring customers to your site. | False does
participants computers.
Affiliate model | 1400712654817 All of the following are problems in implementing e-
All of the following apply to instant video EXCEPT: | The
Government EXCEPT: | the technology needed to
Affiliate programs can only be used in B2C models. | False highest quality approach is to add video cameras to the implement stage 6 of the Deloitte transformation process
participants computers
does not exist yet
After an EC project has been implemented, the testing of
All of the following apply to social network theory
the quality of user's experience when interacting with the All of the following are problems in implementing e-
EXCEPT | Between a set of nodes, there is one kind on tie.
site is called: | usability testing. Government EXCEPT: | the technology needed to
All of the following are advantages of building Web sites implement stage 6 of the Deloitte transformation process
After an EC project has been implemented, the testing that
internally EXCEPT | it provides the fastest speed to market does not exist yet.
is done to assure various modules in the project work
together is called: | integration testing All of the following are advantages of e-learning EXCEPT: All of the following are situations when a business plan
| college professors are anxious to develop new online should be done EXCEPT: | a. When an existing business is
After four years in business, a magazine publisher decides deploying a CRM system.
courses.
to add the online distribution of its magazine to its existing
traditional publishing business. The company would need All of the following are advantages of e-learning All of the following are true about product lifecycle
to develop a: | business case. EXCEPT:: All of the following are advantages of e- management (PLM) EXCEPT: | The demand for PLM is
learning EXCEPT: | All of the following are advantages of limited because it does not apply to products that have
Agentrics is the worlds largest B2C exchange for retailers, short life cycles or are complex.
e-learning EXCEPT:
such as Sears and Best Buy, whose objective is to simplify
and automate supply chain processes. | F All of the following are true about product lifecycle
All of the following are advantages of using purchase cards
EXCEPT: | they are widely accepted in international trade. management (PLM) EXCEPT: | The demand for PLM in
Agents can be used in B2B marketplaces to collect product limited because it does not apply to products that have
data. | True All of the following are barriers to location-based m- short lifecycles or are complex <337+338>
commerce EXCEPT: | a. There are presently not enough
Alibaba China is Chinas largest online marketplace for All of the following are true about YouTube EXCEPT: |
location-based systems to make this a viable
both domestic and international trade among Yahoo! purchased YouTube for US$1.65 billion in stock in
businesspeople and a trusted community of members who All of the following are barriers to location-based m- 2006
regularly meet, chat, search for products, and do business commerce EXCEPT: | There are presently not enough
online. | F location-based systems to make this a viable technology. All of the following are types of communication and
collaboration done in real time EXCEPT: | blogging
All are benefits of B2B except: | B2B increases channel All of the following are benefits of e-auctions to buyers
conflict. except: | A) can liquidate large quantities quickly.
7
All of the following are types of communication and Although both marketplaces and marketspaces can sell An auction in which there is one buyer and many potential
collaboration done in real time EXCEPT: | *blogging physical products, the marketspace can also sell digital sellers; or in which a buyer places an item for bid on an
products. | TRUE RFQ system and the lowest bid wins is referred to as all of
All of the following are ways to use the Internet to find the following EXCEPT: | Reverse auctions.
information about an individual EXCEPT | Stealing the Although both marketplaces and marketspaces can sell
individuals computer physical products, the marketspace can also sell digital An auction in which there is one buyer and many potential
products. | True sellers; or in which a buyer | b. forward auctions.
All of the following are ways to use the Internet to find
information about an individual | a. Stealing the individuals Although there are practical advantages to being an e-tailer, An auction is a competitive process and market mechanism
computer. such as lower overhead costs, it has many drawbacks and that uses a competitive process by which a seller solicits
barriers so the winners in many market segments will be consecutive bids from buyers or a buyer solicits bids from
All of the following are ways to use the Internet to find companies that use the click-and-mortar approach. | T sellers. | T
information about an individual EXCEPT: | Stealing the
individuals computer. Although used occasionally in 132C commerce, An auction is a market mechanism that uses a competitive
customized catalogs are especially useful in 13213 e- process by which a seller solicits consecutive bids from
All of the following categories have already been selling commerce for each of the following reasons EXCEPT: | buyers or a buyer solicits bids from sellers. | TRUE
well online EXCEPT: | new cars Intranets, in particular, can deliver customized catalogs to
different business customers. An auction is a market mechanism that uses a competitive
All of the following describe system scalability EXCEPT | process by which a seller solicits consecutive bids from
Scalability dimensions are independent because scaling up Although used occasionally in B2C commerce, customized buyers or a buyer solicits bids from sellers. | True
the size of the system in one dimension does not affect the catalogs are especially useful in B2B e-commerce for each
other dimensions. of the following reasons EXCEPT: | Intranets, in particular, An auction is characterized by the competitive nature by
can deliver customized catalogs to different business which the final price is reached. | True
All of the following determine the degree of collaboration customers.
between off-line and online | c. the pricing strategy. An EC model in which all of the participants are either
Amazon e-commerce system is an example of businesses or other organizations is | business-to-business
All of the following determine the degree of collaboration _____________ | Pure-play e-tailers (B2B) e-commerce.
between off-line and online activities in a business
EXCEPT: | the pricing strategy Amazon.com experienced all of the following EXCEPT: | An EC security strategy requires multiple layers of defense
The companys financial success has been assured. against risks from malware, fraudsters, customers, and
All of the following determine the degree of collaboration employees. | TRUE
between off-line and online activities in a business Amazon.com experienced each of the following except |
EXCEPT: | the pricing strategy. establishing a grocery delivery service called An electronic card that contains information that can be
AmazonConnect. used for payment purposes best describes: | payment card
All of the following statements apply to hate Web sites
EXCEPT: | The intent of most hate Web sites is to commit Among the forms of online B2B payments, An electronic shopping cart is an order-processing
fraud _____________ is second only to ACH in terms of technology that allows customers to accumulate items they
frequency of use. | Fedwire, or wire transfe wish to buy while they continue to shop. | T
All of the following statements apply to hate Web sites
EXCEPT: | d. The intent of most hate Web sites is to An ______ is a virtual marketplace in which sellers and An electronic shopping cart is an order-processing
commit fraud. buyers meet and conduct different types of transactions. | e- technology that allows customers to accumulate items they
store wish to buy while they continue to shop. | TRUE
All of the following would be considered c-commerce
EXCEPT: | aggregating catalogs on a central server. An ACS System: | Verifies addresses against purchasers An electronic storefront includes several mechanisms that
are necessary for conducting the sale. The most common
All the activities that are related to order aggregation and An ad that appears underneath the current browser window, mechanisms include each of the following EXCEPT: | a
fulfillment, inventory management, purchasing from so when the user closes the active window the ad is still on supply chain
suppliers, accounting and finance, insurance, payment the screen describes | pop-under ad.
processing, packaging, and delivery are done in what is An e-marketplace does not have to be centered around a
termed the_______ of the business. | back end An ad that appears underneath the current browser window, physical location. | True
so when the user closes the active window the ad is still on
All the activities that are related to order aggregation and the screen describes: | pop-under ad. An e-tailer can use cookie files and other technologies to
fulfillment, inventory management, purchasing from track the specific browsing and buying behavior of each
suppliers, accounting and finance, insurance, payment An advantage of e-checks is that they: | fit current business consumer. With that information, the e-tailer can create a
processing, packaging, and delivery are done in what is practices, and so require little process reengineering. marketing plan tailored to that consumers pattern by
termed the of the business. | back end showing items of interest or offering incentives that appeal
An advantage of the electronic job market for job seekers is to that consumers sense of value, which is referred to as |
All the activities that are related to order aggregation and that they can assess their market value. | TRUE personalization.
fulfillment, inventory management, purchasing from
suppliers, accounting and finance, insurance, payment An agreement that requires computer users to take specific An e-tailer uses cookies to identify returning customers and
processing, packaging, and delivery are done in what is steps to allow the collection of personal information is to provide suggested products for purchase based on prior
called the ______ of the business. | front end called: | opt-in. shopping behavior. This is an example of: | personalization.
Also known as private industrial networks are Web-based An analytical tool in which a company looks for points of An e-tailer uses cookies to identify returning customers and
networks owned by one large seller or buyer for inter- differentiation between | b. competitor analysis grid to provide suggested products for purchase based on prior
organizational communications. | company-centered shopping behavior. This is an example of _________ |
networks An analytical tool in which a company looks for points of personalization
differentiation between competitors and itself is called: |
Although a companys success is clearly dependent on competitor analysis grid An example of a successful aggregation of suppliers'
finding and retaining customers, its success may be far catalogs is that of ________, which aggregates more than
more dependent on what is behind the Web page than on An attack on a website in which an attacker uses 10,000 items from the catalogs of approved suppliers into
what is on the Web page. | T specialized software to send a flood of data packets to the an internal electronic catalog. | MasterCard International
target computer with the aim of overloading its resources
Although both marketplaces and marketspaces can sell best describes: | denial-of-service attack. An example of business-to-consumer (B2C) is when Dell
physical products, the marketspace also can sell digital provides customer service online by collaborating
products, which are goods that can be transformed to An attack using a previously unknown vulnerability electronically with its partners. | False
digital format and delivered instantly over the Internet. | T compromises a system. What type of attack is described? |
Zero-day incident An example of G2C is a: | driver paying for the renewal of
his auto tag online.
8
An example of G2C is: | b. a driver applies for and pays for An online seller of travel services that generates revenue by are markets in which the individual sell-side or buy-side
the renewal of his auto tag online. charging fees for its services is an example of a(n): | company has complete control over participation in the
transaction broker. selling or buying transaction. | Private e-marketplaces
An exchange charges an annual fee of $25,000 for all
parties who want to trade in the exchange. The revenue An online university from which students take classes from are markets that concentrate on a service, product, or
model in use by this exchange is the: | membership fee home or other offsite locations, usually via the Internet best materials that are used in various types of industries such
model. describes: | virtual university. as office supplies or PCs. | Horizontal marketplaces
An exchange that handles materials used by companies in An order-processing technology that allows customers to are markets that deal with one industry or industry segment
different industries is referred to as a accumulate items they wish to buy while they continue to such as steel or chemicals. | Vertical marketplaces
____________________ | horizontal exchange shop best defines. | electronic shopping cart.
are meta-search engines that search a range of related sites
An exchange that handles materials used by companies in angel investor | A wealthy individual who contributes or search engines, seeking the best product or service for a
different industries is referred to as a(n): | horizontal personal funds and possibly expertise at the earliest stage particular consume. | Travel bots
exchange of business development.
are online markets owned and operated by a single
An exchange that handles materials used by companies in Animation characters that can talk are known as | company and may be either sell-side or buy-side. | Private
different industries is | b. horizontal exchange <264> chatterbots. e-marketplaces
An exchange that handles materials used by companies in Anna's company sells a variety of products to her business are online markets owned and operated by a single
different industries is referred to as a(n): | horizontal clients. What type of model is she using? | Sell-side company. | Private e-marketplaces
exchange <264> marketplace
are online meetings whose members are in different
An exchange whose members are in one industry or Apple and Google undertook a formal merger to offer locations, even in different countries. | Virtual meetings
industry segment and that trades only in materials/services iPhone capabilities, such as delivering Google services
unique for that industry is referred to as a(n): | vertical through Apple hardware. | FALSE are organizations that conduct their business activities
exchange solely online. | Virtual (pure-play) organizations
application controls | Controls that are intended to protect
An extranet is a network that uses private corporate specific applications. are portals that offer fairly routine content for broad
networks to link together multiple intranets. | False audiences and are the most popular portals on the Internet;
Applying business analytics techniques and business e.g., yahoo.com, aol.com, and msn.com. | Commercial
An extranet is a network that uses the Internet to link intelligence such as data mining and online analytic (public) portals
together multiple intranets. | True processing to CRM applications describes what? | Analytic
CRM are private, third-party-managed common carriers that
An extranet uses private data lines to connect several provide communications services and security and which
intranets. | False Approximately what percent of Internet shoppers use are used to implement traditional EDI systems. | Value-
search engines to find products and services? | 75% added networks (or VANs)
An important category of intangible benefits is
____________ factors that include comfort to employees, are a popular online publishing technology for creating a are retailers who conduct business in the physical world, in
impact on the physical environment, changes to the power Web page that can be edited by anyone with a standard traditional stores. | Brick-and-mortar retailers
distribution in an organization, and preventing invasion of Web browser. | Wikis
the privacy of employees and customers. | social subsystem are sites that evaluate and verify the trustworthiness of e-
are becoming a necessity in many industries due to the tailers | Trust verification sites
An intermediary is a third party that operates between information glut. | Specialized search engines
sellers and buyers. | TRUE are third-party vendors that conduct promotions, especially
are computer-based whiteboards that work like real-world large-scale ones. | Admediaries
An internal corporate network that uses Internet tools, such whiteboards with markers and erasers, except all
as Web browsers, is known as an intranet. | True participants can join in. | Interactive whiteboards are those that conduct some EC activities, usually as an
additional marketing channel. | Click-and-mortar (or click-
An Internet acceptable use policy (AUP) is an important are customers who are willing to shop online because they and-brick) organizations
safeguard because | without a formal AUP, it is much more dislike going to grocery stores. | Shopping avoiders
difficult to enforce acceptable behaviors and eliminate are those who are young and comfortable with technology.
unacceptable behaviors, and punish violators are extremely busy customers willing to shop online in | New technologists
order to free up time. | Time-starved customers
An intranet is a private network that uses Internet are tiny graphics files embedded in e-mail messages and in
protocols. | True are financial institutions that provides a customer with a Web sites that transmit information about users and their
payment card. | Issuing banks movements to a Web server. | Web bugs
An intranet is an internal network for companies that uses
Internet standards. | True are firms that conduct retail business online. | E-tailers are tools that combine data from two or more Web sites to
create new applications | Mashups
An item is offered with a minimum bid. The winner pays are formal agreements regarding the division of work
the exact price of his bid. What type of auction is being between a company and its vendors. | Service level are trading venues open to all interested parties (many
described? | Forward auction agreements sellers and many buyers) that use a common technology
platform and that are usually run by third parties or
An objective of conducting market research is to are gateways to storefronts and e-malls that may be industry consortia. | Public e-marketplaces (or public
understand the relationships between dependent and comprehensive or niche oriented. | Shopping portals exchanges or exchanges)
intervening variables so that vendors can make informed
decisions on the intervening variables. | T are gateways to storefronts and e-malls. | Shopping portals are virtual communities organized by an interest, such as
political parties, or by product, company, or health topic |
are information portals for businesses | B2B portals Affinity portals
An online community that harnesses the power of one's
social networks for the introduction, buying, and selling of
are many-to-many e-marketplaces in which many buyers Arrange the following items in the correct order of
products, services, and resources, including one's own
and many sellers meet electronically to trade with each Knowledge Management (start at the top, end at the
creations describes: | social marketplace.
other. | Exchanges bottom) | ,Create and
An online intermediary that offers businesses access to capture,Refine,Store,Manage,Disseminate,Assess and
are markets in which companies can trade or exchange
hundreds of parts and services provided by multiple evaluate
placement of banner ads on each others Web sites. | Banner
suppliers is called | e-procurement
exchanges Arrange the following items in the correct order of the EC
order fulfillment process (beginning step at top, and ending
9
step at the bottom) | ,Making sure the customer will auction | A competitive process in which a seller solicits B2B EC can increase the efficiency and effectiveness of
pay,Checking for in-stock availability,Arranging consecutive bids from buyers (forward auctions) or a buyer supply chains or dramatically change the supply chain by
shipments,Replenishment,Contacts with customers solicits bids from sellers (backward auctions). Prices are eliminating one or more intermediaries. | True
determined dynamically by the bids.
As a company moves to incorporate an online presence B2B EC transactions that involve one seller selling to many
with its traditional brick-and-mortar operation, it adds the Auction sites like eBay have increased opportunities for buyers is called an exchange. | F
costs related to training for all personnel in the capabilities __________ marketing. | C2C
of the EC system and a new advertising campaign to B2B only includes electronic transactions between
announce its new site to the costs directly associated with Auctions are all of the following EXCEPT: | a. They are businesses conducted over the public Internet. | False
building the new Web presence. In this case, training and suitable for most consumer goods.
advertising are examples of: | complementary investments. B2B payments are part of a much larger financial supply
Auctions are based on dynamic pricing. | TRUE chain that includes all of the | b. financial reporting.
As in e-commerce, m-commerce B2C applications are
concentrated in each of the | c. c. telecommunications Auctions done in exchanges or double auctions are B2B payments are part of a much larger financial supply
____________ auctions. | d. many buyers, many sellers chain that includes all of the following EXCEPT: |
As in e-commerce, m-commerce B2C applications are financial reporting.
concentrated in each of the following areas EXCEPT: | c. Auctions done in exchanges or double auctions are
telecommunications auctions. | many buyers, many sellers B2B portals | Information portals for businesses.
As the volume of customers, products, vendors, and audit | An important part of any control system. Auditing B2B systems which are used for communication, design,
information increases, it becomes uneconomical, or even can be viewed as an additional layer of controls or planning, information sharing, and information discovery
impossible, for customers to consider all relevant safeguards. It is considered as a deterrent to criminal are called: | collaborative commerce.
information and available products and services. The actions especially for insiders.
B2B transactions that involve communication, design,
practical solution to handling such information overload is
authentication | Process to verify (assure) the real identity planning, information sharing, and activites beyond
to | use software or intelligent agents.
of an individual, computer, computer program, or EC Web financial transactions among business partners is referred
As with any IT project, management needs to be able to site. to as ____________. | collaborative commerce
justify the development and use of a corporate portal by
Authentication provides the means to reconstruct what B2B transactions that involve communication, design,
comparing its cost with its benefits. The challenge is that
specific actions have occurred and may help EC security planning, information sharing, and activities beyond
despite the tangible benefits from investment in portal
investigators identify the person or program that performed financial transactions among business partners is referred
technology, such as include increased revenues and unauthorized actions. | True to as ____________ | collaborative commerce
customer loyalty, most of the benefits of portals are
intangible. | T authorization | Determines whether a buyers card is active B2BBusiness.com offers classified ads, a fixed price
and the customer has sufficient funds. catalog, auctions and community services. What type of
Association ABC helps its members get discounts on the B2B many-to-many model are they using | B2B portal
purchases by buying in bulk. What type of business model Automated Clearing House (ACH) Network | A nationwide
are they using? | Group purchasing batch-oriented electronic funds transfer system that B2BBusiness.com offers classified ads, a fixed price
provides for the interbank clearing of electronic payments catalog, auctions and community services. What type of
Assurance that stored data has not been modified without for participating financial institutions. B2B many-to-many model are they using? | B2B portal
authorization and a message that was sent is the same
message that was received is referred to as: | integrity. Automated warehouses for 132C companies are designed: | B2C and B2B orders have similar order-fulfillment
to facilitate the delivery of small quantities of product to a processes and pricing models. | False
At hospitals and supermarkets, inventory reorder points
very large number of customers.
have been automated so that when inventory gets down to a back end | The activities that support online order
certain point the system will automatically notify a human Automated warehouses for 132C companies are designed: | fulfillment, inventory management, purchasing from
of the exact amount to reorder. | F to facilitate the delivery of small quantities of product to a suppliers, payment processing, packaging, and delivery.
very large number of customers.
At the center of every exchange is a the third party that balanced scorecard | A management tool that assesses
operates the exchange and, in many cases, may also own it. Automated warehouses for B2C companies are designed: | organizational progress toward strategic goals by
| market maker c. to facilitate the delivery of small quantities of product to measuring performance in a number of different areas.
a very large number of
Attracting and retaining loyal customers is the most banking Trojan | A Trojan that comes to life when
important issue for e-tailers because customer loyalty can Automated warehouses for B2C companies are designed: | computer owners visit one of a number of online banking
lower marketing and advertising costs, transaction costs, to facilitate the delivery of small quantities of product to a or e-commerce sites.
customer turnover expenses, and failure costs such as very large number of customers.
warranty claims. | T Banks are more selective about who gets an account for
autoresponders | Automated e-mail reply systems (text files accepting credit cards online because | CNP transactions
Attracting and retaining loyal customers is the most returned via e-mail) that provide answers to commonly are less secure and riskier
important issue for e-tailers because customer loyalty can asked questions.
lower marketing and advertising costs, transaction costs, banner | On a Web page, a graphic advertising display
customer turnover expenses, and failure costs such as availability | Assurance that access to data, the Web site, or linked to the advertisers Web page.
warranty claims. | TRUE other EC data service is timely, available, reliable, and
restricted to authorized users. Banner ads that appear when a predetermined word is
Attracting large business sellers to public exchanges is queried from a search engine are | keyword banners.
often difficult for all of the following reasons EXCEPT: | avatars | Animated computer characters that exhibit
advertising costs in public exchanges are very expensive. humanlike movements and behaviors. Banner advertising on Web sites helps trigger a realization
that there is a gap between reality and a desired state,
Attracting large business sellers to public exchanges is B which occurs in the __________ stage of the EC purchase
often difficult for all of the | c. advertising costs in public decision-making process. See figure | need identification
exchanges are very expensive <288> B2B can increase the efficiency and effectiveness of supply
chains or dramatically change the supply chain by Banner advertising on Web sites helps trigger a realization
Attracting large business sellers to public exchanges is eliminating one or more intermediaries. | F that there is a gap between reality and a desired state,
often difficult for all of the following reasons EXCEPT: | which occurs in the stage of the EC purchase decision-
advertising costs in public exchanges are very expensive B2B consortia may face antitrust challenges. Which of the making process. | need identification
<288> following would probably not signal suspicion in a B2B
consortium exchange? | Rapidly falling prices for end users Banner advertising on Web sites helps trigger a realization
attractors | Web site features that attract and interact with that there is a gap between reality and a desired state,
visitors in the target stakeholder group.
10
which occurs in the ________ stage of the EC purchase Before the Internet, the trading process for raw and Booking tickets on Facebook without leaving the social
decision-making process. | need identification partially processed chemicals, plastics, and fuel oil was network is an example of enterprise social commerce. |
each of the following EXCEPT: | disintermediated False
Bargaining power of suppliers is not one of Porter's five
forces. | False behavioral targeting | The use of information collected on both A and B together determine C | (A,B) --> C
an individuals Internet-browsing behavior to select which
Barriers inhibiting B2B electronic payment include all of advertisements to display to that individual. Both online banks and click-and-mortar banks carry some
the following EXCEPT: | strict standard formats for risks and problems, especially in international banking,
remittance information. Being the first mover in a market may help eliminate which including hackers and liquidity risk. | TRUE
of the following problems with exchanges? | Too many
bartering | The exchange of goods and services. exchanges botnet | A huge number (e.g., hundreds of thousands) of
hijacked Internet computers that have been set up to
bartering exchange | An intermediary that links parties in a Benefits of e-auctions to sellers include: | optimal price is forward traffic, including spam and viruses, to other
barter; a company submits its surplus to the exchange and determined by the market. computers on the Internet.
receives points of credit, which can be used to buy the
items that the company needs from other exchange Benefits of e-commerce to customers include: | all of the Brand building is important in B2B exchanges because: | it
participants. above. is easy for exchange members to change to another
exchange.
Basic marketing model is based on 4P factor. There are Benefits of e-learning include: | all of the above.
Product, Price, Promotion, and __________ | Place Brand building is not important in establishing an
Benefits of electronics auctions (e-auctions) to sellers exchange. | False
Basic options for developing an EC Web site include each include all of the following | b. Anonymity
of the following except: | clone a competitor's Web site. brick-and-mortar (old economy) organizations | Old-
Benefits of electronics auctions (e-auctions) to sellers economy organizations (corporations) that perform their
Because conducting reverse auction in B2B can be afairly include all of the following EXCEPT: | Anonymity primary business offline, selling physical products by
complex process, a(n) | b. third-party intermediary means of physical agents.
Benefits of e-procurement over traditional procurement
Because conducting reverse auction in B2B can be afairly methods include all of the following EXCEPT: | increasing brick-and-mortar (old economy) retailers | Retailers who do
complex process, a(n) may be essenial | third-party the skill requirements and training needs of purchasing business in the non-Internet, physical world in traditional
intermediary agents. brick-and-mortar stores.
Because conducting reverse auctions in B2B can be a fairly Benefits of e-procurement over traditional procurement Brick-and-mortar organizations | Old-economy
complex process, a(n) ________ may be essential. | open methods include each of the following except: | increasing organizations (corporations) that perform their primary
RFQ the skill requirements and training needs of purchasing business offline, selling physical products by means of
agents. physical agents
Because conducting reverse auctions in B2B can be a fairly
complex process, a(n) ________ may be essential. | third- Benefits of using a third-party hosting company for Briefly describe four major components for protecting
party intermediary conducting B2B auctions instead of developing an auction internal information flow inside an organization. | Firewall,
site in-house include all of the following EXCEPT: | Time- virtual private network, intrusion detection system, and
Because exchanges are providing a service, they do not to-market of several weeks. honeynet and honeypot are four components. A firewall is
require a revenue model. | False a single point between two or more networks where all
Bidders sometimes use phantom bidders to drive bid prices traffic must pass; the device authenticates, controls, and
Because of the complexity in building large e-marketplaces up rapidly at the beginning | a. bid shielding
logs all traffic. A virtual private network is a network that
and exchanges, it is usually performed by a major B2B
uses the public Internet to carry information but remains
software company, such as Ariba or IBM, and a Bidders sometimes use phantom bidders to drive bid prices
private by using encryption to scramble the
management consulting company, such as up rapidly at the beginning of an auction, thus discouraging
PricewaterhouseCoopers, usually participates. | T communications, authentication to ensure that information
bidding from legitimate bidders. At the last minute, the
has not been tampered with, and access control to verify
phantom bidders pull out, which awards the item to a very
Because of their large number of buyers and sellers, B2B the identity of anyone using the network. Intrusion
low bidding customer. This practice is called: | bid
exchanges and other e-marketplaces do not face anti-trust shielding detection systems are a special category of software that
or other competition laws. | F monitor activity across a network or on a host computer,
biometric control | An automated method for verifying the watch for suspicious activity, and take automated action
Because of their visibility and large sales volumes, larger identity of a person based on physical or behavioral based on what it sees. A honeynet is a network of
firms are more susceptible to fraud than medium-sized characteristics. honeypots, and honeypots act as decoys and are watched to
firms. | False study how network intrusions occur.
biometric systems | Authentication systems that identify a
Because of these interrelationships, the business model of person by measurement of a biological characteristic, such Briefly discuss the five encryption components. | The five
the Internet economy has been called the | Internet as fingerprints, iris (eye) patterns, facial features, or voice. components are plaintext, encryption algorithm, key or key
ecosystem value, key space, and ciphertext. Plaintext is the original
biometrics | An individuals unique physical or behavioral message or document that is created by the user and is in
Because online buyers decisions depend on numerous characteristics that can be used to identify an individual human-readable form. The encryption algorithm is the set
independent and intervening variables, decisions made by precisely (e.g., fingerprints). of procedures or mathematical functions used to encrypt or
customers are classified as: | dependent variables decrypt a message. The key or key value is the secret value
blog | A personal Web site that is open to the public to read used with the algorithm to transform the message. Key
Because the rate of change and the level of uncertainty are and to interact with; dedicated to specific topics or issues. space refers to the large number of possible key values
expected to accelerate, organizations are | operating under created by the algorithm to use when transforming the
increasing pressures to produce more products, faster, and Blue computing is the study and practice of ecofriendly message. Ciphertext is the message or document that has
with fewer resources. computing resources. | False been encrypted into unreadable form.
Before choosing the appropriate Web site development Bluetooth | A set of telecommunications standards that Broadly, ______ refers to marketing that takes place
option, you need to consider all of the following issues in enables wireless devices to communicate with each other without intermediaries between manufacturers and buyers;
order to generate a list of requirements and capabilities over short distances. or marketing done online between any seller and buyer. |
EXCEPT | What might be the reaction of competitors? direct marketing
Bluetooth is a technology that allows for the transmission
Before the dot-com bubble burst, a proposed B2C venture of data using a radio frequency. | True Broadly, marketing that takes place without intermediaries
that could legitimately claim __________ had relatively between manufacturers and buyers describes ________. |
little trouble getting startup funding. | d. first mover status Boeing designing a product together with a business
direct marketing
partner is this type of interaction: | Collaborative
Commerce
11
Brokers and infomediaries are two types of online business social network | A social network whose primary By increasing customer loyalty, EC companies can achieve
intermediaries. | TRUE objective is to facilitate business connections and activities. each of the following benefits EXCEPT: | lower resistance
to competitors.
Building consumer trust in EC can be achieved through business-oriented networks | Social networks whose
integrity, which is a users confidence in the ability of the primary objective is to facilitate business. By purchasing a textbook from Amazon, e-commerce is
online store to fulfill its promises such as a money-back profoundly changing markets, industry structures, products
guarantee. | T Business-oriented social networks are owned and operated and services, consumer segmentation, consumer values and
within one enterprise, and their members are usually consumer behavior; jobs, and labor markets. | True
build-to-order (pull system) | A manufacturing process that employees of the enterprise. | FALSE
starts with an order (usually customized). Once the order is By purchasing a textbook from Amazon.com and having
paid for, the vendor starts to fulfill it. business-to-business (B2B) | E-commerce model in which the merchandise physically delivered, Amazon.com would
all of the participants are businesses or other organizations. be considered a click-and-mortar organization because pure
build-to-order which allows customers to configure their EC did not occur. | True
own customized systems | E-business business-to-business e-commerce (B2B EC) | Transactions
between businesses conducted electronically over the By using the Internet and automatic-response software
bullwhip effect | Erratic shifts in order up and down supply Internet, extranets, intranets, or private networks; also agents for customer service, companies have been able to
chains. known as eB2B (electronic B2B) or just B2B. reduce their customer service costs by up to fifty percent. |
F
Business A provides a system of credits that allow other Business-to-business e-commerce is also known B2B and
businesses to make online purchases. What role is Business refers to transactions between businesses conducted By using the Internet and automatic-response software
A performing? | Issuer electronically over the Internet, extranets, intranets, or agents, GE reduced the cost of customer service calls from
private networks. | T $5.00 per call when done by phone to ______ per
business case | A document that justifies the investment of electronically answered call. | $0.20
internal, organizational resources in a specific application business-to-business-to-consumer (B2B2C) | E-commerce
or project. model in which a business provides some product or By using the Internet and automatic-response software
service to a client business that maintains its own agents, GE reduced the cost of customer service calls from
business continuity plan | A plan that keeps the business customers. $5.00 per call when done by phone to perelectronically
running after a disaster occurs. Each function in the answered call. | $0.20
business should have a valid recovery capability plan. business-to-consumer (B2C) | E-commerce model in which
businesses sell to individual shoppers. By using the Internet and automatic-response software
business ethics | A form of applied ethics that examines agents, GE reduced the cost of customer service calls from
ethical principles and moral or ethical problems that arise business-to-employees (B2E) | E-commerce model in $5.00 per call when done by phone to per electronically
in a business environment. which an organization delivers services, information, or answered call. | $0.20
products to its individual employees.
business impact analysis (BIA) | An exercise that C
determines the impact of losing the support of an EC button | A small banner that is linked to a Web site. It can
resource to an organization and establishes the escalation contain downloadable software. can be supported more effectively and efficiently through
of that loss over time, identifies the minimum resources direct buyerseller offline or online negotiations, which can
needed to recover, and prioritizes the recovery of processes buyer (buyers industrial network) or by only one seller be done in private exchanges or private trading rooms in
and supporting systems. (sellers industrial network), and they may not be open to public exchanges. | Strategic purchases
all. | T
business intelligence | Activities that not only collect and can be supported more effectively and efficiently through
process data, but also make possible analysis that results in Buying an e-book from Amazon is an example of partial direct buyer seller offline or online negotiations, which can
usefulintelligentsolutions to business problems. electronic commerce. | False be done in private exchanges or private trading rooms in
public exchanges. | Strategic purchases
business model | A method of doing business by which a Buying decisions are the dependent variables because these
company can generate revenue to sustain itself. decisions depend on the independent and intervening Candidate Key | an attribute that uniquely determine the
variables. | T values of all the other attributes for a row in a relation
Business model refers to the series of value-adding
activities that an organization performs to achieve its goals, buy-side e-marketplace | A corporate-based acquisition site Capabilities of the Internet that have made it more difficult
such as making a profit, at various stages of the production that uses reverse auctions, negotiations, group purchasing, for companies to capture | d. The Internet makes it easier to
process. | False or any other e-procurement method. make secure payments.
Business models are a subset of a business plan or business By calculating the difference between TCO and TBO, one Capabilities of the Internet that have made it more difficult
case and refer to methods of doing business by which a can compute the ________ of an IT investment. | Payoff for companies to capture profits include all of the following
company can generate revenue. | True EXCEPT: | The Internet makes it easier to make secure
By combining bar coding and wireless technologies,
payments.
business network | A group of people who have some kind automobile dealers are able to scan in goods as they arrive
of commercial relationship; for example, sellers and electronically and place them in inventory up to 10 percent Capabilities of the Internet that have made it more difficult
buyers, buyers among themselves, buyers and suppliers, faster than previously. | F
for companies to capture profits include all of the following
and colleagues and other colleagues. EXCEPT: | The Internet makes it easier to make secure
By definition there are no commercial applications of C2C.
payments.
business plan | A written document that identifies a | False
companys goals and outlines how the company intends to Captcha tool | Completely Automated Public Turing test to
achieve the goals and at what cost. By definition, enterprise social networks are public. | False
tell Computers and Humans Apart, which uses a
By enabling sales force employees to record orders in real verification test on comment pages to stop scripts from
business process management (BPM) | Method for business posting automatically.
restructuring that combines workflow systems and redesign time, the organization | b. more extensive collaboration and
methods; covers three process categoriespeople-to-people, sharing of customer leads.
card verification number (CVN) | Detects fraud by
systems-to-systems, and systems-to-people interactions.
By enabling sales force employees to record orders in real comparing the verification number printed on the signature
time, the organization benefits through each of the strip on the back of the card with the information on file
Business process management systems monitor the with the cardholders issuing bank.
execution of the business processes so that managers can following EXCEPT: | more extensive collaboration and
analyze and change processes in response to data, rather sharing of customer leads.
Caterpillar Inc. created CAT U to meet its training and
than on just a hunch. | True learning needs. | True
By increasing customer loyalty, EC companies achieve
Business rating sites can aid consumer purchase decisions. | each of the following benefits except | lower click through Cellular radio technology divides areas geographically to
True rates.
support services. | True
12
certificate authorities (CAs) | Third parties that issue digital friends become involved in the shopping experience; social can host multiple collaboration spaces (c-spaces) in which
certificates. shopping attempts to use technology to mimic the social trading partners use c-enablers to exchange data with the c-
interactions found in physical malls and stores" | Social hub.
Challenges that Boeing faced with its global collaboration shopping
for the design and assembly process of its new Dreamliner collaborative commerce (c-commerce) | The use of digital
passenger plane included each of the following EXCEPT: | Choose the right term with the following description: The technologies that enable companies to collaboratively plan,
Lag time use of digital technologies that enable companies to design, develop, manage, and research products, services,
collaboratively plan, design, develop, manage, and research and innovative EC applications.
channel conflict | Situation in which an online marketing products, services, and innovative EC applications |
channel upsets the traditional channels due to real or collaborative commerce (c-commerce) Collaborative computing is an approach aimed at making
perceived damage from competition. the human-computer interface more natural. | False
Choose the right type of E-Commerce based on the
Channel conflict occurs when adding an online distribution following statement: "The e-commerce activities conducted collaborative filtering | A market research and
channel causes problems with existing distribution in social networks and/or by using social software (i.e., personalization method that uses customer data to predict,
channels. | T Web 2.0 tools)" | s-commerce based on formulas derived from behavioral sciences, what
other products or services a customer may enjoy;
Chaplin reports quarterly sales revenue from his business Choose the right types and activities in knowledge predictions can be extended to other customers with similar
to city hall over the Internet. | c. G2B e-commerce management (KM) Hint: choose multiple answers (6) | profiles.
Create,Capture,Refine,Store,Manage,Disseminate
Chaplin reports quarterly sales revenue from his business collaborative planning | A business practice that combines
to city hall over the Internet. He pays his local business tax Choppy connectivity is one of four trends that may slow the business knowledge and forecasts of multiple players
with a credit card. This is an example of: | G2B e- EC and Web 3.0 and even cripple the Internet. | TRUE along a supply chain to improve the planning and
commerce fulfillment of customer demand.
CIA security triad (CIA triad) | Three security concepts
Chaplins Pet Store has been in business for many years. important to information on the Internet: confidentiality, Collaborative planning usually only involves one firm. |
Chaplin, the present owner, decides to open an online sales integrity, and availability. False
channel where he can advertise and sell the same gourmet
pet food. This is an example of adding | a storefront CIOs need to effectively communicate the value of collaborative planning, forecasting, and replenishment
proposed EC projects in order to gain approval for all of (CPFR) | Project in which suppliers and retailers
Chaplin's Pet Store has been in business for many years. the following reasons EXCEPT: | Demand for expanding or collaborate in their planning and demand forecasting to
Chaplin, the present owner, decides to open an online sales initiating e-business projects is no longer strong so there optimize flow of materials along the supply chain.
channel where he can advertise and sell the same gourmet are fewer requests for funding.
pet food. This is an example of adding: | a Webstore. collaborative Website | A site that allows business partners
ciphertext | A plaintext message after it has been encrypted to collaborate.
Characteristics of 13213 payments include all of the into a machine-readable form.
following EXCEPT: | They require less rigor and security Collaborative workflow applications: | a. address project-
than 132C payments. civil litigation | An adversarial proceeding in which a party oriented and collaborative processes.
(the plaintiff ) sues another party (the defendant) to get
Characteristics of B2B payments include all of the compensation for a wrong committed by the defendant. Collaborative workflow applications: | address project-
following EXCEPT: | c. They require less rigor and oriented and collaborative processes
security than B2C payments. click (click-through or ad click) | A count made each time a
visitor clicks on an advertising banner to access the Combined with leadership, the
Characteristics of mobile devices that create special advertisers Web site. _______________________ is an indispensable kind of
requirements that hardware and software designers need to social network for properly running the business or project
anticipate when designing mobile computing systems click-and-mortar (click-and-brick) organizations | and to differentiate the business from similar ones. |
include all of the following EXCEPT: | broad bandwidth Organizations that conduct some e-commerce activities, entrepreneurial network
usually as an additional marketing channel.
Characteristics of the next generation Internet, Web 3.0, are Commodities with standard specifications (e.g., books,
expected to be all of the following EXCEPT | Decreased Click-and-mortar organizations | Organizations that CDs, airline tickets) are expected to facilitate higher sales
use of the Semantic Web conduct some e-commerce activities, usually as an volumes. | TRUE
additional marketing channel
Charles wants to buy a John Lennon lithograph over the Companies are finding that ________ outlets, such as blogs
Internet, but he is unwilling to pay for it until he inspects it click-and-mortar retailers | Brick-and-mortar retailers that and wikis, not only generate faster and cheaper results than
to ascertain authenticity. The auction site through which he offer a transactional Web site from which to conduct traditional focus groups, but also foster closer relationships
purchases the painting agrees to hold his money until he business. with customers. | conversational marketing
tells them to release it to the seller. This is an example of: |
an escrow service. clickstream behavior | Customer movements on the Companies can improve their responsibility as custodians
Internet. of customers personal data by implementing | Opt in and
chatterbots | Animation characters that can talk (chat). opt out information practices.
clickstream data | Data that occur inside the Web
Chem Connect is an example of a successful e-exchange environment; they provide a trail of the users activities (the Companies can interface with social networking in each of
with: | a. many buyers and many sellers users clickstream behavior) in the Web site. the following ways except: | sending flyers to customer
mailboxes.
ChemConnect is an example of a successful e-exchange Clickstream data provide a trail of a users activities in a
with: | many buyers and many sellers. Web site including a record of the users browsing patterns Companies can use replenishment information to reduce
of every page of every Web site the user visits, how long inventories and eliminate stocking points. | T
Childrens Internet Protection Act (CIPA) | U.S. law that the user remained on a page, and even the e-mail addresses
mandates the use of filtering technologies in schools and of mail that the user sends and receives. | T Companies exchange surpluses they do not need for things
libraries that receive certain types of federal funding. that they do need. So, they are using: | Membership EC
click-through rate | The percentage of visitors who are Business Model
chips are tiny tags can be implanted into humans or exposed to a banner ad and click on it.
attached to products for tracking and identification Companies that choose an intermediary to do their buying
purposes. | Radio frequency identification (RFID) click-through ratio | The ratio between the number of clicks and selling will have high supply chain power and
on a banner ad and the number of times it is seen by buying/selling capabilities. | T
Choose the best type from the following option: Uber, or viewers; measures the success of a banner in attracting
GrabTaxi are example of _______ | L-Commerce visitors to click on the ad . Companies that introduce a significant change in their
industries, thus causing disruption in business operations,
Choose the right term corresponding with the following collaboration hub | The central point of control for an are referred to as disruptors. | TRUE
statement: "It is a method of e-commerce where shoppers emarket. A single c-hub, representing one e-market owner,
13
Companies that introduce innovations that significantly Company XYZ sells products to individuals. What EC Conducting e-commerce where the online channel of a
change markets or entire industries due to their activities classification do they fit? | b2c business is integrated with the physical retail business as
are referred to as ________. | disruptors opposed to being a separate channel best defines |
company-centric EC | E-commerce that focuses on a single considered commerce.
Companies that sell to intermediaries do not care about the companys buying needs (many-to-one, or buy-side) or
final customer's satisfaction. | False selling needs (one-to-many, or sell-side). Conducting research online is not always ideal, because the
demographics of Internet users are not the same as the
Companies that use an intermediary to do their buying and Compare current motives of hackers to those of the past. | general population. | True
selling tend to be: | low on supply chain power and low on In the early days of EC, many hackers simply wanted to
buying/selling capabilities gain fame or notoriety by defacing Web sites or gaining confidentiality | Assurance of data privacy and accuracy.
root, which means gaining unrestricted access to a network. Keeping private or sensitive information from being
Companies use ________ to sell their unneeded assets for Criminals and criminal gangs are now profit oriented, and disclosed to unauthorized individuals, entities, or
quick disposal or to dispose of excess, obsolete, and their tactics are not limited to the online world. processes.
returned products. | forward auctions
Compared to competitive markets, auction prices are often Confidentiality, integrity, and awareness are the three
Companies use ____________ to sell their unneeded assets __________ when there are | b. higher components of the CIA security triad. | FALSE
for quick disposal or to easily dispose of excess, obsolete,
and returned products. | forward auctions Compared to competitive markets, auction prices are often considered commerce | Conducting e-commerce where the
__________ when there are | a. lower online channel of a business is integrated with the physical
Companies use ____________ to sell their unneeded assets retail business as opposed to being a separate channel.
for quick disposal or to easily dispose of excess, obsolete, Compared to competitive markets, auction prices are often
and returned products. | liquidation __________ when there are multiple bidders | higher consortium trading exchange (CTE) | An exchange formed
and operated by a group of major companies in an industry
Companies use to sell their unneeded assets for quick Compared to competitive markets, auction prices are often to provide industry-wide transaction services.
disposal or to easily dispose of excess, obsolete, and __________ when there are very few bidders | lower
returned products. | forward auctions Consumer electronics, including cell phone sales, are the
Compared to competitive markets, auction prices are often largest category of online retail. | F
Companies will often separate B2C orders from B2B __________ when there are multiple bidders. | higher
orders because those types of orders have different order- Consumer interaction, the essence of consumer focused
fulfillment processes and different pricing models. | T Compared to competitive markets, auction prices are often (B2C) e-commerce, is the front end to __________. | d.
when there are multiple bidders. | higher both
Companies will usually separate B2C orders from B2B
orders because B2C and B2B orders have different Compared to competitive markets, auction prices are often consumer-to-business (C2B) | E-commerce model in which
_____________. | order-fulfillment processes and different when there are very few bidders. | lower individuals use the Internet to sell products or services to
pricing models organizations or individuals who seek sellers to bid on
Compared to general-purpose IT platforms, theWeb is | products or services they need.
Companies will usually separate B2C orders from B2B fundamentally communications-oriented rather than
orders because B2C and | a. order-sulfillment processes and computing-oriented. consumer-to-consumer (C2C) | E-commerce model in
different pricing models which consumers sell directly to other consumers.
Compared to the traditional job market, the online job
Companies will usually separate B2C orders from B2B market | tends to be much less expensive. contact card | A smart card containing a small gold plate on
orders because B2C and B2B orders have different | order- the face that when inserted in a smart card reader makes
sulfillment processes and different pricing models Competition among online travel e-tailers is fierce, with contact and passes data to and from the embedded
low margins, little customer loyalty, and increasing microchip.
Companies will usually separate B2C orders from B2B commoditization of products and services. | TRUE
orders because B2C and B2B orders have different: | order- contactless (proximity) card | A smart card with an
fulfillment processes and pricing models. Competitive advantages of a "pull" vehicle distribution embedded antenna, by means of which data and
process include | all of the above. applications are passed to and from a card reader unit or
Company A is a manufacturer that sells only custom other device without contact between the card and the card
produced products. What are the steps and their order in competitor analysis grid | A strategic planning tool that
reader.
EC order fulfillment? | Ensuring payment, checking highlights points of differentiation between competitors
availability, arranging shipment, insurance, production, and the target firm. content | The text, images, sound, and video that make up a
plant services, contacts with customers and returns Web page.
compliance data | All data belonging or pertaining to an
Company A is a retailer that sells only pre produced enterprise included in the law, which can be used for the Content created by a publisher that must be read using a
purpose of implementing or validating compliance.
products. What are the steps and their order in EC order computer or similar handheld device is an example of what
fulfillment? | Ensuring payment, checking availability, type of digital publishing? | E-book
Components of a wireless infrastructure that support
arranging shipment, insurance, production, purchasing and
delivery of services over a | b. WAP gateways, GPS Content creation and management for a large EC site can
warehousing, contacts with customers and returns
locators, and GPS satellites. be slow and expensive. | True
Company ABC has several divisions that have created
Components of a wireless infrastructure that support content management | The process of adding, revising, and
private resources that can be accessed using Internet
delivery of services over a wireless connection are: | WAP removing content from a Web site to keep content fresh,
protocols. The company is now going to link these gateways, GPS locators, and GPS satellites.
resources together. What type of network is being accurate, compelling, and credible.
described? | Extranet composite key | a key that contains two or more attributes Content not available anywhere else on the Web is called |
Company ABC sells a variety of products on its Web site premium content
Computer Fraud and Abuse Act (CFAA) | Major computer
to the highest bidder. What type of business model are they crime law to protect government computers and other
using? | Online auction Content owners are targeting YouTube and third-party
Internet-connected computers. video-sharing Web sites for | copyright infringements
Company XYZ helps individuals exchange digital Computer viruses are not a potential risk to mobile devices Controlling the Assault of Non-Solicited Pornography and
products. What EC classification do they fit? | p2p because they are wireless. | False Marketing (CAN-SPAM) Act | Law that makes it a crime
Company XYZ helps individuals sell products to other to send commercial e-mail messages with false or
Computers infected with malware that are under the control
individuals and takes a small commission on each sale. misleading message headers or misleading subject lines.
of a spammer, hacker, or other criminal. | zombies
What EC classification do they fit? | c2c
conversion rate | The percentage of clickers who actually
Computing Technology Industry Association (CompTIA) |
Company XYZ sells a variety of products on its Web site. make a purchase.
Nonprofit trade group providing information security
What type of business model are they using? | E-tailing research and best practices.
14
cookie | A data file that is placed on a users hard drive by a Customer loyalty leads to enhanced resistance to D
remote Web server, frequently without disclosure or the competitors, a decrease in price sensitivity, and an increase
users consent, that collects information about the users in favorable word-of-mouth. | TRUE Dan Welch, who owns three World Cup Coffee shops in
activities at a site. Portland, Oregon, estimates that his free Wi-Fi network has
Customer movements on the Internet are known as | added 10 percent to his overall revenue. Welch credits Wi-
copyright | An exclusive right of the author or creator of a clickstream behavior Fi consumers with spending three times as much on food
book, movie, musical composition, or other artistic compared with the average consumer. This is an example
property to print, copy, sell, license, distribute, transform to customer relationship management (CRM) | A customer of: | business ROI
another medium, translate, record, perform, or otherwise service approach that focuses on building long-term and
use. sustainable customer relationships that add value both for darknets | Private online community that is only open to
the customer and the selling company. those who belong to it.
corporate portal | A major gateway through which
employees, business partners, and the public can enter a Customer-facing activities or _______________ are Data analytics are a valuable tool because it can provide all
corporate Web site. activities, such as advertising and | d. front-office of the following EXCEPT: | c. financial reporting
operations.
Corporate portals are popular in large corporations. | True Data collection methods in the Web 2.0 environment
Customer-facing activities or are activities, such as include each of the following except | branding.
Corporations are moving their phone systems to advertising and order taking, that are visible to customers. |
__________ to cut costs and boost efficiency. | VoIP front-office operations. Data Encryption Standard (DES) | The standard symmetric
encryption algorithm supported by the NIST and used by
Corporations are moving their phone systems to Customers must pay a fixed amount, usually monthly, to U.S. government agencies until October 2000.
___________ to cut costs and boost | b. VoIP get some type of services from AOL. So, AOL is using: |
Transaction Fees Revenue Model data mart | A small data warehouse designed for a strategic
Corporations are moving their phone systems to to cut business unit (SBU) or department.
costs and boost efficiency | VoIP Customers rarely browse online stores if they do not intend
to buy. | F data mining | The process of searching a large database to
cost-benefit analysis | A comparison of the costs of a discover previously unknown patterns; automates the
project against the benefits. Customer-to-customer (C2C) e-commerce is conducted in process of finding predictive information.
various ways on the Internet, | a. C2C auctions
Costs associated with fraudulent transactions include: | all data warehouse (DW) | A single, server-based data
of the above. Customer-to-customer (C2C) e-commerce is conducted in repository that allows centralized analysis, security, and
various ways on the Internet,but the best-known C2C control over data.
CPM (cost per thousand impressions) | The fee an activities are: | C2C auctions
advertiser pays for each 1,000 times a page with a banner define data and information. explain how they differ. | data
ad is shown. Customer-to-customer (C2C) e-commerce is conducted in are facts and figures. information is defined as knowledge
various ways on the Internet, but the best-known C2C derived from data or data presented in meaningful context.-
cracker | A malicious hacker who may represent a serious activities are: | C2C auctions data is imply recorded in the database, but the data must be
problem for a corporation. manipulated in some way to produce information.
CustomInk is a Virginia-based online retail company that
Creating content that offers upgraded or more expensive enables customers to design and order custom apparel such Define database. | a self-describing collection of integrated
versions of the product is called | up selling as t-shirts and sweatshirts. Customers can upload their own tables, which means that the tables store both data and the
art, or use the site's design tools to create a design and relationships btwn the data
Credit cards, charge cards, and debit cards are three forms order the customized product. See figure Which of the
of online payment cards. | True following item(s) are benefits of their E-Commerce? Hint: Define e-government. | E-government is the use of IT and
choose multiple answers (3) | ,Website allows people to e-commerce to provide access to government information
Critics of political spam are against its use because they and delivery of public services to citizens and business
choose from CustomInk's design ideas, clipart, fonts and
believe that | all spam is a nuisance, clogs mail servers, and partners.
colors, or upload their own images to be printed on items
creates security risks
including apparel, bags, drinkware and office
supplies.,Artists review each design, and email the Define Web 2.0. Identify five characteristics. | Web 2.0 is a
Critics of political spam are against its use because they popular term for advanced Internet technology and
believe that: | a. all spam is a nuisance, clogs mail servers, customer a picture proof of how the design will applications, including blogs, wikis, RSS, and social
and creates security risks print.,Depending on the desired quality and quantity of the
item, their staffs performs screen printing, digital printing, bookmarking. Its characteristics include the ability to tap
into the collective intelligence of users; making data
CRM analytics | Applying business analytic techniques and and embroidery services.
available in new or never-intended ways; relying on user-
business intelligence such as data mining and online
analytic processing to CRM applications. customization | Creation of a product or service according generated and user-controlled content and data; lightweight
to the buyers specifications. programming techniques and tools, and letting nearly
cross-selling | Offering similar or complementary products anyone act as a Web site developer.
and services to increase sales. Customization allows companies to: | Produce a large
number of individualized products. Define Web 3.0. Identify five characteristics of Web 3.0. |
CSI Computer Crime and Security Survey | Annual Web 3.0 consists of the creation of high-quality content
security survey of U.S. corporations, government agencies, Cyber cons have a negative effect on EC because | a. and services produced by gifted individuals using Web 2.0
financial and medical institutions, and universities defending against these cons and compensating for technology as an enabling platform. Web 3.0 will provide
conducted by the Computer Security Institute. damages significantly increase the faster, far-flung connectivity and richer ways of
interacting; new Web services that work entirely within a
customer interaction center (CIC) | A comprehensive Cyber cons have a negative effect on EC because | browser window; more powerful search engines; new
service entity in which EC vendors address customer defending against these cons and compensating for artificial intelligence applications, and more uses of 3D
service issues communicated through various contact damages significantly increase the costs of EC. tools.
channels.
cybercrime | Intentional crimes carried out on the Internet. DeFreshFish has been in business for ten years selling
Customer loyalty is a deep commitment to rebuy or custom fishing lures to local fishermen through its store in
Cybercrimes are intentional crimes carried out on the a shopping mall. The company's owners are considering
repatronize a preferred product or service consistently in
Internet. | True opening a Web site and selling their products
the future, thereby causing repetitive same-brand
purchasing. | TRUE internationally. One new risk they will face in going from a
cybercriminal | A person who intentionally carries out
crimes over the Internet. brick-and-mortar strategy to a click-and-mortar strategy is:
Customer loyalty is the most significant contributor to | the risk associated with trying to comply with conflicting
profitability. | True rules and regulations in many different locales.
Cybermediation occurs at Web sites that use intelligent
agents to facilitate intermediation. | T
15
Dells cornerstone business model is based on the concept detection measures | Ways to determine whether intruders Digital signatures or digital certificates: | a and b (a.are
of: | build-to-order which allows customers to configure attempted to break into the EC system; whether they were used to validate the sender and time stamp of the
their own customized systems. successful; and what they may have done. transaction so it cannot be later claimed that the transaction
was unauthorized or invalid., b.have been compromised by
Dell's distribution strategy is best described as | direct Detection measures are actions that will make criminals phishers and spammers)
marketing from a manufacturer. abandon their idea of attacking a specific system. | FALSE
Digital signatures or digital certificates: | d. a and b
Dell's strategy is best described as: | d. direct marketing determinant | attribut or set of attributes that functionally
from a manufacturer. determine the value of another attribute or set. The left- Direct marketers are firms that sell directly to consumers
hand side of a functional dependence.A -> B, A is over the Internet without maintaining a physical sales
denial of service (DoS) attack | An attack on a Web site in determinate channel. | FALSE
which an attacker uses specialized software to send a flood
of data packets to the target computer with the aim of Determining who has the right to access a portion of a Web direct marketing | Broadly, marketing that takes place
overloading its resources. site is a question of: | Authorization. without intermediaries between manufacturers and buyers;
in the context of this book, marketing done online between
describe database migration process | tables may be deterring measures | Actions that will make criminals any seller and buyer.
created, modified or deleted, relationships may be altered, abandon their idea of attacking a specific system (e.g., the
data constrains may be changed, other changes may be possibility of losing a job for insiders). Direct marketing attempts to bring customers into local
made as needed stores. | False
differentiation | Providing a product or service that is
Describe G2C. | The government-to-citizens model unique. Direct marketing describes marketing that takes place
includes all interactions between a government and its offline between manufacturers and retailers. | F
citizens. This model is meant to increase efficiencies and digital divide | Refers to the gap between people with
create greater transparency to citizens. effective access to digital and information technology and direct materials | Materials used in the production of a
those without. product (e.g., steel in a car or paper in a book).
Describe how EBT works. | The EBT system allows the
government to electronically transfer benefits to citizen's digital economy | An economy that is based on digital Disadvantages for using the off-the-shelf approach as an
smart cards instead of sending checks or other vouchers. technologies, including digital communication networks, EC development strategy include: | Software may not
computers, software, and other related information exactly meet the company's needs.
Describe how to effectively manage the return of items | technologies; also called the Internet economy, the new
There are several different methodologies for return economy, or the Web economy. disaster avoidance | An approach oriented toward
handling, including returning the item to the place where it prevention. The idea is to minimize the chance of
was purchased, separate logistics for returns, outsourcing digital enterprise | A new business model that uses IT in a avoidable disasters (such as fire or other human-caused
returns, and physically dropping off the returned items to fundamental way to accomplish one or more of three basic threats).
collection stations. objectives: reach and engage customers more effectively,
boost employee productivity, and improve operating Discuss intermediation, disintermediation, and
Describe internal efficiency e-government activities. | efficiency. It uses converged communication and reintermediation. | Intermediation occurs when a third party
These activities are meant to increase operation efficiencies computing technology in a way that improves business operates between buyers and sellers. Intermediaries provide
though the use of IT systems and processes. processes. information about demand, supply, prices, and
requirements or they offer value-added services. E-
Describe issues in B2B fulfillment | The major issues are digital envelope | The combination of the encrypted marketplaces, infomediaries and portals provide
shipment size, multiple distribution channels, variety of original message and the digital signature, using the information for free or low cost, resulting in the
shipment frequency, uneven breadth of carrier services, recipients public key. disintermediation or elimination of the intermediary.
fewer carrier EC offerings, and complex EC transaction reintermediation occurs when the disintermediated entity
paths. Digital goods are also referred to as hard goods. | False takes on new intermediary roles.
Describe the basic EIPP options. | A variety of online digital products | Goods that can be transformed to digital disintermediation | The removal of organizations or
options are available for making payments in an EIPP format and delivered over the Internet. business process layers responsible for certain intermediary
system. Each differs in terms of cost, speed, auditability, steps in a given supply chain.
accessibility, and control. Some options include: ACH Digital products have different cost curves than those of
Network, Purchasing Cards, Fedwire or Wire Transfer, regular products because: | in digitization, most of the costs Disintermediation describes: | the introduction of new
Letters of Credit for Global Payments are fixed, and variable costs are very low. intermediaries within the channel structure
Describe the two main areas of G2B activities. | The two Digital products have different cost curves than those of Disruption did not occur in the real estate brokerage
main areas of government to-business activities include regular products because in digitization | most costs are industry. | FALSE
electronic procurement where the government purchases fixed, and variable costs are very low.
goods from the private sector, and electronic auctions disruptors | Companies that introduce a significant change
Digital products have different cost curves than those of in their industries, thus causing a disruption in normal
where the government electronically auctions surplus
regular products because in digitization: | most costs are business operations.
goods to businesses.
fixed, and variable costs are very low.
desktop purchasing | Direct purchasing from internal distance learning | Formal education that takes place off
Digital products, such as software, music, digitized images, campus, usually, but not always, through online resources.
marketplaces without the approval of supervisors and
and electronic games are a great fit for consumer focused
without the intervention of a procurement department.
(B2C) e-commerce because __________. | b. electronic Document management can be an important application on
desktop search | Search tools that search the contents of a distribution is more efficient than alternative distribution corporate intranets. | True
users or organizations computer files, rather than searching channels for digital products
Doing your banking on an Internet-enabled cell phone is an
the Internet. The emphasis is on finding all the information example of m-commerce. | True
digital rights management (DRM) | An umbrella term for
that is available on the users PC, including Web browser
any of several arrangements that allow a vendor of content
histories, e-mail archives, and word-processed documents, domain name | A name-based address that identifies an
in electronic form to control the material and restrict its
as well as in all internal files and databases. Internet-connected server. Usually it refers to the portion of
usage.
the address to the left of .com and .org, etc.
Despite the failures of individual companies and initiatives,
Digital signature is based on _______________ | public
the total volume of EC has been growing each year. | True Domain Name System (DNS) | A hierarchical naming
key infrastructure
system for computers, services, or any resource
Despite the many e-tailing EC companies that have failed
digital signature or digital certificate | Validates the sender participating in the Internet; it is like a directory that
in the past, the dot-com failure rate has recently declined
and time stamp of a transaction so it cannot be later translates (converts) domain names to their numeric IP
sharply. | True
claimed that the transaction was unauthorized or invalid. addresses..
16
double auction | An auction in which multiple buyers and Each of the following statements about digital rights EC is primarily an IT field, it is not interdisciplinary. |
their bidding prices are matched with multiple sellers and management (DRM) is true EXCEPT | DRM technologies False
their asking prices, considering the quantities on both sides. were developed with strict regard for privacy protection
EC offers companies new opportunities to test prices and
Due process is | a guarantee of basic fairness and fair Each of the following statements about digital rights make prices more precise, which are referred to as | optimal
procedures in legal action management (DRM) is true | b. DRM technologies were prices.
developed with strict regard for privacy protection.
Due process is | c. a guarantee of basic fairness and fair EC reduces cycle time in all of the following ways except: |
procedures in legal action. Each of the following statements about digital rights Customer satisfaction
management (DRM) is true EXCEPT: | DRM technologies
dynamic pricing | Prices that change based on supply and were developed with strict regard for privacy protection. EC reduces cycle time in all of the following ways except: |
demand relationships at any given time. Customer satisfaction.
Early business application programs focused on
Dynamic pricing most often occurs in systemic sourcing. | __________. | d. both A and B EC security programs | All the policies, procedures,
False documents, standards, hardware, software, training, and
E-auctions are becoming less important selling and buying personnel that work together to protect information, the
Dynamic pricing refers to : | d. prices that are determined channels for companies and individuals | F ability to conduct business, and other assets.
by market forces.
eB2B transactions are expected to grow to $10 billion by EC security strategy | A strategy that views EC security as
Dynamic pricing refers to the rapid movement of prices 2008. | False the process of preventing and detecting unauthorized use of
over time and possibly across customers as a result of the organizations brand, identity, Web site, e-mail,
supply and demand matching, as in auctions. | T E-banking | saves time and money. information, or other asset and attempts to defraud the
organization, its customers, and employees.
Dynamic trading is trading that occurs in situations in e-bartering (electronic bartering) | Bartering conducted
which prices are determined by supply and demand, online, usually in a bartering exchange. EC sellers need to protect against fraud and each of the
therefore changing continuously. | T following EXCEPT: | Public keys
Ebay auctions are mostly: | consumer-to-consumer
dynamic Web content | Content that must be kept up-to- EC suites that enable an organization to quickly build an e-
date. e-book | A book in digital form that can be read on a business include all of the following EXCEPT: | Virtual
computer screen or on a special device. Computing Laboratory
E
E-books are delivered in each of the following ways e-check | A legally valid electronic version or
Each of the following are ways to pay bills over the except: | via RFID. representation of a paper check.
Internet EXCEPT: | c. customer service provider.
e-business | A broader definition of EC that includes not e-commerce (EC) risk | The likelihood that a negative
Each of the following describes retailing except: | just the buying and selling of goods and services, but also outcome will occur in the course of developing and
Companies that produce a larger number of products, such servicing customers, collaborating with business partners, operating an electronic commerce strategy.
as Proctor & Gamble, do not need retailers for efficient and conducting electronic transactions within an
distribution. organization. E-commerce 2.0 is based primarily on blogs and corporate-
sponsored collaboration. | False
Each of the following is a characteristic of WAYN except: | E-business refers to selling goods and services. | False
When it introduced fees for its premier travel membership E-commerce and client/server network applications are
service, it lost most of its new subscriptions. EC applications are supported by infrastructure and by associated with: | Enterprise databases
each of the following support areas EXCEPT: | Mobile
Each of the following is a main function of traditional and devices e-commerce strategy (e-strategy) | The formulation and
electronic markets except | financing the transformation of execution of a vision of how a new or existing company
raw materials into finished products. EC architecture | A plan for organizing the underlying intends to do business electronically.
infrastructure and applications of a site.
Each of the following is a major type of B2B structural Economic, legal, societal, and technological factors have
model except: | collaborative union. EC businesses generate user profiles in each of the created a highly competitive business environment in
following ways except by: | using customer segmentation which customers are becoming less powerful. | False
Each of the following is a revenue model for online to identify customers' preferences.
independent travel agents except | direct competition EDI is no longer used. | False
revenues. EC can be conducted in an ... where buyers and sellers
meet online to exchange goods, services, money, or e-distributor | An e-commerce intermediary that connects
Each of the following is a true statement about access information. | electronic market (e-marketplace) manufacturers with business buyers (customers) by
control except: | All resources need to be considered aggregating the catalogs of many manufacturers in one
together to identify the rights of users or categories of EC can take several forms depending on the degree of placethe intermediarys Web site.
users. digitization of the following three dimensions
___________ | the product or service sold, the process, and Edutainment is the combination of education and
Each of the following is a type of EC search except: | .host the delivery method. entertainment. | True
search.
EC can take several forms depending on the degree of Efficient transactions, price comparisons for customers,
Each of the following is a way social networks generate digitization of the following three dimensions: | the product and global reach are three major capabilities that contribute
revenues except; | hosting auctions for individuals or or service sold, the process, and the delivery method. to the growth of EC. | True
enterprises.
EC competition is very intense because online transactions Egghead.com realized a substantial reduction in operating
Each of the following is an example of e-government enable each of the following EXCEPT: | Higher prices costs and inventory costs by eliminating its brick-and-
except a: | eBay-seller selling surplus army supplies. because of a greater number of potential buyers. mortar stores and becoming a pure-play in e-commerce. | T
Each of the following is one of the three major categories EC costs and benefits can be classified into two broad e-government | E-commerce model in which a government
of auction rules EXCEPT: | a. timing rules categories: | tangible and intangible entity buys or provides goods, services, or information to
businesses or individual citizens.
Each of the following is true about auction rules EXCEPT | EC enablers include electronic markets, e-stores, and e-
Rules eliminate conflicts with existing distributors and catalogs. | TRUE E-government can generally include all of the following
distribution channels. except: | Selling commercial items
EC enablers include electronic markets, e-stores, and e-
Each of the following is true about auction rules EXCEPT: catalogs. | True E-government can generally include all of the following
| a. rules eliminate conflicts with existing distributors and except: | Selling commercial items.
distribution channels
17
e-grocer | A grocer that takes orders online and provides e-mail spam | A subset of spam that involves nearly Erratic shifts in orders up and down supply chains is know
deliveries on a daily or other regular schedule or within a identical messages sent to numerous recipients by e-mail. as the: | Bullwhip effect.
very short period of time.
e-mall (online mall) | An online shopping center where e-sourcing | The process and tools that electronically enable
EIPP is used for: | Presenting and paying B2B invoices many online stores are located. any activity in the sourcing process, such as
online quotation/tender submittance and response, e-auctions,
e-marketplace | An online market, usually B2B, in which online negotiations, and spending analyses.
e-learning | The online delivery of information for purposes buyers and sellers exchange goods or services; the three
of education, training, or knowledge management. types of e-marketplaces are private, public, and consortia. e-supply chain | A supply chain that is managed
electronically, usually with Web technologies.
E-learning drivers driving the transition from traditional E-marketplaces, especially for B2B and mega B2C such as
education to online learning include each of the following Amazon.com may be plagued by | information overload e-supply chain management (e-SCM) | The collaborative
except: | faculty with specialized expertise. use of technology to improve the operations of supply
e-micropayments | Small online payments, typically under chain activities as well as the management of supply
electronic (online) banking or e-banking | Various banking $10. chains.
activities conducted from home or the road using an
Internet connection; also known as cyberbanking, virtual Employees purchasing office supplier for their work E-supply chain management is the collaborative use of
banking, online banking, and home banking. through an outside vendor is an example of B2E. | False technology to enhance B2C processes and improve speed,
agility, real-time control, and customer satisfaction. | F
electronic auctions (e-auctions) | Auctions conducted emulate the work and behavior of human agents in
online. executing organizational processes, such as travel E-supply chains are usually managed using traditional,
authorization, planning, or decision making. | Software (or non-web-based systems. | False
Electronic cash is not an important part of EC. | False intelligent) agents
e-tailers | Retailers who sell over the Internet.
electronic catalogs (e-catalogs) | The presentation of enable an organization that has suffered a loss due to
product information in an electronic form; the backbone of spammers to bring a lawsuit against spammers responsible e-tailing | Online retailing, usually B2C.
most e-selling sites. for the loss | Civil laws
ethics | The branch of philosophy that deals with what is
electronic commerce (EC) | The process of buying, selling, encryption | The process of scrambling (encrypting) a considered to be right and wrong.
or exchanging products, services, or information via message in such a way that it is difficult, expensive, or
computer. time-consuming for an unauthorized person to unscramble Ethics is the branch of philosophy that deals with what is
(decrypt) it. considered to be right and wrong. | True
Electronic commerce is an interdisciplinary field. | True
encryption algorithm | The mathematical formula used to Every time a customer orders a DVD player from an online
Electronic commerce is the process of buying, selling, or encrypt the plaintext into the ciphertext, and vice versa. record store, the inventory for that player is reduced in the
exchanging products, services, or information via computer inventory system. This is an example of the: | order entry
| True Encryption algorithm is the mathematical formula used to function
encrypt plaintext into ciphertext, and vice versa. | TRUE
electronic CRM (e-CRM) | Customer relationship Evidence indicates that the basic principles that apply to
management conducted electronically. Encryption components include each of the following retail success do not apply to e-tail success. | F
except: | internal control environment.
Electronic market (e-marketplace) | An online marketplace Examples of direct materials for a food processing
where buyers and sellers meet to exchange goods, services, e-newsletter | A collection of short, informative articles company are computers and communication devices. | F
money, or information sent at regular intervals by e-mail to individuals who have
an interest in the newsletters topic. Examples of electronic signatures to help distinguish
electronic market (e-marketplace) | An online marketplace between legitimate and fraud transactions include all of the
where buyers and sellers meet to exchange goods, services, Enterprise 2.0 | Technologies and business practices that following EXCEPT: | a Web site development agreement
money, or information. free the workforce from the constraints of legacy
communication and productivity tools such as e-mail. exchanges (trading communities or trading exchanges) |
Electronic markets are the EC mechanism supporting the | Provides business managers with access to the right Many-to-many e-marketplaces, usually owned and run by a
presence and delivery, find information, compare, and information at the right time through a Web of third party or a consortium, in which many buyers and
analyze EC activities. interconnected applications, services, and devices. many sellers meet electronically to trade with each other.
Electronic Product Environmental Assessment Tool enterprise application integration (EAI) | Class of software Exchanges, like all organizations, require | revenue
(EPEAT) | A searchable database of computer hardware that integrates large systems.
that meets a strict set of environmental criteria. Expanding access to information for people with
enterprise search | The practice of identifying and enabling disabilities is a performance objective of which category of
electronic retailing (e-tailing) | Retailing conducted online, specific content across the enterprise to be indexed, e-government? | G2C
over the Internet. searched, and displayed to authorized users.
expert location systems (ELS) | Interactive computerized
electronic shopping cart | An order-processing technology Enterprise social networks are privately owned by systems that help employees find and connect with
that allows customers to accumulate items they wish to buy corporations and operate inside them. | True colleagues who have expertise required for specific
while they continue to shop. problemswhether they are across the country or across the
E-payment methods that can address the lower or higher roomin order to solve specific, critical business problems in
electronic signature | A generic, technology-neutral term end of the price continuum are unlikely to be widely seconds.
that refers to the various methods by which one can sign an accepted because of cost and security issues. | False
electronic record. Expertise location systems are designed to: | do all of the
E-payment systems that require the payer to install above.
Electronic storefronts, Internet malls, and exchanges are specialized security software have proven more likely to
major B2B e-marketplaces. | FALSE succeed. | False explain the difference between a candidate key and a
primary key | while there can be several candidate keys,
Electronic voting involves many steps. | True e-procurement | The electronic acquisition of goods and any of which could be the primary key, there is only one
services for organizations. E-procurement supports the primary key actually used to be the "official" key of a
e-loyalty | Customer loyalty to an e-tailer or loyalty purchase of both direct and indirect materials and employs relationship
programs delivered online or supported electronically. several Web-based functions such as online catalogs,
contracts, purchase orders, and shipping notices. exposure | The estimated cost, loss, or damage that can
E-loyalty is customer loyalty to an e-tailer or loyalty result if a threat exploits a vulnerability.
programs delivered online or supported electronically. | Erratic shifts in orders up and down supply chains is know
TRUE as the: | Bullwhip effect
18
extranet | A network that uses a virtual private network to Flappybird is a game that allows peoples to play games for From a bank's perspective, online banking offers a cheap
link intranets in different locations over the Internet; an free. So that case study follows: | None of the others alternative to branch banking as well as a chance to enlist
extended intranet. customers in remote areas. | T
Flexibility is a benefit of e-learning. | True
Extranets are a major network structure in B2B exchanges. from and reports are examples of | application components
| True folksonomy (collaborative tagging, social classification,
social indexing, social tagging) | The practice and method From the perspective of the billing firm, all of the
F of collaboratively creating, classifying, and managing tags following are advantages of e-billing | c. universal
to annotate and categorize content. availability.
Facebook is an example of an enterprise social network. |
False For ________ companies, it may be even more important From the perspective of the billing firm, all of the
to change strategies quickly. | pure-play following are advantages of e-billing EXCEPT: | universal
Factors determining usability include: | all of the above. availability.
For _____________ companies, it may be even more
Factors influencing whether a particular e-payment method important to change strategies | b. pure play From the perspective of the customer, all of the following
achieves critical mass include: | all of the above. are advantages of e-billing | a. greater security than other
For _____________ companies, it may be even more types of payments.
Factors that come into play in determining whether a important to change strategies quickly. | pure play
particular method of e-payment | b. full traceability of the From the perspective of the customer, all of the following
buyers. For a company to obtain competitive advantage it must use are advantages of e-billing EXCEPT: | greater security than
a technology/process that is: | d. a and c other types of payments.
Factors that come into play in determining whether a
particular method of e-payment achieves critical mass For a given type of payment card and processing system, front end | The portion of an e-sellers business processes
include all of the following EXCEPT: | full traceability of the processes and participants are essentially the same for through which customers interact, including the sellers
the buyers. offline (card present) and online (card not present) portal, electronic catalogs, a shopping cart, a search engine,
purchases. | True and a payment gateway.
Factors that determine whether a first mover succeeds or
fails in the EC marketplace include all of the following For a manufacturer, the supply chain ends: | when the Front end refers to the activities that support online order
EXCEPT: | the speed of market entry product is used up and disposed of. fulfillment, inventory management, purchasing from
suppliers, payment processing, packaging, and delivery. | F
Factors that determine whether a particular method of e- For all types of e-marketplaces, the most important key to
payment achieves critical mass include each of the the success of any third-party exchange is the critical mass functional dependency | relationship between attributes in a
following except: | full traceability of the buyers. of buyers and sellers. | T relation where the value of one or more attributes
determines the value of another attribute. A -> B expressed
fair use | The use of copyrighted material for For companies, it may be even more important to change the fact that if we know a value of A we will always know
noncommercial purposes. strategies quickly. | pure play the corresponding value of B
Fair use means | that copyrighted material can be used for For companies, it may be even more important to change Functional products are staple products, such as groceries
noncommercial purposes without paying royalties or strategies quickly. | pure play or gasoline, that have stable and predictable demand. For
getting permission. these products, an effective supply chain emphasizes speed,
For Governments, an example of an intangible EC metric
responsiveness, and flexibility rather than low costs. | F
FAQ page | A Web page that lists questions that are is: | reelection of candidates
frequently asked by customers and the answers to those Functionalities provided by EC merchant server software
questions. For many firms, presentment and payment processes are all
include | all of the above.
of the following EXCEPT: | c. secure.
Finding and retaining customers is a major critical success Fundamentally, the success of the pure-play jewelry e-
factor for most offline and online businesses. | T Ford's strategy is best described as: See figure | direct
tailer Blue Nile was due to the companys use of Internet
marketing from a manufacturer.
technologies to: | offer lower prices than competitors
Finding and retaining customers is a major critical success
factor for most offline and online businesses. | TRUE Forecasting means identifying business, technological,
G
political, economic, and other relevant trends that are
Finding information and knowledge that describe the currently affecting the business or that have the potential to G2G (government-to-government) includes only
relationships among consumers, products, marketing do so in the future. | True intergovernmental activities. | True
methods, and marketers is the goal of | market research.
foreign key | the attribute that is a primay key is one table Gateways to e-storefronts and e-malls describes ________.
Finding relevant and accurate information is often time- that is then place in a second table to form a relationship to | shopping portals
consuming and requires access to multiple systems causing the first table by sorting linking values. the term foreign
organizations to lose a lot of productive employee time. key refers to the attribute in the second table. Gateways to storefronts and e-malls are | shopping portals.
One solution to this problem is the use of: | portals.
Formal education that takes place off campus, usually, but Gaye operates a B2B exchange that services a vertical
Finding relevant and accurate information is often time- not always, through online resources best defines: | market that marketers have difficulty targeting. What type
consuming and requires access to multiple systems causing distance learning. of revenue model should she consider first? |
organizations to lose a lot of productive employee time. Advertisement fee
One solution to this problem is the use of: | intermediaries forward auction | An auction in which a seller entertains
bids from buyers. Bidders increase price sequentially. general controls | Controls established to protect the system
Fingerprint scanners, facial recognition systems, and voice regardless of the specific application. For example,
recognition are examples of ________ that recognize a Forward auctions expand online sales and offer businesses protecting hardware and controlling access to the data
person by some physical trait. | biometric systems a new venue for quickly and easily disposing of excess, center are independent of the specific application.
obsolete, and returned products. | T
firewall | A single point between two or more networks General Motors B2B initiatives successfully enable the
where all traffic must pass (choke point); the device Forward auctions give company Web sites "stickiness." auto giant to reduce inventory cost, minimize operational
authenticates, controls, and logs all traffic. This means that it is difficult to sell goods and have the problems, and shorten procurement processes. | T
customer "stick" to the site. | False
Firewalls that filter requests from the Internet to a private geographical information system (GIS) | A computer
network based on the IP | a. packet-filtering routers. fraud | Any business activity that uses deceitful practices or system capable of integrating, storing, editing, analyzing,
devices to deprive another of property or other rights. sharing, and displaying geographically referenced (spatial)
Firewalls that filter requests from the Internet to a private information.
network based on the IP address of the computer sending From 2001 to 2006, a majority of e-exchanges: | folded due
or receiving those requests are called: | packet-filtering to a lack of customers, cash, or both.
routers.
19
give an example of a single-user database application and a Group ware is appropriate in all of the following situations system; promoting the use of enterprise wikis via
multiuser database application. | membership database EXCEPT: | d. for people working on different tasks or demonstrations; setting up internal blogs and incorporating
(single-user), video/dvd rental store that is used by several projects them into internal directories so users can see who has a
employees(multi-user) blog; setting up enterprise social bookmarking systems so
Groupware are software products used to support users can see what sort of content their colleagues are
global positioning system (GPS) | A worldwide satellite- individualized workflows. | False tagging; and CIOs should be involved from the beginning
based tracking system that enables users to determine their to make sure the right infrastructure and tools are in place.
position anywhere on the earth. Groupware is appropriate in all of the following situations
EXCEPT: | For people working on different tasks or Identify four trends that may slow EC and Web 3.0 and
Good management and effective operations and rules are projects. even cripple the Internet. | Security concerns, lack of net
critical to the success of B2B exchanges because good neutrality, copyright complaints, and choppy connectivity
governance provides the rules for the exchange, minimizes Guidelines regarding enterprise social networking activities are four trends.
conflicts, supports decision making, and tries to induce the include: | all of the above.
necessary liquidity. | T identity theft | Fraud that involves stealing an identity of a
H person and then the use of that identity by someone
Goods with the following characteristicguarantee provided pretending to be someone else in order to steal money or
by highly reliable or well-known vendorsare expected to hacker | Someone who gains unauthorized access to a
get other benefits.
facilitate higher sales volumes. | T computer system.
If a company purchases Godiva chocolates as gifts for its
Google and eBay have similar core competencies. | False has one seller and many buyers, or one buyer and many
employees and has Godiva mail them directly to the
sellers. | A private marketplace
recipient, the company is engaged in B2B2C. | True
Google's ________ is its expertise in information search
technology. | core competency hash | A mathematical computation that is applied to a
if A determine B, what is true? | B=f(A)
message, using a private key, to encrypt the message.
Googles ___________________ is its expertise in Impacts of auctions include: | all of the above.
information search technology. | c. core competency Having control over the collection, storage, and
dissemination of personal information is included in the Impacts of e-marketplaces on B2C direct marketing include
Googles is its expertise in information search technology. | category of: | privacy all of the following EXCEPT: | Brand images for new
core competency companies have become more difficult to establish.
he general premise of __________ is to effectively |
Googles is its expertise in information search technology. | supplychainmanagement Impacts of the Web on the travel and tourism industry
core competency include all of the following EXCEPT | Decrease in direct
help customers do comparison-shopping in B2C by
sales of travel packages on the global market by small,
Governments use Web 2.0 tools mainly for: | collaboration, collecting data from multiple sellers sites. | Software agents
local players
dissemination of information, e-learning, online forums, (or intelligent agents)
and citizen engagement. Implementing EC often requires significant investments in
hit | A request for data from a Web page or file.
infrastructure. Therefore, a good way to start is to
government-to-business (G2B) | E-government category undertake _____________________. | one or a few small
that includes interactions between governments and honeynet | A network of honeypots.
EC pilot projects
businesses (government selling to businesses and providing
honeypot | Production system (e.g., firewalls, routers, Web
them with services and businesses selling products and
servers, database servers) that looks like it does real work, Implementing Web 2.0 sites, especially social networks
services to the government). and similar communities, does all of the following
but that acts as a decoy and is watched to study how
network intrusions occur. EXCEPT: | Will quickly have a massive impact on almost
government-to-citizens (G2C) | E-government category every company that produces consumer goods
that includes all the interactions between a government and
hope that consumers will use the trustmark seal as an
its citizens. Important trends in B2C EC include all of the following
assurance and as a proxy for actual research into their
conduct of business, privacy policy, and personal EXCEPT: | the Internet will influence approximately 25
Government-to-employee applications can lead to percent of all retail sales by 2010.
information protection. | TRUSTe
significant efficiency improvements for all of the reasons
EXCEPT: | Most government employees use handheld In , the prices are usually dynamic and are based on
horizontal marketplaces | Markets that concentrate on a
digital devices. changes in supply and demand. | spot sourcing
service, material, or a product that is used in all types of
government-to-employees (G2E) | E-government category industries (e.g., office supplies, PCs).
In , the prices are usually negotiated or fixed. | strategic
that includes activities and services between government sourcing
How is the one-to-one relationship achieved? | By
units and their employees.
understanding a customers preferences and needs based on
past transactions. In _________, the prices are usually negotiated or fixed. |
government-to-government (G2G) | E-government strategic sourcing
category that includes activities within government units
How many common types of Revenue model existing in E-
and those between governments. In _______________, the prices are usually dynamic and
Commerce? | 5
are based on changes in supply and demand. | spot sourcing
GPS systems are key to the future of l-commerce. | True
How many main steps are existing in a generic purchasing-
decision model in E-Commerce? | 5 In 2005, human error was responsible for almost _______
green computing | The study and practice of ecofriendly percent information security breaches in organizations | 60
computing resources; is now a key concern of businesses in
How many type of E-Commerce do you know? Typing
all industriesnot just environmental organizations. In a ______, one company sells to many business buyers
these names of them! | 4
from e-catalogs or auctions, usually over an extranet. | sell-
green IT | Green IT begins with manufacturers producing side e-marketplace
How was the transformation to a customer-intimate
environmentally friendly products and encouraging IT
business accomplished? | The company uses extensive SAS
departments to consider more friendly options like decision support and data mining software. In a B2C Storefront, the function that provides customers
virtualization, power management, and proper recycling with information about the product through their browser is
habits. Human or electronic intermediaries attempt to address each called the | product presentation function.
of the following limitations of direct interaction EXCEPT: |
Grid computing is a form of distributed computing. | True In a client/server application, the __________ logic
product distribution.
provides the user interface. | c. presentation
group purchasing | The aggregation of orders from several
I
buyers into volume purchases so that better prices can be In a database table, two records: | canNOT have the same
negotiated. Identify five guidelines for enterprise social networking primary key
activities. | Five guidelines include allowing employees to
In a marketspace, some goods can be digitized. | True
collaborate and communicate in an employee-driven
20
in a relation, cells in a table can hold: | only a single value In dealing with exchange members, the management of the establishes contact through face-to-face encounters with
exchange should: | make certain that the exchange is store personnel or through the Web page, the information
In a sell-side e-marketplace, a business sells products and neutral in its dealings with all members. and service received is consistent. | T
services to business customers, frequently over
_______________________. | an extranet In digital signature, which of the following encryption In law, fair use refers to the use of copyrighted material for
algorithm is applied? | RSA ________ purposes. | noncommercial
In a sell-side e-marketplace, a business sells products and
services to business customers, frequently over In direct marketing: | customers are contacted directly In marketing, an intermediary is a third party that operates
_______________________. | an extranet. without the help of intermediaries. between sellers and buyers. Intermediaries of all kinds
offer their services on the Web. | T
In a sell-side e-marketplace, a business sells products and In direct marketing: | sales are made in malls only.
services to business customers, frequently over . | an In order for a cell phone to be used for m-commerce, it
extranet In EC Framework, which of the following items are belong must have a display screen. | True
to infrastructure layer? Hint: choose multiple answers (2) |
In a sell-side marketplace, the seller must produce all or ,Security,Messaging and information distribution in order to create a relationship btwn the Student and Grade
part of the goods they sell. | True tables they must contain: | the same column (or field)
In E-Commerce B2B context, what does PRM stand for?
In a supplier aggregation model the exchange attempts to See figure | Partner Relationship Management In organizational transformation: | there is always a sharp
group many seller's products and services into one break with the past and every aspect of the business will
exchange. | True In E-Commerce framework, the Policy part is belonged to probably change.
_________________ | Support services layer
In addition to EC being conducted via the Internet, EC can In reviewing integration of new B2B systems with existing
be conducted over local area networks (LANs). | True In E-Commerce, what do PLM and VoIP stand for? information systems, we find which of the following to be
Statement A: PLM stands for Product Life Management untrue? | Most major software vendors do not provide for
In addition to providing an easy mechanism for buying Statement B: VoIP stands for Voice over Internet Protocol integration.
books, the Amazon.com Web site is easily searchable by Choose the right answer from the two statements! |
book title and author. It also has book reviews and suggests Statement A is False, and Statement B is True In SCM, the supply chain of a manufacturer ends
titles based on previous purchase activity. These when______________ | the product is used
enhancements make the Amazon site a favorite for readers. In E-Commerce, what does PKI stand for? Hint: capitalize
This is an example of | internal Web site promotion the first letter of each word (e.g. NIC you need to enter In selling directly, manufacturers may encounter a similar
Network Interface Card only) | Public key infrastructure problem to that of B2C, namely ___________ with the
In an effort to increase inter-organizational information regular distributors, including corporate dealers. | channel
flow, many companies expand access to corporate intranets In electronic auctions, near-perfect market information is conflict
to include selected trading partners and customers by available about prices, | d. buyers and sellers
creating a(n) __________. | b. Extranet In selling directly, manufacturers may encounter a similar
In electronic auctions, near-perfect market information is problem to that of B2C, | c. the willingness of companies to
In an e-market, Federal Express is an example of a(n): | available about prices, products, current supply and incur higher costs to improve collaboration.
service provider. demand, and so on. This feature provides benefits to . |
buyers and sellers In selling directly, manufacturers may encounter a similar
In an exchange where plastic components are bought and problem to that of B2C, namely with the regular
sold, the market maker collects money from the buyer, and In electronic auctions, near-perfect market information is distributors, including corporate dealers | the willingness of
releases it to the seller once successful delivery is available about prices, products, current supply and companies to incur higher costs to improve collaboration.
completed. This is an example of: | transaction facilitation. demand, and so on. This feature provides benefits
to___________. | buyers and sellers In selling directly, manufacturers may encounter a similar
In an exchange where plastic components are bought and problem to that of B2C, namely with the regular
sold, the market maker purchases a new server that will be In electronic exchanges and traditional open-air distributors, including corporate dealers | channel conflict
used to conduct auctions. This is an example of: | marketplace, buyers and sellers can interact and negotiate
maintaining exchange infrastructure. prices and quantities. | T In spot-sourcing, prices are: | dynamic and set based on
supply and demand.
In an organizational transformation | there is always a sharp In e-procurement, office supplies for a manufacturing
break with the past and every aspect of the business will company would be considered direct materials. | False In static trading prices are quickly influenced by supply
probably change and demand. | False
In financial supply chain management, the goal is to
In B2B exchanges, software agents can facilitate optimize all of the following | d. the physical supply chain In the authorization process, money is transferred from the
management of multiple trading partners and their buyer's to the merchant's account. | False
transactions across multiple virtual industry exchanges. | T In financial supply chain management, the goal is to
optimize all of the following EXCEPT: | the physical In the consortia model: | several industry players come
In B2C, an example of a tangible EC metric from the supply chain together to establish the exchange for the benefit of all.
buyers perspective is: | cost/price of the product.
In general, online real estate is replacing existing real estate In the consumer decision process, which of the following
In chapter 8 - Marketing and Advertising in E-Commerce, agents in most markets. | F roles ultimately makes the buying decision or any part of
AIDA model is mentioned and used to analyze their it? | decider
differences in illustrating an online purchasing behavior. In general, the benefits of contract-management software
What does the second A in AIDA stand for? | Action include all of the following EXCEPT: | Reduces contract- In the consumer decision-making process, the buyer is the
related risks. person who ultimately makes the buying decision. | F
In collaborative work, members frequently are in different
locations. Using , group members can work on the same In general, what is the relationship between the cost of In the consumer decision-making process, the buyer is the
document, which is shown on the PC screen of each building and installing an EC system and the cost of person who ultimately makes the buying decision. | FALSE
participant. | Using screen-sharing software operating and maintaining it? | It costs about as much time,
effort, and money to operate and maintain as to build and In the context of EC, __________ are electronic trading-
In company-centric marketplaces, the individual company install a system. community meeting places for many sellers and many
has very little control over who participates in selling or buyers, and possibly for other business partners. |
buying transactions. | False In global trade, a ______________ is a written agreement exchanges
by a bank to pay the seller, on account of the buyer, a sum
In cyberspace, there are intermediaries that provide and/or of money upon presentation of certain documents. | letter of In the context of EC, ____________ are electronic trading-
control information flow. These electronic intermediaries credit community meeting places for many sellers and many
are known as | infomediaries. buyers, and possibly for other business partners. |
In implementing a successful click-and-mortar strategy, a exchanges
company must make sure that whether a customer
21
In the context of EC, are electronic trading-community indirect materials | Materials used to support production integrity | Assurance that stored data has not been modified
meeting places for many sellers and many buyers, and (e.g., office supplies or lightbulbs). without authorization; a message that was sent is the same
possibly for other business partners. | exchanges message as that which was received.
Indirect materials are generally purchased in horizontal
In the decision-making process, virtual catalogs and links exchanges. | True intellectual property | Creations of the mind, such as
to external sources support the evaluation and selection inventions, literary and artistic works, and symbols, names,
phase of that process. | F Indirect materials are typically used in ________ activities | images, and designs, used in commerce.
a. maintenance, repair, and operation (MRO)
In the field, a sales representative writes notes with a Intellectual property law is the area of law that is
mobile handwriting-recognition computer immediately Indirect materials are typically used in associated with each of the following EXCEPT: | business
after a sales call. This can be viewed as an EC activity. | __________________ activities. | maintenance, repair, and contracts
False operation (MRO)
Intellectual property law is the area of law that is
In the internal part of the supply chain, the major concerns Indirect materials are typically used in activities | associated with each of the following | a. business
are production management, manufacturing, and inventory maintenance, repair, and operation (MRO) contracts.
control. | T
Individual buyers are more important than organizational Intellectual property law is the area of law that is
In the one buyer, many potential sellers dynamic pricing buyers. | False associated with each of the following EXCEPT: | business
configuration, the sellers use a forward auction. | FALSE contracts.
Individual buyers do most of the actual shopping in
In the online world, merchants are not held liable for cyberspace in terms of dollar volume of sales. | F intelligent agents | Software applications that have some
fraudulent transactions. | False degree of reactivity, autonomy, and adaptabilityas is
infomediaries | Electronic intermediaries that provide needed in unpredictable attack situations. An agent is able
In the online world, virtually every attempt to and/or control information flow in cyberspace, often to adapt itself based on changes occurring in its
disintermediate cash and credit cards has failed. | True aggregating information and selling it to others. environment.
In the purchase decision-making process, blogs and search information architecture | How the site and its Web pages Intelligent agents are capable of more sophisticated tasks
engines support the evaluation, negotiation, and selection are organized, labeled, and navigated to support browsing than search engines. | True
step. | FALSE and searching throughout the Web site.
Interactions within mobile social networks are currently
In the real world, negotiations are done primarily information assurance (IA) | The protection of information limited to exchanging simple text messages on a one-to-
electronically and with negotiation support tools. | F systems against unauthorized access to or modification of one basis. | FALSE
information whether in storage, processing, or transit, and
In the settlement process, the systems must determine against the denial of service to authorized users, including interactive marketing | Online marketing, facilitated by the
whether a buyer's card is active and whether the cardholder those measures necessary to detect, document, and counter Internet, by which marketers and advertisers can interact
has su?cient funds available for the purchase. | False such threats. directly with customers, and consumers can interact with
advertisers/vendors.
In the strategy implementation phase, general long-term Information portals offer a variety of services to
plans are continuously evaluated. | False encourages users to use and return to their Web sites. | True interactive voice response (IVR) | A voice system that
enables users to request and receive information and to
In the United States, which the federal laws place legal information visibility | The process of sharing critical data enter and change data through a telephone to a
limits on monitoring activity? | The Wiretap Act and the required to manage the flow of products, services, and computerized system.
Pen Register, Trap, and Trace Devices statute information in real time between suppliers and customers
along the supply chain. Interactive voice response (IVR) systems allow users to
In the upstream supply chain, attention is directed at send and receive information through an interface that is
distribution, warehousing, transportation, and after-sale informational Web site | A Web site that does little more controlled by their voice. | True
service. | F than provide information about the business and its
products and services. interactive Web site | A Web site that provides
In the US, cellular companies are not required to support opportunities for the customers and the business to
911 calls. | False Infrastructures that sua. pport the wireless connection are: | communicate and share information.
a. a. network access points, mobile communications server
In todays digital economy, click-and-mortar retailers sell switches, and cellular Intermediaries are human or electronic agents that play an
via stores, through voice phone calls to human operators, important role in EC by providing value-added services
over the Internet through interactive Web sites, and by Infrastructures that sua. pport the wireless connection are: | such as making payment arrangements to buyers and
mobile devices. | T a. network access points, mobile communications server sellers. | T
switches, and cellular transmitters and receivers.
In what way does mobile computing not help organizations Intermediaries help to decrease contracting risk in
| Costs of hardware are increasing Infrastructures that support the wireless connection are: | a. marketspaces. | True
network access points, mobile communications server
In what way does mobile computing not help switches, and cellular Intermediaries in B2B commerce, which may be virtual or
organizations? | Costs of hardware are increasing click-and-mortar intermediaries, are third parties that
Infrastructures that support the wireless connection are: | broker transactions between buyers and sellers. | T
In which type of market would a third-party exchange most network access points, mobile communications server
likely be less successful? | Balanced market switches, and cellular transmitters and receivers. intermediary | A third party that operates between sellers
and buyers.
Incorrect approaches to EC strategy selection include all of infringement | Use of the work without permission or
the following EXCEPT: | using a late-mover strategy. contracting for payment of a royalty. Internal aggregation of products for group purchasing is
usually done by large organizations. | True
Increasing self service is a benefit of EC. | True insourcing | In-house development of applications.
internal control environment | The work atmosphere that a
Increasing the number of regular suppliers and integrating Insuring: | is the in-house development of applications.
company sets for its employees.
with their information systems and possibly with their
business processes | Enables customized online catalogs Intangible metrics in the model for IT project justification internal procurement marketplace | The aggregated catalogs
with the same prices for different customers. include each of the following except: | lead-time. of all approved suppliers combined into a single internal
electronic catalog.
incubator | A company, university, or nonprofit integration testing | Testing the combination of application
organization that supports businesses in their initial stages modules acting in concert.
Internet capabilities that make it more difficult for
of development. companies to capture profits include each of the following
22
except: | The Internet makes it easier to make secure involves using various computer-based tools and storage, or network resources across dynamic and
payments. techniques to analyze transaction data and generate new geographically dispersed organizations. | Grid computing
ideas. | Knowledge creation
Internet fraud has grown even faster than the Internet itself. is a for-profit very rapidly growing Web site that is tapping
| TRUE IP address | An address that uniquely identifies each into the enthusiasm and knowledge of people to build a
computer connected to a network or the Internet. better search engine than Google. | Wikia.com
Internet radio | A Web site that provides music, talk, and
other entertainment, both live and stored, from a variety of is a 3-dimensional word where residents retain the rights to is a gateway through which employees, business partners,
radio stations. their digital creations and can buy, sell, and trade with and the public can enter a corporate Web site. | corporate
other residents are able to sell them at various in-world portal
Internet technologies can provide consumers with easier venues. | Second Life
access to pricing information, | d. reducing prices. is a general-purpose architecture that enables distributed
is a business strategy that enables manufacturers to control applications to be assembled from a Web of software
Internet technologies can provide consumers with easier and share product-related data as part of product design and services in the same way that Web sites are assembled
access to pricing information, which increases their development efforts. | Product lifecycle management from a web of HTML pages. | Web services
bargaining power. To remain competitive and profitable,
sellers need smarter pricing strategies, which include all of is a business strategy that enables manufacturers to control is a many-to-many marketplace owned by one company. |
the following strategies EXCEPT: | reducing prices. and share product-related data as part of product design and private exchange
development efforts and in support of supply chain
Internet underground economy | E-markets for stolen operations. | Product lifecycle management is a marketing strategy in which customers agree to accept
information made up of thousands of Web sites that sell advertising and marketing materials, known as opt-in. |
credit card numbers, social security numbers, other data is a business strategy that enables manufacturers to control Permission advertising
such as numbers of bank accounts, social network IDs, and shareproduct-related data as part of product design and
passwords, and much more. development efforts. | Product lifecycle management is a marketplace in which sellers and buyers exchange
goods and services for money or for other goods and
Internet XML has no advantage over traditional EDI is a business strategy that focuses on managing an services, but do so electronically. | marketspace
systems. | False enterprises interactions with its suppliers. | Supplier
relationship management is a method of doing business by which a company can
interoperability | Connecting people, data, and diverse generate revenue to sustain itself. | business model
systems; the term can be defined in a technical way or in a is a business strategy that focuses on providing
broad way, taking into account social, political, and comprehensive quality service to business partners. | is a model devised by Porter that says that five major forces
organizational factors. Partner relationship management of competition determine industry structure and how
economic value is divided among the industry players in an
intrabusiness EC | E-commerce category that includes all is a characteristic that influences the average length of time industry; analysis of these forces helps companies develop
internal organizational activities that involve the exchange a visitor stays in a site. | Stickiness their competitive strategy. | competitive forces model
of goods, services, or information among various units and
individuals in an organization. is a collaborative online encyclopedia that volunteers is a network that uses the Internet to link multiple intranets.
primarily write | Wikipedia | extranet
Intrabusiness EC is comprised of B2E commerce only. |
False is a combination of both the brick-and-mortar retailer and is a public electronic market with many buyers and sellers.
an online transactional Web site. | click-and-mortar retailer | exchange
Intrabusiness EC is usually performed over intranets and/or
. | corporate portals is a company that facilitates transactions between buyers is a single point of access through a Web browser to critical
and sellers. | broker business information located inside and outside of an
Intrabusiness EC is usually performed over intranets and/or organization | information portal
_______________. | corporate portals is a complex process that requires the coordination of many
activities so that the shipment of goods and services from is a standard used to improve compatibility between
Intrabusiness EC is usually performed over intranets and/or supplier right through to customer is done efficiently and different systems of business partners by defining the
_____. | P2P networks effectively for all parties concerned. | Supply chain meaning of data in business documents. | extensible
management markup language (or XML)
Intra-business e-commerce is sometimes called
__________ e-commerce. | e. none of the above B2E is a computer program that can access databases of Internet is a tendering (bidding) system in which suppliers are
resources, search for specific information or keywords, and invited to bid on the fulfillment of an order and the lowest
intranet | An internal corporate or government network that report the results | search engine bid wins. | reverse auction
uses Internet tools, such as Web browsers, and Internet
protocols. is a corporate or government network that uses Internet is a virtual marketplace in which sellers and buyers meet
tools, such asWeb browsers, and Internet protocols. | and conduct different types of transactions | e-marketplace
Intra-organizational e-commerce is __________ focused. intranet
B2B focuses on improving information exchanges is a Web development technique for creating quicker and
throughout the __________. | c. value chain/supply chain is a corporate-based acquisition site that uses reverse more responsive Web applications by exchanging small
auctions, negotiations, group purchasing, or other e- amounts of data with the server so that the entire Web page
intrusion detection system (IDS) | A special category of procurement method. | buy-side e-marketplace does not have to be reloaded each time the user makes a
software that can monitor activity across a network or on a change | Ajax
host computer, watch for suspicious activity, and take is a description of how a company or an EC project will
automated action based on what it sees. generate revenue. | revenue model is an advertising strategy in which customers agree to
accept advertising and marketing materials. known as opt-
Investors in e-tailers which report small losses on each unit is a directory of over 700,000 manufacturers and in. | Permission marketing
sold should not be concerned because the huge volume of distributors from 28 countries | Thomas Global
business available online should more than offset these (thomasglobal.com) is an approach aimed at making the humancomputer
small marginal losses. | F interface more natural. | Social computing
is a flexible language for capturing financial information
involves providing a product or service that is unique and throughout a business information processes, which makes is an architecture that enables the assembly of distributed
not available elsewhere | Differentiation the analysis and exchange of corporate information more applications from software services and ties them together.
reliable and easier to facilitate. | XBRL (or eXtensible | Web Services
involves the management of workflows so that documents, Business Reporting Language)
information, or tasks are passed from one participant to is an arrangement whereby a marketing partner or
another in a way that is governed by the organizations rules is a form of distributed computing that involves individual refers consumers to the selling companys Web
or procedures to achieve required deadlines. | Workflow coordinating and sharing computing, application, data, site. | Affiliate marketing
management
23
is an EC architecture consisting of four tiers: Web is the collaborative use of technology to enhance B2B is the use of Web-based technologies to support the
browsers, Web servers, application servers, and database processes and improve speed, agility, real-time control, and material acquisition, warehousing, and transportation
servers. | Multitiered application architecture customer satisfaction. | E-supply chain management processes. | E-logistics
is an EC model in which a business provides some product is the continuous evaluation of progress toward the is typically a third party that operates between sellers and
or service to a client business that maintains its own organizations strategic goals, resulting in corrective action buyers | intermediary
customers | Business-to-business-to consumer (B2B2C) and, if necessary, strategy reformulation. | strategy
assessment Islands of automation do not allow for productivity of
is an EC model in which businesses sell to individual individual functional groups. | b. false
shoppers. | Business-to-consumer (B2C) is the degree to which something can be bought or sold in a
marketplace without significantly affecting its price. | ISP hosting service | A hosting service that provides an
is an EC model in which EC transactions and activities Market liquidity independent, stand-alone Web site for small and medium-
conducted in a wireless environment. | Mobile commerce sized businesses.
(m-commerce) is the electronic delivery of newspapers, magazines, books,
videos,music, and other digitizable information over the Issues related to trust in EC include all of the following
is an E-commerce category that includes all internal Internet. | Online publishing EXCEPT: | As a result of trust-transference programs
organizational activities that involve the exchange of through portal affiliation, seal of approval programs, online
goods, services, or information among various units and is the electronic transfer of specially formatted standard shopping communities, and customer endorsements,
individuals in an organization. | Intrabusiness EC business documents, such as bills, orders, and customers are fully confident in online purchasing
confirmations, sent between business partners. | Electronic transactions.
is an exchange formed and operated by a group of major data interchange (or EDI)
companies in an industry to provide industrywide It can be said that competition between companies is being
transaction services. | consortium trading exchange is the elimination of intermediaries between sellers and replaced by competition between ___________ . | networks
buyers. | Disintermediation
is an exchange that handles materials used by companies in It can be said that competition between companies is being
different industries. | horizontal exchange is the mapping and measuring of relationships and flows replaced by competition between . | networks
between people, groups, organizations, animals, computers
is an exchange whose members are in one industry or or other information or knowledge processing entities. | It has been well known for generations that the success of
industry segment. It trades only in materials/services Social network analysis many private, public, and military organizations depends
unique for that industry. | vertical exchange on their ability to manage the flows of materials,
is the method of bringing together the products offered by information, and money, which is referred to as the product
is an invitation to participate in a tendering (bidding) many different suppliers into one place for consideration life cycle. | T
system. | request for quote (or RFQ) by all the buyers at a given company | Aggregating catalogs
It is currently known that if a front-end application such as
is an m-commerce application targeted to a customer is the portion of an e-sellers business processes through a Web site is effectively | a. the data itself may not be
whose preferences and needs and location (e.g., using GPS) which customers interact, including the sellers portal, secure because the application may not function as
are known in real time. | Location-based commerce electronic catalogs, a shopping cart, a search engine, and a planned.
payment gateway. | front end
is based on the Circle of Friends technique for networking It is currently known that if a front-end application such as
individuals in virtual communities and was the top online is the practice of using games, particularly computer a Web site is effectively secured, then | the data itself may
social network service until overtaken by MySpace. | games, to advertise or promote a product, an organization, not be secure because the application may not function as
Friendster or a viewpoint. | Advergaming planned.
is commonly used to broadcast public lectures and e- is the process made up of a range of activities by which an J
seminars, promote the work of new or unknown musicians, organization obtains or gains access to the resources they
and broadcast international entertainment activities. | require to undertake their core business activities. | Jackie has an e-card that she uses to purchase office
Webcasting Procurement supplies for the company she works for. What type of
smart card is she using? | Purchase card
is marketing that treats each customer in a unique way to fit is the process of buying, selling, or exchanging products,
marketing and advertising with the customers profile and services, or information via computer networks. | Jackie has an e-card that she waves at the turnstile to enter
needs. | One-to-one marketing Electronic commerce the subway. What type of smart card is she using? |
Contactless card
is money invested in a business by an individual or a group is the process of making the selected applications and
of individuals in exchange for equity in the business | projects a reality by hiring staff; purchasing equipment; Jackie purchases a new e-book from an online publisher.
venture capital licensing, purchasing, or writing software; and contracting She loses power to her computer in a thunderstorm before
vendors. | Project management the download is completed. When she tries to restart the
Is MS Access a DBMS? | is not just a DBMS, combines a download, she receives a message saying her download is
DBMS and an application generator. is the process whereby intermediaries, either new ones or complete. Jackie will need the: | customer service function
those that had been disintermediated, take on new
is one of an individuals unique physical or behavioral intermediary roles. | Reintermediation Jackie uses a software system to place bids automatically
characteristics that an individuals unique can be used to on her behalf until her | a. proxy bidding
identify an individual precisely. | biometric is the psychological status of depending on another person
or organization to achieve a planned goal. | Trust Jackie uses a software system to place bids automatically
is one of Oracles key applications. It supports product on her behalf until her predetermined maximum price is
catalog and content management, interactive and complex is the purchase of goods and services as they are needed, reached. The software bids in such a way as to minimize
selling, personalized pricing, flexible check and payment usually at prevailing market prices. | Spot buying the final bid. This is referred to as: | proxy bidding
options, account and contract management, and postsales
order and shipping services | iStore is the rapid production of customized products or services Jami sells construction equipment. Whenever she calls on
at a reasonable cost for a large number of customers. | Mass her building contractor customers, she asks if they are
is one of the two major models of third-party exchanges customization having any problems. In doing so, Jami is addressing which
where distributors standardize, index, and aggregate of the following core aspects of marketing? | Satisfying
suppliers catalogs and make them available to buyers in a is the term that refers to the collective functionality of ERP, customer needs and wants
centralized location. | supplier aggregation model SCM, CRM, and e-business solutions. | Enterprise systems
Janice and Tony decided to buy the new computer system
is one type of exchange in which several industry players is the transfer of documents and computer files while video Paul suggested after careful analysis. Janice directed Rich,
collaborate to build an exchange so that all can benefit. | A conferencing | Data conferencing her assistant, to order the system. In this example, what
consortium (or co-op) purchasing role does Rich play? | Buyer
is the transfer of documents and computer files while
videoconferencing. | Data conferencing
24
Janice and Tony decided to buy the new computer system knowledge discovery in databases (KDD)/knowledge encrypted so that it is readable only by the person for
Paul suggested after careful analysis. Janice directed Rich, discovery (KD) | The process of extracting useful whom it is intended. The confidentiality function prevents
her assistant, to order the system. In this example, what knowledge from volumes of data. unauthorized disclosure of information. Integrity is the
purchasing role does Janice play? | Buyer assurance that data are accurate or that a message has not
Knowledge generated in e-business contributes to the been altered. It means that stored data has not been
Jeff wants to purchase online, but is concerned about a enhancement of three core | b. project management modified without authorization; a message that was sent is
company's privacy policy. What online purchase decision the same message that was received. Availability is the
aid should he use? | Trust verification site Knowledge generated in e-business contributes to the assurance that access to data, the Web site, or other EC
enhancement of three core operating process, which data service is timely, available, reliable, and restricted to
Jewelry sales over the Internet is just beginning, but could include all of the following EXCEPT: | project authorized users.
be one of the top sellers on the Internet in the near future. | management
F List and briefly discuss the five major roles that people
Knowledge generated in e-business contributes to the play in the decision-making process. | The major roles are
Job seekers can both reply to ads and post their information enhancement of three core operating processes, which initiator, influencer, decider, buyer, and user. The initiator
on several online recruiting sites. | True include all of the following EXCEPT | project management is the person who first suggests or thinks of the idea of
buying a particular product or service. The influencer is the
John wants to know if the first edition novel he just Knowledge is of limited value if: | a. it is not shared
purchased through an e-auction is | b. authentication person whose advice or view carries some weight in
knowledge management (KM) | The process of capturing making a final purchasing decision. The decider is the
John wants to know if the first edition novel he just or creating knowledge, storing it, updating it constantly, person who ultimately makes a buying decision or part of
purchased through an e-auction is actually a first edition. disseminating it, and using it whenever necessary. it, such as whether to buy, what to buy, how to buy, or
The auction host helps him locate an expert that will him where to buy. The buyer is the person who makes the
whether the novel is a genuine first edition or a fake. This Knowledge management uses knowledge: | to improve the actual purchase. The user is the person who consumes or
is an example of: | authentication functioning of an organization. uses the product or service.
John wants to know if the first edition novel he just L list consequences of poorly designed database. | poor
purchased through an e-auction is actually a first edition. performance, difficult to revise adapt to changing
The auction host helps him locate an expert that will tell Lack of consumer confidence in EC security is a limitation circumstances, hard to navigate, slow
him whether the novel is a genuine first edition or a fake. of EC. | True
This is an example of | authentication. List five business models by distribution channel. | The five
Lack of search and retrieval tools is a common problem for business models are direct marketing by mail-order
Joining a public e-marketplace provides a business with corporate portals. | True retailers that go online, direct marketing by manufacturers,
greater buying and selling capabilities, but the tradeoff is pure-play e-tailers, click-and-mortar retailers, and Internet
Large private organizational buyers and government malls.
lower supply chain power. | T
agencies make large-volume or large-value purchases
Julie is using an intelligent agent to help her find the best through ____________________, also known as reverse List four reasons why Web advertising is growing rapidly. |
price on a CD she would like to purchase. What type of auctions. | electronic tendering systems Seven reasons are mentioned in the textbook and include
agent is she using? | Merchant brokering cost, richness of format, personalization, timeliness,
Large private organizational buyers and government location-basis, linking, and digital branding. Referencing
Justifying an EC investment by comparing the costs of agencies make large-volume or large-value purchases cost, online ads are sometimes cheaper than those in other
each project against its benefits is known as a cost-benefit through , also known as reverse auctions. | electronic media. In addition, ads can be updated at any time with
analysis. | True tendering systems minimal cost. In terms of format richness, Web ads
effectively use the convergence of text, audio, graphics,
Justifying information security projects: | should be done Large private organizational buyers and government
and animation. In addition, games, entertainment, and
because employee security training is usually poorly done agencies make large-volume or large-value purchases
promotions can be easily combined in online
through ________, also known as reverse auctions. |
advertisements. When using personalization, Web ads can
K electronic tendering systems
be interactive and targeted to specific interest groups or
Learning agent technology is a nonintrusive way to individuals, and the Web is a much more focused medium.
key (key value) | The secret code used to encrypt and
personalize web content by watching a user's actions. | In the area of timeliness, Internet ads can be fresh and up-
decrypt a message.
True to-the-minute. Web advertising can be location based;
Key business drivers for B2B are all of the following Internet ads can be sent to consumers whenever they are in
EXCEPT: | the willingness of companies to incur higher Learning, training, and knowledge sharing in social a specific time and location. With linking, it is easy to link
costs to improve collaboration. networks and by using social software tools for learning from an online ad to a storefront. In the area of digital
best describes: | social learning. branding, even the most price-conscious online shoppers
Key factors limiting the use of personalization include | are willing to pay premiums for brands they trust.
privacy and trust issues. Light bulbs and office supplies might be purchased in a(n)
_________________ by both an automaker and a List the six major EC trading activity categories. | presence
key performance indicators (KPIs) | The quantitative steelmaker. | horizontal exchange and discovery, find information, compare, analyze; , (2)
expression of critically important metrics. trading buy, sell, exchange; (3) communicate, collaborate,
Light bulbs and office supplies might be purchased in a(n) learn; (4) entertainment; (5) improve performance; (6)
key space | The large number of possible key values (keys) by both an automaker and a steelmaker. | horizontal other activities, recruit, customer service.
created by the algorithm to use when transforming the exchange
message. List the six major objectives of EC defense strategies. |
Lightweight programming techniques and tools letting Prevention and deterrence, detection, containment,
Key strategies for successful online community include all nearly anyone act as a Web site developer is a recovery, correction, and awareness and compliance are the
of the following EXCEPT: | Control the sharing of representative characteristic of Web 2.0. | TRUE six objectives.
information or sensitive opinions
Limitations of e-auctions include all of the following localization | The process of converting media products
keystroke logging (keylogging) | A method of capturing EXCEPT: | Dynamic pricing developed in one environment (e.g., country) to a form
and recording user keystrokes. culturally and linguistically acceptable in countries outside
Limitations of online research methods are all of the the original target market.
Keystroke logging captures and records user keystrokes. | following EXCEPT: | E-mail surveys have the lowest
True response rate. location-based m-commerce (l-commerce) | Delivery of m-
commerce transactions to individuals in a specific location,
keyword banners | Banner ads that appear when a List and briefly describe the three components of the CIA at a specific time.
predetermined word is queried from a search engine. security triad. | The CIA triad includes confidentiality,
integrity, and availability. Confidentiality is the assurance Lower prices on products is not a consumer benefit of EC. |
of data privacy. The data or transmitted message is False
25
Lowering a customer's search cost allows them to: | Many companies use a corporate portal, which is a gateway Markets in which several large sellers sell to a large
Research more items to find the best price for customers, employees, and partners to reach corporate number of buyers are called: | seller-concentrated markets.
information and communicate with the company. | True
Lowering a customer's search cost allows them to: | Markets that deal with one industry or industry segment
Research more items to find the best price. Many companies use different names, colors, sizes, and are: | vertical marketplaces.
packaging for their overseas products and services. This
M practice is referred to as: | localization. Markets that focus on providing materials or products that
are used in various types of industries are known as
macro virus (macro worm) | A macro virus or macro worm Many companies use intermediaries or trading assistants horizontal marketplaces. | T
is executed when the application object that contains the instead of implementing eauctions themselves for each of
macro is opened or a particular procedure is executed. the following reasons EXCEPT: | c. To avoid tax and legal marketspace | A marketplace in which sellers and buyers
fees. exchange goods and services for money (or for other goods
maintenance, repair, and operation (MRO) | Indirect and services), but do so electronically.
materials used in activities that support production. Many companies use intermediaries or trading assistants
instead of implementing e-auctions themselves for each of Marketspaces are defined by their physical locations. |
Major barriers to EC include all of the following EXCEPT: the following reasons EXCEPT: | To avoid tax and legal False
| lack of technology fees.
Mark's company helps several buyers and sellers meet and
Major barriers to EC include all of the following except: | Many companies used a corporate portal, which is a conduct business online. What type of model is he using? |
lack of programmers gateway for customers, employees, and partners to reach Many-to-many marketplace
corporate information and communicate with the company.
Major characteristics of the digital economy include mass customization | A method that enables manufacturers
| True
obsolescence, digitization, and wars. | True to create specific products for each customer based on the
Many experts believe that the next major step in the customers exact needs.
Major department and discount stores are classified as: |
evolution of computing will be | d. pervasive computing
general malls. Mass marketing is an approach to marketing that treats
Many experts believe that the next major step in the each customer in a unique way such as fitting advertising
Major implementation challenges that companies must to the customers profile and needs. | F
evolution of computing will be _____________ in which
consider when planning e-procurement initiatives include
almost every object will have processing power and a
all of the following EXCEPT: | Increasing the number of maverick buying | Unplanned purchases of items needed
wired or wireless connection to a network. | pervasive
regular suppliers and integrating with their information quickly, often at non-prenegotiated higher prices.
computing
systems and possibly with their business processes.
Many experts believe that the next major step in the McAfee allows users of its VirusScan virus-detection
Major implementation challenges that companies must software to automatically update the latest security patches
evolution of computing will be in which almost every
consider when planning eprocurement initiatives include
object will have processing power and a wired or wireless online. This is an example of ___________________ to
all of the following EXCEPT: | d. Increasing the number of attract customers who value this automatic update. |
connection to a network. | pervasive computing
regular suppliers and integrating with their information product or service differentiation.
Many insurance companies use a dual strategy, keeping
Major implementation challenges that companies must M-commerce allows for localization of services by
human agents but also selling online. | TRUE
consider when planning eprocurement initiatives include knowing exactly where a user might be located. | True
all of the following EXCEPT: | Increasing the number of Many insurers are using a dual distribution strategy, by
regular suppliers and integrating with their information adding online distribution of standard products to their M-commerce is also known as m-business. | True
systems and possibly with their business processes traditional agency distribution system. | T
M-commerce transactions and activities require
malware (malicious software) | A generic term for Many of the outcomes from the first two phases of the _____________ and | c. hardware and software
malicious software. infrastructures; infrastructure support
strategic planning process, such as a determination of
goals, competitor analysis, strategic opportunities, and risk
Many auction sites are implementing _____________ M-commerce transactions and activities require
analysis come together in a _______________. | business
because of the significant | d. m-commerce applications _____________ and _______________ | hardware and
plan
software infrastructures; infrastructure support
Many auction sites are implementing ______________
Mark is purchasing crude oil through an online system.
because of the significant increase in the number of users M-commerce transactions and activities require
This is an example of strategic sourcing. | False
who browse the Internet wirelessly | m-commerce _____________ and _______________. | hardware and
applications Mark is using an intelligent agent to help him determine software infrastructures; infrastructure support
which CD to purchase. What type of agent is he using? |
Many auction sites are implementing because of the M-commerce transactions and activities require and |
Product brokering
significant increase in the number of users who browse the hardware and software infrastructures; infrastructure
Internet wirelessly. | m-commerce applications Market liquidity refers to the degree to which a product or support
service can be bought or sold in a marketplace without
Many B2C and B2B businesses rely on specialized third- means that the communication and collaboration are done
significantly affecting its price. | T
party software and services to calculate the taxes associated in real time. | Synchronous
with a sale because: | of the complexities. market segmentation | The process of dividing a consumer
measures the time required to complete an operation such
market into logical groups for conducting marketing
Many companies employ a(n) , which is a gateway for as downloading a Web page. It is an indicator of the users
research and analyzing personal information.
customers ,employees, and partners to reach corporate experience with the system. | Latency
information and to communicate with the company. | Market segmentation increases the size of the group you
corporate portal Membership in the exchange should be inclusive and allow
are selling to. | False
a variety of businesses to take part. Which of the five
Many companies employ a(n) , which is a gateway for Marketing and advertising approaches has evolved from critical success factors identified by Ramsdell is being
customers, employees, and partners to reach corporate mass marketing to market segmentation to one-to-one described? | Openness
information and to communicate with the company. | marketing. This evolution occurred because: | the Internet
corporate portal merchant brokering | Deciding from whom (from what
enabled companies to better communicate with customers
merchant) to buy products.
and understand their needs and buying habits.
Many companies employ a(n) ________________, which
is a gateway for customers, employees, and partners to Merchant brokering agents help users decide which product
Marketing done online between any seller and buyer is
reach corporate information and to communicate with the to purchase. | False
indirect marketing. | FALSE
company. | corporate portal
Merchant server software commonly includes the
Marketing that takes place without the help of
following features EXCEPT | Order management that
intermediaries is called: | direct marketing.
optimizes movement of products through the supply chain.
26
Merchants can study and find out what customers want Mobile business applications can be used to support Most WLANs run on a telecommunications standard
through | market research. employees through Internet-based and non-Internet- based known as ____________, which | d. IEEE 802.11; Wi-Fi
applications. | True
message digest (MD) | A summary of a message, converted Most WLANs run on a telecommunications standard
into a string of digits after the hash has been applied. mobile commerce (m-commerce or m-business) | Any known as ____________, which is more commonly called
business activity conducted over a wireless ______________. | IEEE 802.11; Wi-Fi
metadata | Data about data, including software programs telecommunications network or from mobile devices.
about data, rules for organizing data, and data summaries. MRO stands for maintenance, repair, and operation which
Mobile commerce is any EC done in a wireless refer to indirect or nonproduction materials that support the
metadata can be examined in MS-Access in: | Design View environment. | True production process. | T
Methodology and software that enable organizations to Mobile commerce refers to transactions made using MSN or Yahoo! are types of exchanges that generate
perform a variety of activities involved in Web advertising, wireless devices. | True revenue through membership fees. | F
such as tracking viewers and rotating ads is known as | ad
management. Mobile devices can be used to pay for items from a multichannel business model | A business model where a
vending machine using a micropayments system. | True company sells in multiple marketing channels
metric | A specific, measurable standard against which simultaneously (e.g., both physical and online stores).
actual performance is compared. mobile entertainment | Any type of leisure activity that
utilizes wireless telecommunication networks, interacts multimedia messaging service (MMS) | The emerging
Metrics are used to describe all of the following EXCEPT: | with service providers, and incurs a cost upon usage. generation of wireless messaging; MMS is able to deliver
standards. rich media.
mobile government (m-government) | The wireless
Metrics are used to describe each of the following except: | implementation of e-government mostly to citizens but also MySpace is an example of a B2B site. | False
standards. to businesses.
N
microblogging | A form of blogging that allows users to mobile portal | A portal accessible via a mobile device.
write messages (usually up to 140 characters) and publish name-your-own-price model | Auction model in which a
them, either to be viewed by anyone or by a restricted mobile social networking | Members converse and connect would-be buyer specifies the price (and other terms) he or
group that can be chosen by the user. These messages can with one another using cell phones or other mobile devices. she is willing to pay to any willing and able seller. It is a
be submitted by a variety of means, including text C2B model that was pioneered by Priceline.com.
messaging, instant messaging, e-mail, MP3, or just on the mobile worker | Any employee who is away from his or her
Web. primary work space at least 10 hours a week or 25 percent Negotiation agents are most commonly used in a B2B
of the time. setting. | True
microfinance | Refers to the provision of financial services
to poor or low-income clients, including consumers and the More and more people are willing to pay for digital music, Negotiation and bargaining are two types of auctions where
self-employed. as shown by the success of | c. c. Apples iTunes prices are not fixed, but rather are allowed to fluctuate as
market supply and demand change. | F
Micropayments are electronic payments: | c. c. that are less More and more people are willing to pay for digital music,
than $10.00. as shown by the success of . | c. Apples iTunes Net-a-Porter buying merchandise from its designers is an
example of B2B commerce. | True
Micropayments are generally under: ___________ . | $10 More and more people are willing to pay for digital music,
as shown by the success of ________ | Apples iTunes Netflix implemented intelligent agents in its movie
Microsoft built its internal marketplace, named for the recommendation service called Cinematch to help
procurement of small items. | MS Market More and more people are willing to pay for digital music, customers select movies they would like to watch and to
as shown by the success of ________ | Apples iTunes better manage its inventory. | T
Middleware provides all of the following functions or
features EXCEPT: | Integrates large systems with one or Morgan has an e-card that he uses to access different parts Network infrastructures include cell phones and other
more back-end databases of his company's R&D offices. What type of smart card is electronic devices that are located in various locations by
he using? | Smart card telecommunications networks, including wireless ones. |
Mike's business plan calls for him to coordinate several True
businesses together in one exchange. Together, he hopes Most EC applications are based on ___________ that begin
that this group of businesses will receive better pricing with an order, frequently a | a. pull operations; customized network-based positioning | Relies on base stations to find
from the big vendors. What type of model is Mike using | the location of a mobile device sending a signal or sensed
Buyer aggregation Most EC applications are based on ___________ that begin by the network.
with an order, frequently a ________ order. | pull
Mike's business plan calls for him to coordinate several operations; customized Networked computing connects multiple computers and
businesses together in one exchange. Together, he hopes other electronic devices that are located in various
that this group of businesses will receive better pricing Most EC applications are based on that begin with an locations by telecommunications networks, including
from the big vendors. What type of model is Mike using? | order, frequently a order. | pull operations; customized wireless ones. | True
Buyer aggregation
Most of the social-networking sites expect to earn revenue Neutrality among members and groups is vital for the
Mobile access supports the two functions of sales force from: | Transaction Fees management of an exchange. | True
mobilization and field service, | c. customer relationship
Most online travel agents do not offer real travel bargains. | No two (row/column) entries can have the same value | row
management <442>
True
Mobile access supports the two functions of sales force Nonproduction materials such as equipment and tools that
Most selling-oriented consortia are horizontal. | False support production are | a. indirect materials
mobilization and field service, which extends the reach of
to both employees and business partners on a 24/7 basis to Most social networks, such as LinkedIn and Weibo, are
any place where recipients are located. | customer Nonproduction materials such as equipment and tools that
private communities. | FALSE support production are called: | indirect materials
relationship management <442>
Most universities use e-learning: | d. as a supplementary Non-production materials such as equipment and tools that
Mobile access supports the two functions of sales force channel to traditional classrooms.
mobilization and field service, which extends the reach of support production are called: | indirect materials
_________________ to both employees and business Most US companies have an intranet. | True Nonproduction materials, such as office supplies, that
partners on a 24/7 basis to any place where recipients are
support production are called: | indirect materials.
located | customer relationship management Most WLANs run on a telecommunications standard
known as , which is more commonly called . | IEEE nonrepudiation | Assurance that online customers or trading
mobile advertising (m-advertising) | Ads sent to and 802.11; Wi-Fi partners cannot falsely deny (repudiate) their purchase or
presented on mobile devices.
transaction.
27
normal form | one category in a set of categories used to One initiative underway that could lead to widespread One of the most important issues in implementing e-
describe relations according to the type of anomalies that support for the introduction of RFID | d. Electronic Product government is: | its adoption and usage by citizens.
can occur in the relations Code
One of the most important issues in implementing e-
Not all EC investments need to be formally justified. All of One initiative underway that could lead to widespread Government is_________________ | its adoption and
the following are cases where formal evaluation may not be support for the introduction of RFID is the , which usage by citizens
needed EXCEPT: | When competitors have made that type identifies the manufacturer, producer, version, and serial
of investment number of | Electronic Product Code One of the most significant differences between Web 2.0
and the traditional Web is the greater collaboration among
O One initiative underway that could lead to widespread Internet users and other users, content providers, and
support for the introduction of RFID is the enterprises. | TRUE
Observing members are not generally allowed to trade in _______________, which identifies the manufacturer,
exchanges. | True producer, version, and serial number of each item and does One of the strengths of EC is the ease with which its
not require line-of-sight contact to be read | Electronic adopters can reach a global population of consumers.
occurs when 13213 eliminates a distributor or a retailer. | Product Code However, EC-driven businesses must consider the critical
Disintermediation elements affecting the value of EC across cultures. Those
One initiative underway that could lead to widespread elements include all of the following EXCEPT | delivery
offer two-way video, on-the-fly interaction, and application support for the introduction of RFID is the , which delays
sharing. Such systems provide for interactive remote identifies the manufacturer, producer, version, and serial
instruction systems, which link sites over a high-speed number of each item and does not require line-of-sight One problem with the Address Verification System (AVS)
intranet. | E-learning systems contact to be read. | Electronic Product Code for fraud prevention is the number of false positives,
meaning that the merchant rejects a valid order. | True
Offering quality merchandise at good prices, coupled with One major characteristic of all exchanges is that they are
excellent service, and cross-channel coordination and electronic trading-community meeting places for a single One problem with Web analytics, Web mining, and
integration in which customers can almost seamlessly seller and many buyers, and possibly for other business clickstream data is that we observe and follow a computer,
operate between the online and physical environments of a partners. | F not knowing who is actually moving the mouse. | True
business are also important elements in successful e-tailing.
|T One of the facilitators of e-learning is ________ One unique item is offered. The price starts high until
technologies, such as blogs and wikis. | Web 2.0 someone bids and becomes the winner. What type of
offers one of the most popular storefront packages at with auction is being described? | QuickWin auction
three levels of merchant solutions: starter, standard, and One of the facilitators of e-learning is ___________
professional | Yahoo! technology such as wikipedia.org. | a. Web 2.0 One way to share information with supply chain partners is
wireless _________, which | c. telemetry
Offline transactions are somewhat influenced by research One of the facilitators of e-learning is technology such as
conducted online, with approximately one-third of online wikipedia.org. | Web 2.0 One way to share information with supply chain partners is
shoppers reporting that they used the Internet to research wireless , which is the science of measuring physical
and influence their offline shopping choices. | F One of the factors that has led to the failure of initial B2B phenomena such as temperature, volume, or an on/off
exchanges was the failure of these marketplaces to foster a condition at a remote point and transmitting the value to a
old economy processes will be broken into specialized broad-based sharing of | information distant recorder or observer. | telemetry
segments that can be delivered by specialized
intermediaries. | unbundling One of the factors that influence the success of a B2B One way to share information with supply chain partners is
exchange is which provides the rules for the exchange, wireless _________, which is the science of measuring
On a(n) __________ architecture, the server does most of minimizes conflicts, and supports decision making. | physical phenomena such as temperature, volume, or an
the work. | d. thin client governance on/off condition at a remote point and transmitting the
value to a distant recorder or observer | telemetry
Once a company knows a consumer's preferences, the One of the first decisions to be made in building a Web site
company can predict, without asking the consumer directly, is: | who will host it One way to share information with supply chain partners is
what other products or services that consumer might enjoy wireless _________, which is the science of measuring
through | collaborative filtering. One of the keys to building effective customer physical phenomena such as temperature, volume, or an
relationships is an understanding of intelligent agents. | F on/off condition at a remote point and transmitting the
Once a company knows a consumers preferences, the value to a distant recorder or observer. | telemetry
company can predict, without asking the consumer directly, One of the keys to building effective customer
what other products or services that consumer might enjoy relationships is an understanding of intelligent agents. | online analytical processing (OLAP) | End-user analytical
through ___________. | collaborative filtering FALSE activities, such as DSS modeling using spreadsheets and
graphics, that are done online.
Once a company knows a consumers preferences, the One of the major benefits of e-markets is the improvement
company can predict, without asking the consumer directly, in supply chains with the creation of a(n) Online auctions are a good example of customer-to-
what other products or services that consumer might enjoy _____________________. | hub-based chain customer (C2C) EC. | True
through . | collaborative filtering
One of the major benefits of e-markets is the improvement Online banking is purely an expense for banks, it offers no
on-demand CRM | CRM hosted by an ASP or other vendor in supply chains with the | d. logistics chain advantage other than to retain current customers. | False
on the vendors premise; in contrast to the traditional
practice of buying the software and using it on-premise. One of the major benefits of e-markets is the improvement Online delivery of information for purposes of education is
in supply chains with the creation of a(n) . | hub-based L-Commerce. | False
on-demand delivery service | Express delivery made fairly chain
quickly after an online order is received. Online group purchasing organizations are known as: | e-
One of the major challenges of one-to-one advertising is co-ops
On-demand delivery services usually rely on third party ________, or the flooding of users with junk e-mail,
shipping agents (like UPS). | False banners, and pop-ups. | spamming online intermediary | An online third party that brokers a
transaction online between a buyer and a seller; may be
One basic way to categorize different EC investments is to One of the major phenomena of Web 2.0 is the emergence virtual or click-and-mortar.
distinguish between investments in infrastructure and and rise of e-auctions. | FALSE
investment in specific EC applications because benefits Online market research is generally less expensive than
from infrastructure investments: | are made for the long- One of the major problems facing direct sellers is . | how to traditional market research. | True
term. find buyers
Online markets that are owned and operated by a single
one company sells to many business buyers from e- One of the major problems facing direct sellers is company and that are either sell-side or buy-side are known
catalogs or auctions, usually over an extranet. | sell-side e- ______________. | how to find buyers as | private e-marketplaces.
marketplace
28
Online methods of bringing new customers to a B2B site Packing, delivery, accounting and logistics are examples Perspectives about Web 2.0 include all of the following
when a B2B vendor wants to grow by adding new of: | c. back-office operations. EXCEPT | Web 2.0 is organized around pages, software,
customers or products include all of the following technology, individuals, and corporations.
EXCEPT: | through direct mail campaigns page | An HTML (Hypertext Markup Language) document
that may contain text, images, and other online elements, phishing | A crimeware technique to steal the identity of a
Online methods of bringing new customers to a B2B site such as Java applets and multimedia files. It can be target company to get the identities of its customers.
when a B2B vendor wants to | a. through direct mail generated statically or dynamically.
campaigns. Phishing is rampant because some people respond to it and
partner relationship management (PRM) | Business strategy make it profitable. | True
Online methods of bringing new customers to a B2B site that focuses on providing comprehensive quality service to
when a B2B vendor wants to grow by adding new business partners. plaintext | An unencrypted message in human-readable
customers or products include all of the following form.
EXCEPT: | through direct mail campaigns. patent | A document that grants the holder exclusive rights
to an invention for a fixed number of years. Platform for Privacy Preferences Project (P3P) | A protocol
Online negotiation can be facilitated by computer allowing Web sites to declare their intended use of
technology for the negotiation process and software agents Paying a yearly fee to access Salon.com's articles is an information they collect about browsing users.
for searches and comparisons. | T example of a subscription business mod | True
PLM focuses on managing a product over time. | True
Online publishing only seeks to digitize materials that have payment card | Electronic card that contains information
traditionally been available in print. | False that can be used for payment purposes. Political and government is an example of a societal
business pressure. Answer: | False
Online trading and investing in stocks is one of the fastest payment service provider (PSP) | A third-party service
growing areas of EC. | True connecting a merchants EC system to the appropriate Popular search engines include all of the following
acquiring bank or financial institution. PSPs must be EXCEPT: | c. AltaVista
Online travel services have high margins because of their registered with the various card associations they support.
multiple revenue models including commissions, revenue Popular search engines include all of the following
from advertising, lead-generation payments, consultancy Peer-to-peer (P2P) technology can be used in C2C, B2B, EXCEPT: | MSN
fees, subscription or membership fees, and revenue-sharing and B2C. | True
Popular search engines include each of the following
fees. | F
penetration test (pen test) | A method of evaluating the except: | .Linux.
operational data store | A database for use in transaction security of a computer system or a network by simulating
pop-up ad | An ad that appears in a separate window
processing (operational) systems that uses data warehouse an attack from a malicious source, (e.g., a cracker).
before, after, or during Internet surfing or when reading e-
concepts to provide clean data.
Perhaps a potential customers most common path to a mail.
opt-in | Agreement that requires computer users to take previously unknown website is through a(n) __________ |
a.search engine pop-up under ad | An ad that appears underneath the
specific steps to allow the collection of personal
current browser window, so when the user closes the active
information.
permission advertising (permission marketing) | window the ad is still on the screen.
Options for acquiring storefronts include all of the Advertising (marketing) strategy in which customers agree
to accept advertising and marketing materials (known as Portal ABC was designed for a company's intranet. It has a
following EXCEPT: | Join a mall
opt-in). broad amount of information designed for a narrow
opt-out | Business practice that gives consumers the audience. What type of portal is being described? |
opportunity to refuse sharing information about personal area network (PAN) | A wireless Corporate portal
themselves. telecommunications network for device-to-device
connections within a very short range. Portal ABC was designed for a large and diverse audience.
Ordering using EC benefits buyers, but not sellers. | False It has little individual customization available. What type
Personal characteristics of customers, such as age and of portal is being described? | Publishing portal
Organizations are embracing mobilized computing income, are independent variables, which are
technologies for several reasons EXCEPT: | Wireless uncontrollable variables for EC companies . | T Potential advantages of e-learning include each of the
security problems have been solved with encryption. following except: | college professors are anxious to
personal digital assistant (PDA) | A stand-alone handheld develop new online courses.
ost WLANs run on a telecommunications standard known computer principally used for personal information
as ____________, which is more commonly called management. Potential drawbacks of e-learning include each of the
______________ | IEEE 802.11; Wi-Fi following except: | knowledge retention is lower than in
personal firewall | A network node designed to protect an traditional classrooms.
outsourcing | A method of transferring the management individual users desktop system from the public network
and/or day-to-day execution of an entire business function by monitoring all the traffic that passes through the Potential uses for a corporate intranet can be best described
to a third-party service provider. computers network interface card. as: | Robust, potential uses still being discovered
Outsourcing options for creating and operating EC personalization | The tailoring of services, products, and Potential uses for a corporate intranet can be best described
applications include: | all of the above. advertising content with individual consumers and their as: | Robust, potential uses still being discovered.
specific preferences.
P Pouillys Poodle Shop wants to produce monthly cash flows
Personalization and user profiling strategies include each of from its Internet Doggie-Cam investment. The most
P2P systems have all of the following key characteristics the following EXCEPT: | Segmenting the market based on appropriate method for assessing this investment is: |
EXCEPT: | c. The overall system is well integrated, but demographics. Internal rate of return (IRR).
lacks tools for easy creation of content or for
Personalization matches services, products, and advertising Preventing vulnerability during the EC design and per-
P2P systems have all of the following key characteristics content with large groups of customer segments. | FALSE implementation stage is far more expensive than mitigating
EXCEPT: | The overall system is well integrated, but lacks problems later. | False
tools for easy creation of content or for adding personalized content | Web content that matches the needs
functionalities. and expectations of the individual visitor. Preventing vulnerability during the EC design and pre-
implementation stage is far more expensive than mitigating
P2P systems primarily allow business to share media with person-to-person lending | Lending done between problems later. | False
customers. | False individuals circumventing the banks traditional role in this
process. prevention measures | Ways to help stop unauthorized users
packet | Segment of data sent from one computer to another (also known as intruders) from accessing any part of the
on a network. EC system.
29
Prices, advertising, promotions, and logistics are encrypting data packets, sending them in packets across the Pure-play organizations are old-economy organizations that
intervening variables that can be controlled by vendors. | T Internet, and decrypting them at the destination address. perform their primary business offline, selling physical
products by means of physical agents. | False
Pricing, technical support, and logistics support are several provide connectivity among merchants, customers, and
of the _______________ that can be controlled by EC financial networks enabling authorization and payments is R
vendors and sellers | intervening variables called the: | Payment processing services
random banners | Banner ads that appear at random, not as
Pricing, technical support, and logistics support are several Psychographic segmentation involves dividing customers the result of the users action.
of the that can be controlled by EC vendors and sellers | based on where they live. | False
intervening variables Rapid technological obsolescence is an example of a
public (asymmetric) key encryption | Method of encryption technological business pressure. | True
primary key | the candidate key select to be the "official" that uses a pair of matched keysa public key to encrypt a
key of a relationship message and a private key to decrypt it, or vice versa. Real transformation of government structure takes place in
what stage of implementation? | Clustering of services
privacy | The right to be left alone and free of unreasonable public e-marketplaces | Third-party exchanges open to all
personal intrusions. interested parties (sellers and buyers). real-time location system (RTLS) | Systems used to track
and identify the location of objects in real time.
private key | Encryption code that is known only to its Public e-marketspaces are | all of the above.
owner. recognizes that are the core of a business and that a
Public exchanges are many-to-many marketplaces that are companys success depends on effectively managing its
Private online communities that are only open to those who open to all interested sellers and buyers and usually run by relationships with them. | Customer relationship
belong to them are called: | darknets third parties. | T management; customers
Procter & Gamble (P&G) used the Internet in the new public key | Encryption code that is publicly available to recognizes that are the core of a business and that a
product development of Whitestrips, a teeth-brightening anyone. companys success depends on effectively managing its
product. Based on this experience, P&G: | reduced the relationships with them. | Customer relationship
time-to-market from concept to market launch by public key infrastructure (PKI) | A scheme for securing e- management; customers
approximately two years. payments using public key encryption and various
technical components. records user activities at a companys Web site. | transaction
procurement | The process made up of a range of activities log
by which an organization obtains or gains access to the Public key infrastructure (PKI) is an authentication method
resources (materials, skills, capabilities, facilities) it | a. that has become the cornerstone for secure e-payments Referencing the licensing fees revenue model, a company
requires to undertake its core business activities. and intranet applications. receives commissions for referring customers to others'
websites. | False
procurement management | The planning, organizing, and Purchases by governments, private corporations, resellers,
coordinating of all the activities related to purchasing and other organizational buyers often are used to create referential integrity constraint | a value of constrain of a
goods and services needed to accomplish the organizations other products or services by adding value to them. | T foreign key that states that no value can be placed in the
mission. foreign key unless it already exists as a primary key value
Purchases of goods and services based on long-term in the linked table
product brokering | Deciding what product to buy. contracts is referred to as: | strategic sourcing
referral economy | The effect upon sales of consumers
Productivity benefits from using EC are difficult to Purchases of goods and services based on long-term receiving a referral or recommendation from other
measure because: | EC gains in certain areas of the contracts is referred to as______ | strategic sourcing consumers.
company may be offset by losses in other areas.
Purchases of goods and services based on long-term refers to a broad range of business activities that includes
Project management is the process of making the selected contracts is referred to as. | strategic sourcing not just the buying and selling of goods and services, but
applications and projects a reality, including hiring staff; also servicing customers, collaborating with business
purchasing equipment; and licensing, purchasing, or Purchases of goods and services based on long-term partners, and conducting electronic transactions within an
writing software. | True contracts is referred to as: | strategic sourcing. organization | E-business
Projections of the business technological, political, Purchases of goods or services that are based on short-term refers to a customers loyalty to an e-tailer or a
economic, and other environments | a. forecasts. contracts and frequently purchased in large quantities are manufacturer that sells directly online or to loyalty
known as strategic sourcing. | F programs delivered online or supported electronically. | E-
Projections of the business technological, political, loyalty
economic, and other environmentsare called: | forecasts. Purchasing a computer from dell.com is an example of
B2B commerce. | False
refers to a single companys Web site where products and
Projections of the business technological, political, services are sold. | storefront
economic, and other environmentsare called: | forecasts. Purchasing a computer from Dell's Web site is partial EC
because the merchandise is physically delivered. | True refers to any situation in which direct competition and/or
Projections of the business technological, political, damage caused by bypassing a former existing channel
economic, and other environments are called | forecasts. Purchasing a Dell computer online for use at home is an
partner is perceived to have resulted from the introduction
example of e-tailing. | True
of a new, often online, channel. | Channel conflict
Projections of the business technological, political,
economic, and other environments are called: | forecasts. Purchasing new computers or technologies generally leads
refers to communication systems that transmit voice calls
to a competitive advantage for a company. | b. false
over Internet-Protocolbased networks. | Voice-over-IP
Property rights relevant to e-commerce include all of the (VoIP)
following EXCEPT | The right to bring criminal charges Purchasing-oriented (procurement) consortia have not yet
against a violator been a successful or popular B2B consortium model. | F
refers to erratic shifts in orders up and down supply chains.
Purely physical companies are referred to as | bullwhip effect
Property rights relevant to e-commerce include all of the
following EXCEPT: | a. The right to bring criminal charges ____________ companies, whereas companies that are refers to M-commerce transactions targeted to individuals
against a violator. engaged only in EC are considered ________________
in specific locations, at specific times. | Location-based
companies. | brick-and-mortar; virtual
commerce (l-commerce)
Protecting information and information systems from
unauthorized access, use, disclosure, disruption, Purely physical companies are referred to as companies,
refers to prices that are not fixed, but that are allowed to
modification, perusal, inspection, recording, or destruction whereas | brick-and-mortar; virtual fluctuate as supply and demand in a market change |
best defines: | information security. Dynamic pricing
Purely physical companies are referred to as companies,
protocol tunneling | Method used to ensure confidentiality whereas companies that are engaged only in EC are
considered companies. | brick-and-mortar; virtual
and integrity of data transmitted over the Internet by
30
refers to the benefits, including the intangible, information about how to select electronic merchandise and Reverse auctions are bidding or tendering systems in which
nonquantitative ones, that a company can derive from using informational pages about the Reprise company today and the buyer places an item for bid on a request for quote
EC. | value proposition its management team. This is an example of adding | a system; then potential suppliers bid on the job, with the
portal price reducing sequentially, and the lowest bid wins. | True
refers to the conduct of e-commerce via wireless devices or
from portable devices. | Mobile commerce Reprise Electronics, a conglomerate that manufactures and Reverse auctions did not exist before being created on the
sells all kinds of electronic goods under several brand Internet. | True
refers to the integration of computers and wireless names, currently has separate Web sites for each of its
communications in order to improve information flow | brands. The company decides to bring all of the Web sites Reviews, testimonials, expert advice, or further explanation
telematics together through a single site that, in addition to providing about the product are called: | cross-selling.
links to the brand pages, will also provide general
refers to the matching of services, products, and advertising information about how to select electronic merchandise and RFID can provide immediate, short-term, and long-term
content to individuals and their preferences. | informational pages about the Reprise Company today and value to organizations. An example of immediate value
Personalization its management team. This is an example of adding: | a from RFID is when: | an RFID tag tells inventory control
portal. every time a roll of wire moves out of the warehouse and
refers to the planning, organizing, and coordination of all onto the factory floor.
the management activities pertaining to the purchasing of request for proposal (RFP) | Notice sent to potential
goods and services needed to accomplish the mission of an vendors inviting them to submit a proposal describing their RFID can provide immediate, short-term, and long-term
enterprise. | Procurement management software package and how it would meet the companys value to organizations. An example of immediate value
needs. from RFID is when | an RFID tag tells inventory control
refers to the practice of promoting a product or service to a every time a roll of wire moves out of the ware house and
subset of customers or prospects. | Market segmentation request for quote (RFQ) | The invitation to participate in a onto the factory floor
tendering (bidding) system.
refers to the process and tools that enable any activity in RFID tags are very expensive. | False
the sourcing process to be done electronically, including Research has shown that e-commerce sites that use an
identifying new suppliers for a specific category of auction model tend to: | a. reach critical mass more quickly Rick purchased and downloaded a new firewall software
purchasing requirements. | E-sourcing than catalog-order-based. suite online. After installing the suite, he finds that he is
unable to connect with the Internet so he visits the FAQ for
refers to the rapid movement of prices over time and Researchers believe that the use of technology to facilitate the software to look for solutions to the problem. This is an
possibly across customers, as a result of supply and collaboration among trading partners will help the example of the | product support function.
demand matching. | Dynamic pricing expansion of the exchanges. | wireless
Rick sends a message from a delayed flight to his friend on
refers to the removal of organizations or business process Responses to environmental pressures may include her cell phone that he will | c. SMS
layers responsible for certain intermediary steps in a given activities that exploit opportunities created by changing
supply chain. | Disintermediation conditions. | True Rick sends a message from a delayed flight to his friend on
her cell phone that he will be arriving late. The service that
refers to the second-generation of Internet-based services retailers make their suppliers responsible for determining allows the sending and receiving of such short text
that let people collaborate and share information online in when to order and how much to order. The retailer provides messages on mobile phones is called: | SMS
new ways, such as social networks and wikis. | Web 2.0
the supplier with real-time information, inventory levels,
and a threshold below which orders are replenished. | risk | The probability that a vulnerability will be known and
refers to the use of data mining techniques for discovering used.
vendor-managed inventory
and extracting information from Web documents. | Web
mining Retailers stand to benefit from online communities in Risks in corporate blogging include all of the following
several important ways EXCEPT | Viral marketing will be EXCEPT: | the risk of disciplinary action against abusive
refers to the use of digital technologies that enable bloggers.
replaced by free advertising
companies to collaboratively plan, design, develop,
manage, and research products, services, and innovative Retailers who sell over the Internet are called | e-tailers. Rite Aid, a click-and mortar firm, enhanced its EC future
EC applications. | Collaborative commerce by: | Buying an equity stake in a existing EC company.
Retailing conducted over the Internet is called | electronic
refers to transactions between businesses conducted retailing. Rivalry among existing competitors is one of Porter's five
electronically over the Internet, extranets, intranets, or forces. | True
private networks. | Business-to-business e-commerce (or reusability | The likelihood a segment of source code can
B2B) be used again to add new functionalities with slight or no ROI calculator | Calculator that uses metrics and formulas
modification. to compute ROI.
refers to various banking activities conducted from home
or the road using an Internet connection. | Electronic reverse auction (bidding or tendering system) | Auction in RUBEE is meant to replace RFID | False
(online) banking which the buyer places an item for bid (tender) on a request
RuBee relies on low-frequency magnetic waves to track
for quote (RFQ) system, potential suppliers bid on the job,
regulatory compliance | Systems or departments in an products and transfer information. It is becoming a
with the price reducing sequentially, and the lowest bid
organization whose job is to ensure that personnel are replacement for RFID because RuBee overcomes many of
wins; primarily a B2B or G2B mechanism.
aware of and take steps to comply with relevant laws, RFIDs limitations. | F
standards, policies, and regulations. Reverse auctions are a type of _____________________
S
auctions. | c. one buyer, many potential sellers
reintermediation | The process whereby intermediaries
(either new ones or those that had been disintermediated) sales force automation (SFA) | Software that automates the
Reverse auctions are a type of auctions. | one buyer, many
take on new intermediary roles. tasks performed by salespeople in the field, such as data
potential sellers
collection and its transmission.
relation | a table like structure of rows and columns, each Reverse auctions are bidding or tendering systems in which
column has unique name, all values in a column are for the the buyer places an item for bid on a request for quote Sales model | 1400712659179
same attribute, cells in table only hold single value, order (RFQ) system; then potential suppliers bid on the job, with scalability | How big a system can grow in various
of rows doesn't matter, neither does order of columns, data the price reducing sequentially, and the lowest bid wins. | T
dimensions to provide more service; measured by total
in each row as a whole must be unique
number of users, number of simultaneous users, or
Reverse auctions are bidding or tendering systems in which transaction volume.
Reprise Electronics, a conglomerate that manufactures and the buyer places an item for bid on a request for quote
sells all kinds of electronic goods under several brand system; then potential suppliers bid on the job, with the scenario planning | A strategic planning methodology that
names, currently has separate Web sites for each of its price reducing sequentially, and the lowest bid wins. | generates plausible alternative futures to help decision
brands. The company decides to bring all of the Web sites TRUE
makers identify actions that can be taken today to ensure
together through a single site that, in addition to providing
success in the future.
links to the brand pages, will also provide general
31
SCM aims to minimize inventory levels, optimize Segmentation refers to the matching of services, products, Several identical items are offered with a minimum bid.
production and increase throughput, decrease and advertising content to individuals and their The winners pay the same lowest price. What type of
manufacturing time, optimize logistics and distribution, preferences. | F auction is being described? | Dutch auction
streamline order fulfillment, and overall reduce the costs
associated with these activities. | T Select the correct answer from the choices below to fill in Shopbots are tools that rate businesses based on multiple
blank. Click in to figure to see the blank | Customize criteria. | False
S-commerce refers to electronic commerce activities
conducted on Facebook or influenced by the site | False Select the correct answer from the choices below which is Shoppers can rely on fraud protection provided by credit
corresponding with the following statement in card issuers to protect them from identity theft. | FALSE
search engine | A computer program that can access STRATEGIC PLANNING TOOLS" : It is a methodology
databases of Internet resources, search for specific that surveys external opportunities and threats and relates Shopping carts for B2B are fairly simple, but a shopping
information or key words, and report the results. them to internal strengths and weaknesses. | SWOT cart for B2C may be more complex. | F
analysis
search engine optimization (SEO) | The craft of increasing Shopping carts for B2B are fairly simple, but a shopping
site rank on search engines; the optimizer uses the ranking Select the correct definition of "Spot buying" term from the cart for B2C may be more complex. | FALSE
algorithm of the search engine (which may be different for choices below | is the purchase of goods and services as
different search engines) and best search phases, and tailors they are needed, usually at prevailing market prices shopping portals | Gateways to e-storefronts and e-malls;
the ad accordingly. may be comprehensive or niche oriented.
self-hosting | When a business acquires the hardware,
Search engine optimization (SEO) is the process of software, staff, and dedicated telecommunications services shopping robots (shopping agents or shopbots) | Tools that
affecting the visibility of a website or a web page in a necessary to set up and manage its own Web site. scout the Web on behalf of consumers who specify search
search engine's unpaid results - often referred to as criteria.
"natural," "organic," or "earned" results. In general, the Selling and buying electronically can be either business-to-
consumer or business-to-business. | True short message service (SMS) | A service that supports the
earlier (or higher ranked on the search results page), and
sending and receiving of short text messages on mobile
more frequently a site appears in the search results list, the phones.
more visitors it will receive from the search engine's users. Selling as many products as possible to one customer over
Which of the following category SEO is belonged to? | a long period of time and across different product lines to
maximize customer value is known as relationship Since 2001, no other company has had more of an impact
Marketing and advertising on EC than MySpace. | False
marketing. | T
search engine spam | Pages created deliberately to trick the Since 2001, no other company has had more of an impact
search engine into offering inappropriate, redundant, or Selling products/services online is called: | Viral Marketing
on EC than | Google.
poor-quality search results.
sell-side e-marketplace | A Web-based marketplace in
Since business-to-consumer (B2C) transactions are
search engine spam refer to: | Pages created deliberately tot which one company sells to many business buyers from e- segments in the supply chain, they should be examined in
rick the search engine into offering inappropriate, catalogs or auctions, frequently over an extranet.
light of other supply chain activities such as manufacturing,
redundant, or poor-quality search results. procurement, shipments, and logistics. | F
Semantic Web | An evolving extension of the Web in
Search engines not only "search and match," but also have which Web content can be expressed not only in natural
language, but also in a form that can be understood, site navigation | Aids that help visitors find the information
capabilities that can be used to perform routine tasks that they need quickly and easily.
require intelligence. | FALSE interpreted, and used by intelligent computer software
agents, permitting them to find, share, and integrate
Slow connections to WAP sites are a limitation of m-
Search engines not only search and match, but also have information more easily.
commerce. | True
capabilities that can be used to perform routine tasks that
require intelligence. | F Sending a large number of messages to a server that is
smart card | An electronic card containing an embedded
unable to handle it. What type of attack is described? |
microchip that enables predefined operations or the
Search tools that search the contents of a user's or Denial of service (DOS)
addition, deletion, or manipulation of information on the
organization's computer files, rather than searching the card.
Internet are | desktop search tools. Sending a piece of code that replicates and sends itself to
everyone in your address book. What type of attack is
smart card operating system | Special system that handles
Sears marketing strategy would best be described as: | a described? | Worm
file management, security, input/output (I/O), and
click-and-mortar strategy. command execution and provides an application
Sending spam that disguises a sales pitch to look like a
personal e-mail so that it will bypass e-mail spam filters programming interface (API) for a smart card.
Secondary content that offers a coupon, rebate, or special
service is called | promotion violates the | Controlling the Assault of NonSolicited
smart card reader | Activates and reads the contents of the
Pornography and Marketing (CAN-SPAM) Act.
chip on a smart card, usually passing the information on to
Secondary content that offers a coupon, rebate, or special a host system.
service is called: | promotion. Separating a companys online operations into a new
company makes sense in each of | c. when the company is
smart phone | A mobile phone with PC-like capabilities.
Section 5 of the FTC Act does each of the following unable to form new alliances, attract new talent, or raise
EXCEPT: | requires monitoring of employees e-mail social bookmarking | Web service for sharing Internet
Separating a companys online operations into a new
bookmarks. The sites are a popular way to store, classify,
Secure Socket Layer (SSL) | Protocol that utilizes standard company makes sense in each of the following situations
share, and search links through the practice of folksonomy
certificates for authentication and data encryption to ensure EXCEPT: | when the company is unable to form new techniques on the Internet and intranets.
privacy or confidentiality. alliances, attract new talent, or raise additional funding.
Social capital | A sociological concept that refers to
Secure Socket Layer (SSL), which is also known as service-level agreement (SLA) | A formal agreement
connections within and between social networks. The core
Transport Layer Security (TLS): | is one of the major regarding the division of work between a company and a
idea is that social networks have value. Just as physical
generally accepted protocols for securing e-commerce used vendor.
capital or human capital can increase productivity (both
by Microsoft and Netscape.
settlement | Transferring money from the buyers to the individual and collective), so can social contacts affect the
Security functions or characteristics of digital signatures merchants account. productivity of individuals and groups.
include each of the following except: | A digital signature is
Social class, lifestyle, personality, and activities are
the electronic equivalent of a personal signature, which can Several businesses create a single online catalog for their
customers. This is an example of | Catalog aggregation descriptors used in _____ market segmentation. |
be forged.
psychographic
See the figure and choose the right options to fill in blank Several businesses create a single online catalog for their
customers. This is an example of: | Catalog aggregation. Social class, lifestyle, personality, and activities are
A and B | A is Infrastructures and B is Support services
descriptors used in ___________ market segmentation.
32
demographic: nhn kh?u h?c psychographic: tm l h?c | the network are the people or groups, and the links show spam site | Page that uses techniques that deliberately
psychographic relationships between nodes. | TRUE subvert a search engines algorithms to artificially inflate
the pages rankings.
Social class, lifestyle, personality, and activities are social network service (SNS) | A service that builds online
descriptors used in market segmentation. | psychographic communities by providing an online space for people to spamming | Using e-mail to send unwanted ads (sometimes
build free homepages and that provides basic floods of ads).
social computing | An approach aimed at making the communication and support tools for conducting different
humancomputer interface more natural. activities in the social network. Specialized businesses operate in a very narrow market and
would find it difficult to survive in the physical world
social engineering | A type of nontechnical attack that uses social networking | Social networks and activities because they would not have enough customers or could
some ruse to trick users into revealing information or conducted in social networks. It also includes activities not hold the variety of stock. | T
performing an action that compromises a computer or conducted using Web 2.0 (e.g., wikis, microblogs) not
network. within social networks. Specialized firms that offer customized Web advertising,
such as brokering ads and targeting ads to select groups of
Social engineering attacks are: | c. take advantage of Web Social networking is the execution of any Web 2.0 activity, consumers are known as | advertising networks.
2.0 applications like social networking sites, blogs, wikis such as blogging and/or having a presence in a social
and network. | True splog | Short for spam blog. A site created solely for
marketing purposes.
Social engineering attacks are: | take advantage of Web 2.0 Social networks connect people with specific interests. |
applications like social networking sites, blogs, wikis and True spot buying | The purchase of goods and services as they
RSS feeds. are needed, usually at prevailing market prices.
Social networks, such as Facebook, YouTube, and
Social engineering is an example of an unintentional threat. MySpace, are Web sites that connect people with specific Spot sourcing of direct materials takes place: | in vertical
| False interests by providing free services such as photo sharing, exchanges.
e-mail, and blogging. | True
Social factors such as customer endorsement strategies and spyware | Software that gathers user information over an
word-of-mouth are independent variables that play an Software applications for the administration, Internet connection without the users knowledge.
important role in EC shopping and purchases. | T documentation, tracking, and reporting of training
programs, classroom and online events, e-learning Spyware is tiny graphics files embedded in e-mail
Social marketing | A combination of social policy and programs and training content best describes: | learning messages and in Web sites that transmit information about
marketing practices to achieve a set of social behavioral management systems. users and their movements to a Web server. | FALSE
goals within a target audience
Software applications that address project management SRM systems manage shipping of products. | False
social marketplace | The term is derived from the concerns are examples of: | collaborations workflow
combination of social networking and marketplace. An standard of due care | Care that a company is reasonably
applications.
online community that harnesses the power of ones social expected to take based on the risks affecting its EC
networks for the introduction, buying, and selling of Software that gathers user information over an Internet business and online transactions.
products, services, and resources, including ones own connection without the users knowledge is known as |
creations. Also may refer to a structure that resembles a stickiness | Characteristic that influences the average length
spyware.
social network but is focused on individual members. of time a visitor stays in a site.
Software that helps integrate different types of information
Social media | The online platforms and tools that people storebuilder service | A hosting service that provides disk
systems among collaborating companies is called: |
use to share opinions, experiences, insights, perceptions, space and services to help small and microbusinesses build
middleware.
and various media, including photos, videos, and music, a Web site quickly and cheaply.
with each other Software tools that scout the Web for stores that sell
stored-value card | A card that has monetary value loaded
similar items at low prices are called _____. | Shopping onto it and that is usually rechargeable.
social media | The online platforms and tools that people portals
use to share opinions, experiences, insights, perceptions,
Storefronts, malls, and portals are EC mechanisms that
and various media, including photos, videos, and music, Software tools that scout the Web for stores that sell support the entertainment EC activity. | FALSE
with each other. similar items at low prices are called: | Shopbots.
strategic (systematic) sourcing | Purchases involving long-
Social media is limited to text and images. | FALSE Solutions to problems in the supply chain for EC
term contracts that usually are based on private
companies are: | a. generic across both EC and traditional
Social media marketing | A term that describes use of negotiations between sellers and buyers.
companies.
social media platforms such as networks, online
Strategic planning is used to direct a companys long term
communities, blogs, wikis, or any other online Some of the benefits of a(n) __________ are that
goals. The process is a cycle of assessment, initiation,
collaborative media for marketing, market research, sales, distributor scan check inventory, | c. extranet-based order-
formulation, and implementation. | True
CRM, and customer service. entry tool
Strategic sourcing refers to purchases involving long-term
social network | A category of Internet applications that Some of the benefits of a(n) ___________ are that
contracts that usually are based on private negotiations
help connect friends, business partners, or individuals with distributors can check inventory, make transactions, and
between sellers and buyers. | True
specific interests by providing free services such as photos look up the status of their orders significantly reducing the
presentation, e-mail, blogging, and so on using a variety of number of phone calls, e-mails, and incorrect product Strategic sourcing requires a holistic process that automates
tools. shipments. | extranet-based order-entry tool the entire sourcing process, including order planning, RFQ
creation, bid evaluation, negotiation, settlement, and order
social network advertising | Online advertising that focuses Some of the benefits of a(n) are that distributor scan check execution. | T
on social networking sites. inventory, make transactions, and look up the status of their
orders significantly reducing the number of phone calls, e- strategy | A broad-based formula for how a business is
social network analysis (SNA) | The mapping and mails, and incorrect product shipments | extranet-based going to accomplish its mission, what its goals should be,
measuring of relationships and information flows among order-entry tool and what plans and policies will be needed to carry out
people, groups, organizations, computers, and other
those goals.
information- or knowledge-processing entities. The nodes Some Web sites allow buyers to purchase travel at a deep
in the network are the people and groups, whereas the links discount if it is purchased at the last minute. | True strategy assessment | The continuous evaluation of progress
show relationships or flows between the nodes. SNAs toward the organizations strategic goals, resulting in
provide both visual and a quantitative analysis of Someone being influenced by friends is an example of a
corrective action and, if necessary, strategy reformulation.
relationships. social environment variable. | True
strategy formulation | The development of strategies to
Social network analysis provides both a visual and a spam | The electronic equivalent of junk mail.
exploit opportunities and manage threats in the business
mathematical analysis of relationships where the nodes in
33
environment in light of corporate strengths and SWOT analysis | A methodology that surveys external from suppliers to packaging it and moving it to distributors
weaknesses. opportunities and threats and relates them to internal and retailers. | supply chain
strengths and weaknesses.
strategy implementation | The development of detailed, The _____________ consists of a number of interrelated
short-term plans for carrying out the projects agreed on in symmetric (private) key encryption | An encryption system subprocesses that extend from the acquisition of materials
strategy formulation. that uses the same key to encrypt and decrypt the message. from suppliers to packaging it and moving it to distributors
and retailers. | supply chain
strategy initiation | The initial phase of strategic planning in Syndicated content is Web content that matches the needs
which the organization examines itself and its environment. and expectations of the individual visitor. | False The _____________ pricing strategy means adding up all
the costs involved, such as material, labor, rent, overhead,
Strong competition and increased power of consumers are syndication | The sale of the same good (e.g., digital and so forth, and adding a percentage mark-up as profit. |
two of the major market pressures in todays business content) to many customers, who then integrate it with cost-plus
environment. | True other offerings and resell it or give it away free.
The ______________ is how Web pages are organized,
Strong EC security makes online shopping more T labeled, and navigated to support browsing and searching |
convenient for customers. | FALSE information architecture
tag A | nonhierarchical keyword or term assigned to a piece
Studies have shown that electronic-based collaboration and of information (such as an Internet bookmark, digital The _______________ is the intrinsic unit of thought on
product lifecycle management (PLM) can reduce product image, video clip, or any computer document). the Web. | hyperlink
costs and travel expenses by 50 percent, as well as
significantly reduce costs associated with product-change Technologies and business practices that free the workforce The __________________ give law enforcement agencies
management. | F from the constraints of legacy communication and broader range in their efforts to protect the public | USA
productivity tools such as e-mail describes: | Enterprise 2.0. PATRIOT Act
Subscription model | 1400712643513
technologies in the Dreamliner aircraft to support The ___________________ is the name-based address that
such as Amazon.com, are firms that sell directly to maintenance activities. | RFID identifies an Internet-connected server | domain name
consumers over the Internet without maintaining a physical
sales channel. | Pure-play e-tailers technology enables networked peer computers to share or The _____________________ auction model is popular in
swap data files, music, videos, software, and processing B2B. | a. one-buyer, one-seller
supplier relationship management (SRM) | A with each other directly. | Peer-to-peer (P2P)
comprehensive approach to managing an enterprises The 3G standard does not yet support multimedia such as
interactions with the organizations that supply the goods Telematics is the integration of cell phones and GPS video clips. | False
and services it uses. systems. | False
The administrative activities of order taking and fulfillment
supply chain | The flow of materials, information, money, tendering (bidding) system | Model in which a buyer involve all of the following | d. accounts payable.
and services from raw material suppliers through factories requests would-be sellers to submit bids; the lowest bidder
and warehouses to the end customers. wins. The administrative activities of order taking and fulfillment
involve all of the following activities EXCEPT: | accounts
Supply chain activities usually involve communication and terminal-based positioning | Calculating the location of a payable.
collaboration. | T mobile device from signals sent by the device to base
stations. The administrative activities of order taking and fulfillment
Supply chain improvements and collaborative commerce involve all of the following activities EXCEPT: | accounts
are a basic type of B2B which has a hub manager for terms that describe columns | columns, attributes, fields payable.
supply chain improvements, communicating, collaborating,
and information sharing. | T terms that describe rows | rows, tuples, records The advantages of virtual private networks (VPN) for data
communications include all | b. They ensure the
supply chain management (SCM) | A complex process that terms that describe table | table, relation, file confidentiality and integrity of the data transmitted over the
requires the coordination of many activities so that the Internet
text mining | The application of data mining to
shipment of goods and services from supplier right through nonstructured or less-structured text files.
to customer is done efficiently and effectively for all The advantages of virtual private networks (VPN) for data
parties concerned. SCM aims to minimize inventory levels, that monitors traffic on a B2B exchange and takes communications include all of the following except: | They
optimize production and increase throughput, decrease ensure the confidentiality and integrity of the data
appropriate actions when needed, such as sending an alert
manufacturing time, optimize logistics and distribution, transmitted over the Internet without requiring encyption.
to management when traffic is too heavy or routing traffic
streamline order fulfillment, and overall reduce the costs to other places. | software agent
associated with these activities. The aggregation of suppliers catalogs on the buyers server
to make it easier to centralize and control all procurement
The ?name-your own-price? model pioneered by
Supply chain management involves integrating the efforts Priceline.com is a type of ___________ auction. | one is called a(n): | internal procurement marketplace
of: | all of these. buyer, many potential sellers The aim of market research is to discover marketing
Supply chain partners using Web-based systems to opportunities and issues, to establish marketing and
The _____ support area includes: sellers, buyers,
combine orders to decrease costs is an example of group advertising plans, to better understand the purchasing
intermediaries, information systems specialists, other
purchasing. | True process, and to evaluate marketing performance. | TRUE
employees | public policy
Supply chain problems can cause delays, products not The amount and percentage of goods and services sold on
The ________ is an auction in which the buyer places an
being where they are required at the right time, customer the Internet is increasing rapidly, despite the failure of
item for bid on a request for quote system, potential
dissatisfaction, lost sales, and high expenses that result many dot-com companies. | T
suppliers bid on the job, with the price reducing
from fixing the problems once they occur. | T sequentially, and the lowest bid wins. | reverse auction The amount and percentage of goods and services sold on
Suppose a relation describes students at a university the Internet is increasing rapidly, despite the failure of
The ________ is an auction model in which a would-be
including StudentID, Name, and Major. What determines many dot-com companies. | TRUE
buyer specifies the price he or she is willing to pay to any
what? | StudentID determines student major willing and able seller. | name-your-own-price model The application logic in a handheld PDA, smart phone,
Suppose we try to enter a grade in the grade table for a Palm or Wintel notebook is | c. a mobile application user
The ________ is the online B2C business model where a
student that has not yet been entered in the Student table. interface.
manufacturer sells to a business, but delivers to individual
This violates: | referential integrity customers. | B2B2C The application logic in a handheld PDA, smart phone,
surrogate key | a column of artificial data added to a Palm or Wintel notebook is called: | a mobile application
The _____________ consists of a number of interrelated
relation to serve as the primary key user interface.
sub processes that extend from the acquisition of materials
34
The approach that seeks to make tapping into computing The concept of liquidity for a 13213 exchange is the: | The digital enterprise shifts the focus from managing
resources as simple as plugging in a lamp into an electrical number of buyers and sellers in a market <271> individual information resources such as devices,
outlet is called | utility computing applications, and data to ________________ that define
The concept of liquidity for a B2B exchange is the: | d. the business and ultimately deliver value to customers and
The assurance that an online customer or trading partner number of buyers and sellers in a market <271> end users. | orchestrating the services and workflows
cannot falsely deny their purchase or transaction is referred
to as: | nonrepudiation. The concept of liquidity for a B2B exchange is the: | The digital enterprise shifts the focus from managing
number of buyers and sellers in a market. individual information resources such as devices,
The auction model is popular in B2B. | one-buyer, one- applications, and data to that define the business |
seller The consists of a number of interrelated subprocesses that orchestrating the services and workflows
extend from the acquisition of materials from suppliers to
The average-cost curve (AVC) of physical products and packaging it and moving it to distributors and retailers. | The digital enterprise shifts the focus from managing
digital products: | are different because the AVC of digital supply chain individual information resources such as devices,
products declines as quantity increases forming a L-shape, applications, and data to that define the business and
while the AVC of physical products is U-shaped. The core of the ?new marketing model? consists of: | ultimately deliver value to customers and end users. |
customer relationships. orchestrating the services and workflows
The banking industry was a good candidate for disruption
by person-to-person (P2P) technology and The core of the new marketing model consists of: | The disadvantage of the NPV method for evaluating EC
disintermediation by ZOPA because: | the industry was customer relationships. and IT is: | it is difficult to compare projects of unequal
making a huge profit margin off its customers. lifes pans or sizes
The cost of converting an existing client-server network to
The barrier to selling books online, either hardcopy or an internal Web is very expensive, even if the business is The disintermediation of cash and credit cards has been
electronic, is technical and not financial. | False currently using the Internet. | False successful in the online world. | False
The basic reasons that companies invest in IT and EC are The Council of Supply Chain Management Professionals The downstream part of the supply chain includes the
all of the following EXCEPT: | to justify new marketing defines _____________ as | a. logistics. activities of a company with its suppliers, which can be
campaigns manufacturers, assemblers, or both, or service providers,
The Council of Supply Chain Management Professionals
and their connections with their suppliers. | F
The basic security concepts relating to customers and other defines _____________ as ?the process of planning,
users are: | a. authentication, authorization, and implementing, and controlling the efficient and effective The dynamic pricing configuration where the resulting
nonrepudiation. flow and storage of goods, services, and related price is determined by each party's bargaining power,
information from point of origin to point of consumption supply and demand in the item's market, and possibly
The bidder details exactly what they are willing to pay. The for the purpose of conforming to customer requirements | business environment factors best describes | A) one buyer,
Seller accepts or rejects the price. What type of auction is logistics. one seller.
being described? | Name-your-own-price auction
The Council of Supply Chain Management Professionals The EC application development option that is most
The business forces that are driving the transition from defines as the process of planning, implementing, and appropriate when an application is needed quickly, money
traditional education to online | d. limited supply of faculty controlling the efficient and effective flow and storage of is in short supply, and/or the new system is not expected to
with specialized expertise. goods, services, and related information from point of provide a competitive advantage is: | purchasing a
origin to point of consumption for the purpose of commercial application.
The business forces that are driving the transition from conforming to customer requirements. | logistics.
traditional education to online learning are all of the The EC application development option that is most
following EXCEPT: | limited supply of faculty with The current Internet sales tax moratorium in the United appropriate when the application is needed quickly, money
specialized expertise. States applies to: | all sales made over the Internet if the is a critical concern, and/or large amounts of maintenance
seller has no physical presence in the state where the buyer are required is called | leasing.
The central portal for an entire organization is called a(n): | lives.
enterprise portal. The EC application development technique that is most
The development of __________ has been more appropriate for strategic applications that will differentiate
The Cisco Connection Online (CCO) Web site receives evolutionary than revolutionary. | d. intra-business e- the company from its competitors is called: | insourcing
over 2 million hits per month for technical assistance, commerce
ordering, order checking, or software downloads. This The EC application development technique which entire
online service had been so well received that nearly The development of m-commerce is being driven by the applications are employed in the new system, that is
_________ percent of all customer service inquiries and following technological, | a. The transition to a especially useful when applications from several business
_________ percent of software updates are delivered manufacturing economy. partners must be integrated is called | enterprise application
online. | 85 / 95 integration.
The development of m-commerce is being driven by the
The Cisco Connection Online (CCO) Website receives following technological, business, social, and economic The e-commerce model in which a business provides some
over 2 million hits per month | a. 25/35 factors EXCEPT: | The transition to a manufacturing product or service to a client business that maintains its
economy. own customers is called: | business-to-business-to-
The Cisco Connection Online (CCO) Website receives
consumer.
over 2 million hits per month for technical assistance, the development of the first database technology was
ordering, order checking, or software downloads. This driven by the need for: | data integration The electronic acquisition of goods and services for
online service had been so well received that nearly percent organizations is | e-procurement.
of all customer service | 85/95 The difference between a business plan and a business case
is | all new businesses should have a business plan, but The electronic job market can create high turnover costs for
The Cisco Connection Online (CCO) Website receives only existing businesses planning a major EC or IT employers by accelerating employees' movement to other
over 2 million hits per month for technical assistance, initiative should develop a business case jobs. | TRUE
ordering, order checking, or software downloads. This
online service had been so well received that nearly percent The difference between a business plan and a business case The electronic job market has increased the number of
of all customer service | 25/35 is: | all new businesses should have a business plan, but individuals who advertise their availability. | True
only existing businesses planning a major EC or IT
The combination of the encrypted original message and the initiative should develop a business case. The elimination of various types of agents that mediate
digital signature, using the recipient's public key, best between buyers and sellers, such as travel and insurance
describes: | digital envelope. The digital economy refers to an economy based on digital agents, is referred to as: | disintermediation
communication networks, computers, software, and other
The concept of consistency in Web site design includes: | related information technologies that provide a global The elimination of various types of agents that mediate
making sure Web pages look the same no matter which platform over which people and organizations interact, between buyers and sellers, such as travel and insurance
browser a customer is using communicate, collaborate, and search for information. | agents, is referred to as | B) disintermediation.
True
35
The elimination of various types of agents that mediate The following direct metrics indicate progress in e- The Internet has created a large demand for personalized
between buyers and sellers, such as travel and insurance procurement EXCEPT: | reduced inventory costs. products and services. Manufacturers can meet that
agents, is referred to as: | disintermediation. demand by using a | mass customization
The functions and efficiency of an e-market are the same as
The emergence of electronic marketplaces has resulted in that of a physical marketplace. | False The Internet has influenced industry structures in each of
lower information search costs for buyers and lower the following ways EXCEPT | Increases differences among
transaction and distribution costs for sellers. | T The general premise of __________ is to effectively competitors whose offerings are kept proprietary.
manage the flow of product, information, and finances
The emergence of electronic marketplaces has resulted in between all trading partners. | a. supply chain management The Internet has influenced industry structures in each of
lower information search costs for buyers and lower the following ways EXCEPT: | b. Increases differences
transaction and distribution costs for sellers. | TRUE The Global Transportation Network (GTN) provides among competitors whose offerings are kept proprietary.
participating carriers and customers with significant cost
The e-SCM process that includes integrated production and savings because it frees individual carriers from the huge The Internet introduced the concept of , which has enabled
distribution processes is: | supply chain replenishment capital costs of advanced technologies. | T marketers and advertisers to interact or communicate
directly with customers and consumers can interact with
The e-SCM process that includes integrated production and The goal of collaborative planning, forecasting, and marketers/advertisers | interactive marketing
distribution processes is | supply chain replenishment. replenishment (CPFR) is to streamline product flow from
manufacturing plants to retailers. | F The Internet introduced the concept of ______________,
The ethical issue raised by collaborative filtering is | which has enabled marketers and advertisers to interact or
invasion of privacy. The government-to-employees category consists of EC communicate directly with customers and consumers can
activities between units of government, including those interact with marketers/advertisers. | interactive marketing
The exchange model in which a third party sets up the within one government body. | False
exchange and promises to run it efficiently and without The Internet introduced the concept of which has enabled
bias is called the: | neutral entrepreneur model. The greatest difficulty in dealing with venture capital is: | marketers and advertisers to interact directly with
finding a willing venture capitalist. customers. | interactive marketing
The exchange model in which RFQs are aggregated then
linked to a pool of suppliers who are notified automatically The growth in electronic meeting systems has been driven The Internet introduced the concept of__________, which
of the RFQ is the ______________ model. | buyer by all of the following EXCEPT: | Shorter cycle times. has enabled marketers and | b. interactive marketing
aggregation
The HotDeal.vn, MuaChung.vn websites are examples of The introduction of EC has | decreased customer loyalty
The exchange model in which RFQs are aggregated then _______________ | B2B2C model because customers can more easily shop, compare, and
linked to a pool of suppliers who are notified automatically switch to different vendors.
of the RFQ is the model | buyer aggregation The IEEE standard __________ offers bandwidth transfer
rates of 200 to 540 Mbps, | a. 802.11n The key difference between an e-business plan and a
The exchange of updated information with other computing traditional business plan is that the entrepreneur must |
devices is called: | c. synchronization The IEEE standard ___________ offers bandwidth transfer understand that the Internet is a unique sales channel
rates of 200 to 540 Mbps, which makes it impractical
The exchange of updated information with other computing because it exceeds the limits of most broadband The key difference between an e-business plan and a
devices is called: | synchronization. connections used by homes and small businesses | 802.11n traditional business plan is that the entrepreneur must: |
understand that the Internet is a unique sales channel.
The exclusively online publication of Stephen King's e- The IEEE standard offers bandwidth transfer rates of 200
book Riding the Bullet in March 2000 | as disrupted by to 540 Mbps, which makes it impractical because it The key problem that biometric marketing is intended to
hackers who breached security, then distributed free copies exceeds the limits of most broadband connections used by solve is | knowing the identity of the actual shopper.
of the book. homes and small businesses | 802.11n
The key reasons why EC criminals cannot be stopped
The exclusively online publication of Stephen Kings e- The implementation of most EC applications requires the include each of the following | b. Sophisticated hackers use
book Riding the Bullet in | d. as disrupted by hackers who use of all of the following | d. manufacturing browsers to crack into Web sites.
breached security, then distributed free copies of the
The implementation of most EC applications requires the The key reasons why EC criminals cannot be stopped
The exclusively online publication of Stephen Kings e- use of all of the following support services EXCEPT: | include each of the following except: | Sophisticated
book Riding the Bullet in March 2000: | as disrupted by manufacturing hackers use browsers to crack into Web sites.
hackers who breached security, then distributed free copies
of the book The inability to deliver products on time is a typical The last fifteen orders from a manufacturer to its suppliers
problem: | a. in traditional logistics only because the range from $100,000 to $8,740,000. This is an example of:
the factors that are critical for an e-payment method to problem has been solved in e-commerce. | the bullwhip effect.
achieve critical mass | All of above
The inability to deliver products on time is a typical The least effective method to protect against pop-up ads
The final participants in B2B transactions are consumers. | problem: | in both off-line and e-commerce. and their risk is: | Minimizing the pop-up window
False
The inability to deliver products on time is a typical The least effective method to protect against pop-up ads
The financial crisis of 2008-2010 resulted in many problem: | in both off-line and e-commerce. and their risk is: | b. Minimizing the pop-up window.
companies going out of business or being acquired by other
companies. | True The incidence of online fraud and identify theft has The legal term for the use of the work without permission
increased for each of the following | c. New effective or contracting for payment of a royalty is | infringement.
The first generation of EC involves social networks, virtual phishing scams and schemes being carried out by computer
worlds, and online transactions. | False experts. The limitations of mobile auctions are all of the following
EXCEPT: | d. Internet cell phones are less private than a
The first major step in developing and e-commerce project The incidence of online fraud and identify theft has PC <498: more private>
is | identify, justify, and plan the EC system increased for each of the following reasons except: | New
effective phishing scams and schemes being carried out by The main purpose of LinkedIn is to allow registered users
The first step in creating a new company or adding an computer experts. to | create and maintain a list of contact details of people
online project is to identify a consumer or business need in they know and trust in business.
the marketplace. | True The Internet and its network protocols were never intended
for use by untrustworthy people or criminals. | TRUE The major _____ e-marketplaces are storefronts and
The first step in the auction process is: | d. searching and Internet malls. | B2C
comparing. The Internet ecosystem refers to animals and plants
discussed online. | False The major __________ e-marketplaces are storefronts and
The first step in the purchase decision-making process is Internet malls. | B2C
product evaluation and comparison. | FALSE
36
The major 13213 services include each of the following The most attractive industries for a vertical exchange are The New York Metropolitan Transit Authority (MTA) did
EXCEPT: | Retail characterized by: | b. a market in which a small number of not need to open another airport for almost two decades,
very large orders account for more than half even though air traffic had tripled because of productivity
The major attributes that enable development of new gains derived from improved IT systems. IT systems added
applications that are possible only | b. Security The most attractive industries for a vertical exchange are by the MTA played critical roles in ticket reservations,
characterized by: | a market in which a small number of passenger and luggage check-in, crew assignment and
The major attributes that enable development of new very large orders account for more than half the total scheduling, runway maintenance and management, and
applications that are possible only in a mobile environment market volume per year gate assignments. This case illustrates that: | Intangible
include all of the following EXCEPT: | Security benefits can be complex, yet substantial
The most cited reason for not purchasing online is price. |
The major B2B e-marketplaces are electronic storefronts, False The newest areas of e-commerce are | Web 2.0 applications
Internet malls, and exchanges. | F
The most common and traditional form of auctions in The online delivery of information for purposes of
The major B2B services include each of the following which one seller entertains bids from many buyers is education, training, or knowledge management best
EXCEPT: | Retail referred to as: | forward auctions. describes: | B. e-learning.
The major benefit of an DSS is _________________ | in The most common and traditional form of auctions in The online platforms and tools that people use to share
easier decision making which one seller entertains bids from many buyers best opinions and experiences, including photos, videos, music,
describes | forward auctions. insights, and perceptions with each other are known as
The major benefit of group decision support systems is: | in
________. | social media
conducting virtual meetings. The most cost-effective approach to EC security is to
develop and implement a strategy | b. proactively meets The original click-and-mortar strategy used by Toys R Us
The major characteristic of B2B commerce is that regulatory, financial, marketing and operational failed, as did the original toy venture of Amazon.com.
companies attempt to electronically automate trading, requirements. Afterwards, Toys R Us sold toys online through
communication, and collaboration processes in order to
Amazon.com. This is an example of: | an alliance of a pure-
improve them, which cannot be done without the Internet. | The most cost-effective approach to EC security is to
player with a traditional retailer.
F develop and implement a strategy that | proactively meets
regulatory, financial, marketing and operational The original click-and-mortar strategy used by Toys R Us
The major difference between e-logistics and traditional requirements. failed, as did the original toy venture of Amazon.com.
logistics is: | b. traditional logistics deals with movement of
Afterwa ds, Toys R Us sold toys online through
large amounts of materials to a few The most dangerous risk to a company engaged in e- Amazon.com. This is an example of: | an alliance of a pure-
commerce is: | b. business risk. player with a traditional retailer.
The major difference between e-logistics and traditional
logistics is: | traditional logistics deals with movement of The most difficult and crucial task in evaluating a vendor the original objections to the relational database model
large amounts of materials to a few destinations. and a packaged system is: | to determine a weighted set of were that it was: | too slow and used too many resources
detailed criteria for choosing the best vendor and package.
The major difference between e-logistics and traditional
The overwhelming majority of B2C purchases are paid for
logistics is: | traditional logistics deals with movement of The most efficient way to expand an organizations scope by smart cards. | False
large amounts of materials to a few destinations. is: | a. to introduce new products or services into new or
existing markets without increasing The person who first suggests a purchase is the Initiator. |
The major disadvantage of banners is . | their cost
True
The most efficient way to expand an organizations scope
The major disadvantage of banners is ______________. | is: | to introduce new products or services into new or The portion of an e-sellers business processes through
their cost existing markets without increasing production facilities or which customers interact, including the sellers portal,
staff. electronic catalogs, a shopping cart, a search engine, and a
The major disadvantage of banners is ______________.. |
their cost payment gateway is referred to as the _____________ of
The most important objectives of strategic assessment are the business. | front end
all of the following | d. Identify what competitors are doing
The major e-marketplaces are storefronts and Internet
to avoid head-on competition. The portion of an e-sellers business processes through
malls. | B2C
which customers interact, including the sellers portal,
The most important objectives of strategic assessment are electronic catalogs, a shopping cart, a search engine, and a
The major enterprise mobile applications are all of the
following EXCEPT: | research and development all of the following EXCEPT: | Identify what competitors payment gateway is referred to as the of the business. |
are doing to avoid head-on competition. front end
The major environmental variables influencing EC
The most serious disadvantage of e-auctions is: | a. the risk The portion of an e-seller's business through which
purchasing are: | social, cultural, community, regulatory,
of fraud. customers interact, including the seller's portal, electronic
political, and legal.
catalogs, shopping cart, and payment gateway is the | front
The motives of hackers have shifted from the desire for
The major limitations of e-auctions are insufficient end of the business.
security, risk of fraud, and a limited pool of participants | T fame and notoriety to advancing personal and political
agendas. | False
The power adapters Dell sells with its computers are built
The major risk of online trading is | security. by small companies who specialize in power-related
The name-your own-price model pioneered by
accessories. Dell and the power adapter manufacturers are
The major risk of online trading is security. | TRUE Priceline.com is a type of | c. one buyer, many potential
engaging in B2B marketing. | True
sellers
The major steps in the process of justifying large-scale EC The practice by sellers of having associates place fake bids
and IT projects include all of the following EXCEPT: | Be The name-your own-price model pioneered by in an auction as a way to | b. shilling.
careful not to over-estimate cost and under-estimate Priceline.com is a type of auction. | one buyer, many
benefits (a tendency of many managers) potential sellers The practice by sellers of having associates place fake bids
in an auction as a way to drive up the selling price is called:
The major tasks of knowledge management include each of The name-your own-price model pioneered by | shilling.
the following except: | supplementing knowledge. Priceline.com is a type of ___________ auction | one
buyer, many potential sellers The presentation of product information in an electronic
The membership business model gives members discounts form and also serving as the backbone of most e-selling
when they make purchases. | True The nationwide batch-oriented electronic funds transfer
sites describes | electronic catalog.
system that provides for interbank clearing of electronic
The most attractive industries for a vertical exchange are payments for participating financial institutions is called The price of a product: | all of them are correct.
characterized by: | many fragmented buyers and sellers. the: | Automated Clearinghouse Network.
The primary advantage that e-books offer publishers is: |
lower production, marketing, and delivery costs.
37
The primary advantage that e-books offer publishers is: | processed, or being sent over a network is referred to as: | The services provided through location-based m-commerce
lower production, marketing, and distribution costs. information assurance. focus on key factors which include all of the following
EXCEPT: | Geocaching, or determining the topography of
The primary benefits of workflow management systems The psychological status of willingness to depend on an area.
include all of the following EXCEPT: | increased data another person or organization best defines | trust.
security. The single factor that will determine which intermediaries
The purchase of goods and services as they are needed, continue to exist and which are replaced is: | the addition of
The primary reason for writing a business plan is to: | usually at prevailing market prices is referred to as: | spot value-added services by the intermediary
acquire external funding. buying
The sole purpose of e-government is to use EC
The principle reason for writing a business plan is to: | The purchase of goods and services as they are needed, technologies to sell products to citizens and collect taxes. |
acquire external funding usually at prevailing market prices is referred to as: | spot False
buying.
The process by which companies present invoices and The spread of instant messaging and Internet telephony has
make payments to one another | b. enterprise invoice The purchase of goods and services as they are needed, naturally led to the idea of linking people via a video chat
presentment and payment. usually the purchase of commodities at prevailing market room, which is called | instant video.
prices, is referred to as demand buying. | F
The process by which companies present invoices and The steps required to approve an expense report is an
make payments to one another through the Internet is The purpose of a consumer behavior model is to help firms example of: | administrative workflow applications.
known as: | enterprise invoice presentment and payment. understand how a consumer makes a purchasing decision
to be able to influence that decision through advertising, The strategy of providing comprehensive, quality e-service
The process of building auction applications is complex for special promotions, or other marketing method. | T for business partners is called customer relationship
all of the following | b. auctions must provide payment management (CRM). | F
systems The purpose of CPFR is to: | ensure that members of the
supply chain will have the right amount of raw materials The structure of a social network is often very simple. |
The process of building auction applications is complex for and finished goods when they need them. False
all of the following reasons EXCEPT: | auctions must
provide payment systems The purpose of CPFR is to: | ensure that members of the The study and practice of ecofriendly computing resources,
supply chain will have the right amount of raw materials and it is now a key concern of businesses in all industries
The process of capturing or creating knowledge, storing it, and finished good when they need them <334> best describes: | green computing.
updating it constantly, disseminating it, and using it
whenever necessary best describes: | knowledge The real estate brokerage industry has been disrupted by The success and security of EC depends on the
management. companies such as Zillow and Homegain for each of the __________ of information and the | d. confidentiality,
following reasons EXCEPT | The Web 2.0 real estate sites integrity, and availability
The process of determining whether a card is active and have driven down commissions from 6 percent to almost 1
whether the customer has | d. authorization. percent The success and security of EC depends on the
__________ of information and the business Web site |
The process of determining whether a card is active and The relationship between EC investment and confidentiality, integrity, and availability
whether the customer has sufficient funds for the purchase organizational performance is: | indirect.
is called: | authorization. The success and security of EC depends on the
The relationship between stock price and when an investor __________ of information and the business Web site. |
The process of dividing a consumer market into logical invests is | IPO investors will pay the highest price per confidentiality, integrity, and availability
groups for conducting marketing research and analyzing share
personal information is | market segmentation. The success and security of EC depends on the of
The risks of being a first mover include all of the following information and the business Web site. | confidentiality,
The process of selecting a software vendor and EC package EXCEPT | the risk that the move will be too late. integrity, and availability
includes each of the following except: | close vendor
contract. The risks of e-mail advertising management include all of The success and security of EC depends on the of
the following EXCEPT: | measuring e-mail advertising information and the business Web site. | confidentiality,
The process of verifying the real identity of an individual, effectiveness integrity, and availability
computer, computer program, or EC Web site best
describes: | authentication. The search war between Google and Yahoo! and other The success and security of EC is measured by: |
search engines is about: | Internet advertising dollars. confidentiality, integrity, and availability.
The process whereby intermediaries take on new
intermediary roles describes ________. | reintermediation The Sears marketing strategy is best described as | a click- The success of an e-payment method depends on its
and-mortar strategy. interoperability with existing enterprise systems and
The processing of card payments has two major phases: applications. | True
identi?cation and settlement. | False The second generation of Internet-based services that lets
people collaborate and share information online in new The success of an e-supply chain depends on an e-supply
The procurement inefficiency refers to the unplanned ways, such as social networking sites, wikis, chain that is loosely integrated both within a company and
purchases of items needed quickly, often at non-negotiated communication tools, and folksonomies best defines: | Web across an extended enterprise made up of suppliers, trading
higher prices. | maverick buying 2.0 partners, logistics providers, and the distribution channel. |
F
The protection of information systems against unauthorized The second most often cited reason for customers not
access to or modification | a. Information assurance. buying on the Web is: | a. the lack of a good return The success of an e-supply chain depends on managing
mechanism. information with strict policies, discipline, and daily
The protection of information systems against unauthorized monitoring. | T
access to or modification of information that is stored, The second-generation of Internet-based services that lets
processed, or being sent over a network is referred to as . | people collaborate and share information online is known The success of many organizationsprivate, public, and
Information assurance. as Web 2.0. An example of this is: | blogging militarydepends on their ability to manage the flow of
materials, information, and money into, within, and out of
The protection of information systems against unauthorized The security of an intranet is important, so many the organization. Such a flow is referred to as a | supply
access to or modification of information that is stored, businesses use firewalls to protect them. | True chain.
processed, or being sent over a network is referred to as
________. | Information assurance. The services provided through location-based m-commerce The tasks if KM include each of the following EXCEPT: |
focus on key factors which | c. Geocaching, or determining c. restricting knowledge access to prevent its transfer
The protection of information systems against unauthorized the topography of an area. between individuals <393>
access to or modification of information that is stored,
38
The tasks of KM include each of the following EXCEPT | The trouble with most virtual e-tailers is that they | lose The ways in which EC is done include: | the Internet,
restricting knowledge access to prevent its transfer between money value-added networks, on local area networks using
individuals. intranets, or on a single computerized machine.
The TRUSTe seal is an example of: | a trustmark.
The technology platform to keep every online transaction The Web hosting option under which the business acquires
secured is _______________ | PKI The two key factors limiting the use of personalization to the hardware, software, staff, and dedicated
more precisely target marketing efforts to individual telecommunications services needed to host a Web site is
The term ________ is an online community that uses the customers are: | privacy and trust issues. called: | self-hosting
power of social networks for the introduction, buying, and
selling of products and services, including people's own The two most cited reasons for abandoning a shopping cart The wireless implementation of e-government mostly to
creations. | social marketplace and not making the purchase are shipping charges and citizens but also to businesses best describes: | mobile
security concerns. | F government.
The term ___________ refers to the number of distinct
individuals requesting pages from the website during a The two types of materials and supplies traded in B2B are: The work atmosphere that a company sets for its
given period, regardless of how often they visit. (Visits | direct and indirect. employees describes: | internal control environment.
refers to the number of times a site is visited, no matter
how many unique visitors make up those sessions.) When The type of contact card that is erasable and modifiable is: | There are two statements: Statement A: WAP stands for
EEPROM. Wireless Application Protocol Statement B: VoIP stands
an individual goes to a website on Tuesday, then again on
Wednesday, this is recorded as two visits from one visitor for Video over Internet Protocol Which of the statements
The type of e-auction is based on__________________ | is/ are correct? | A is True, B is False
(if the time period being measured is e.g. a week or
demand and supply relationship
month). | unique visitor
Thirty-eight percent of all merchants use negative lists,
The type of EC transactions used by Zappos are: | business- which are ?les that include a customer's information and
The term ___________ refers to the number of times users
to-consumer the status of that customer. A customer's transaction is
call up a page that has a banner on it during a specific
period. | ad view matched against these ?les and ?agged if the customer is a
The type of portal which acts as an interface between
known problem. | True
companies, customers, and suppliers, revealing subsets of
The term ___________ refers to the way of measuring the
information to specific audiences is called a(n): | extranet This is the IEEE standard for WiMax. | 802.16
success of an online advertising campaign for a particular portal.
website as well as the effectiveness of an email campaign
by the number of users that clicked on a specific link. | This software allows for viewing of web pages on mobile
The U.S. agencies dedicated to eliminating fraud resulting devices. What type of software is being described? |
click through rate from phishing and crimeware are: | The High-Tech Crime Microbrowser
Network, Anti-Phishing Working Group, and Federal
the term domestic key is not used. If it were used, what do
Trade Commission This software is used to view online WML content. What
you think it would mean? | the primary key in the relation
that the foreign key links to. type of software is being described? | Microbrowser
The ultimate objective of a companys website is to add
enough value to achieve __________, a state in which the This technology is the most popular WWAN standard. |
The term refers to the number of times users call up a page
customer has a vested interest to stay with the company GSM
that has a banner on it during a specific period | ad view
because switching to a competitor entails significant
The term supply chain comes from the concept of how switching costs. | d. lock-in This transmission media is used for short distance, wireless
systems and processes within an organization are linked communication between computers. | Bluetooth
The underlying reasons why a comprehensive EC security
together. | F
strategy is needed include | c. Managers treating EC This wireless standard is a set of protocols that allows
The term supply chain comes from the concept of how the security as a process. portable devices to communicate with the Internet | WAP
partnering organizations are | linked
The underlying reasons why a comprehensive EC security This wireless standard is used to accommodate voice. |
The term______ refers to the number of times users call strategy is needed include all of the following except: | VXML
up a page that has a banner on | b. ad view Managers treating EC security as a process.
This wireless technology will provide faster display of
The threat of substitute products or services is a major The unique combination of resources, experiences, and multimedia | 4G
force that can endanger a company's position in a given expertise within a particular firm is called their: | core
competencies This wireless technology will provide faster display of
industry. | True
multimedia. | 4G
The three functions of a market include: matching buyers The use of cookies | is one of the most controversial issues
in EC. Thomas Register is basically a directory for buyers using
and sellers, facilitating transactions and institutional
search engines because it does not offer any opportunity for
infrastructure. | True
The use of Web technologies to manage warehousing and trade or transactions on its site. | F
The three major elements of Caterpillar Inc.'s learning transportation processes is called: | e-logistics.
three RFID supply chain applications are: | Food, Labeling
infrastructure include: | all of the above.
The vast majority of B2B payments are: | a. still made by and Inventory
The time required for negotiation online is the same for all paper check.
To avoid getting false information from participants of
products because of the use of intelligent agents. | False
The volume of business should be high to reduce online surveys, marketers learn about customers by
The tiny graphics files embedded in e-mail messages and in transaction fees. Which of the five critical success factors observing their behavior using each of the following
Web sites that transmit information about users and their identified by Ramsdell is being described? | Early liquidity EXCEPT: | Data mining to analyze clickstream data.
movements to a Web server are | Web bugs.
The way government makes use of Web 2.0 technologies To be effective, an acceptable use policy (AUP) needs | a.
The top 500 e-tailers accounted for 65 percent of all online to interact with citizens and provide government services to inform all users of their responsibilities when using
sales in 2009. | True best describes: | Government 2.0. company networks, computer
The topic of e-learning is gaining much attention, The ways in which EC is done include To be effective, an acceptable use policy (AUP) needs | to
especially because world-class universities such as MIT, ______________________ | the Internet, value-added inform all users of their responsibilities when using
Harvard, and Stanford in the United States and Oxford in networks, on local area networks using intranets, or on a company networks, computer equipment, wireless devices,
the United Kingdom are implementing it. | True single computerized machine. and customer data.
The transfer of money from the buyers to the sellers The ways in which EC is done include: | the Internet, To be successful and useful, large e-catalogs need a(n) . |
account is called: | b. settlement. value-added networks, on local area networks using search engine
intranets, or on a single computerized machine
To be successful and useful, large e-catalogs need a(n)
__________________. | search engine
39
To defend against unethical and illegal business tactics that Travelers using airline Web sites to book their flights Unlike the physical supply chain, _______________
exploit EC operations, Google, MSN Search, and Yahoo directly without the use of travel agents is resulting in the characterize the financial supply | a. inefficiencies
have turned to all of the following aggressive measures reintermediation of travel agents. | F
except: | Implemented honeypots Unlike the physical supply chain, _______________
Travelers using airline Web sites to book their flights characterize the financial supply chains of most companies.
To defend against unethical and illegal business tactics that directly without the use of travel agents is resulting in the | inefficiencies
exploit EC operations, | c. Implemented honeypots. reintermediation of travel agents. | FALSE
Unlike the physical supply chain, characterize the financial
To defend against unethical and illegal business tactics that Travelers using airline Web sites to book their flights supply chains of most companies. | inefficiencies
exploit EC operations, Google, MSN Search, and Yahoo directly without the use of travel agents is resulting in the
have turned to all of the following aggressive measures reintermediation of travel agents. | .False Updating knowledge as time progresses describes: |
except: | Implemented honeypots. knowledge evolution.
Trends that may slow EC and Web 2.0, and even cripple
To evaluate, how many dimensions of E-Commerce we the Internet include: | all of the above. up-selling | Offering an upgraded version of the product in
will use? | 3 order to boost sales and profit.
Trojan horse | A program that appears to have a useful
To increase their financial viability, third-party exchanges function but that contains a hidden function that presents a USA PATRIOT Act | Uniting and Strengthening America
try to partner with large sellers or buyers, financial security risk. by Providing Appropriate Tools to Intercept and Obstruct
institutions that provide payment schemes, or logistics Terrorism Act passed in October 2001, in the aftermath of
companies to cut costs or increase market liquidity. | T trust | The psychological status of willingness to depend on the September 11 terrorist attacks. Its intent is to give law
another person or organization. enforcement agencies broader range in their efforts to
To succeed, special e-payment methods, such as e-cash, protect the public.
have to maintain anonymity. | True Trust is less important in B2B than in B2C. | False
usability (of Web site) | The quality and usefulness of the
To the __________, physical location does not matter Trust verification sites evaluate a business's users experience when interacting with the Web site.
because the Internet allows anyone to link to any Web site trustworthiness. How comprehensive is this evaluation? |
no matter where in the world that site might be. | b.e-tailer Moderate, generally verification indicates a trustworthy usability testing | Testing the quality of the users
user experience when interacting with a Web site.
Today, many business experts agree with each of the
following EXCEPT: | Supply chain integration has reduced Trust verification sites evaluate a business's user profile | The requirements, preferences, behaviors, and
the intensity of competition in most industries. trustworthiness. How comprehensive is this evaluation? | demographic traits of a particular customer.
Moderate, generally verification indicates a trustworthy
Today, over 90 percent of EC volume is B2C. | False user. Using tunneling technology to improve security of
communication over the Internet is called: | virtual private
Tom visits a Web interface that provides personalized turnkey approach | Ready to use without further assembly network (VPN).
access to information of interest to him. This is an example or testing; supplied in a state that is ready to turn on and
of a(n): | portal. operate. Using Web 2.0 tools, companies can: | do all of the above.
Tools that scout the Web on behalf of consumers who tweets | Text-based posts up to 140 characters in length ustomer-to-customer (C2C) e-commerce is conducted in
specify search criteria are | shopbots. posted to Twitter. various ways on the Internet, but the best-known C2C
activities are: | C2C auctions\
Tools that scout the Web on behalf of consumers who Twitter | A free microblogging service that allows its users
specify search criteria describes ________. | shopping to send and read other users updates. V
robots
Two innovative e-strategies for order fulfillment are: | value proposition | The benefit that a companys products or
total benefits of ownership (TBO) | Benefits of ownership merge-in-transit and rolling warehouses services provide to a company and its customers.
that include both tangible and intangible benefits.
Two major models of third-party exchanges are supplier Value proposition refers to the benefits that a company can
total cost of ownership (TCO) | A formula for calculating aggregation and buyer aggregation. | T derive from using EC. | True
the cost of owning, operating, and controlling an IT
system. Two purposes of a type of _____________ auctions are Various banking activities conducted from home or the
liquidation and market efficiency. | one seller, many road using an Internet connection describes ________. |
trademark | A symbol used by businesses to identify their potential buyers electronic banking
goods and services; government registration of the
trademark confers exclusive legal right to its use. Two purposes of a types of ___________ auctions are vendor-managed inventory (VMI) | The practice of retailers
liquidation and market | b. one seller, many potential making suppliers responsible for determining when to
Traditional and electronic markets have three main buyers order and how much to order.
functions, which include each of the following EXCEPT: |
transforming raw materials into finished products. Two purposes of a types of auctions are liquidation and venture capital (VC) | Money invested in a business by an
market efficiency | one seller, many potential buyers individual, a group of individuals (venture capitalists), or a
Traditional methods for evaluating EC investments include funding company in exchange for equity in the business.
all of the following EXCEPT: | Discount rate Types of business activities in virtual worlds include each
of the following except: | assembling physical products. vertical marketplaces | Markets that deal with one industry
Transaction costs include all of the following EXCEPT: | or industry segment (e.g., steel, chemicals).
Production costs incurred for labor and overhead. Types of costs and cost issues that need to be considered in
justifying EC investments include all of the following Viewing a system (such as an organization) as a set of
Transaction fees for B2B financial services are higher than EXCEPT: | opportunity costs. individual processes leads to __________. | a. sub-
for most other methods. | F optimization
U
Transaction fees model | 1400712639097 viral blogging | Viral (word-of-mouth ) marketing done by
unique visits | A count of the number of visitors entering a bloggers.
transaction log | A record of user activities at a companys site, regardless of how many pages are viewed per visit.
Web site. Viral blogging is viral marketing done by bloggers. | TRUE
unit testing | Testing application software modules one at a
transactional Web site | A Web site that sells products and time. viral marketing | Word-of-mouth method by which
services. customers promote a product or service by telling others
Unlike the brick-and-mortar marketplace, the failure rate about it.
Transport Layer Security (TLS) | As of 1996, another name for online companies is low. | False
for the SSL protocol.
40
virtual (Internet) community | A group of people with Collaborative Planning, Forecasting and Replenishment Web site usability means that people who use the Web site
similar interests who interact with one another using the (CPFR) can do so quickly and easily to accomplish their tasks and
Internet. may also consider such factors as cost-effectiveness and
Wal-Mart and Levi Strauss collaborate on demand usefulness. | True
virtual (pure-play) e-tailers | Firms that sell directly to forecasting in order to optimize the flow of materials along
consumers over the Internet without maintaining a physical the supply chain. This is an example of: | CPFR. Web sites use __________ to compile personal |
sales channel. cookies®istration forms
Wal-Mart and LeviStrauss collaborate on demand
Virtual (pure-play) organizations | Organizations that forecasting in order to optimize the | b. CPFR Web sites use __________ to compile personal information
conduct their business activities completely online on their visitors and then use the information to create
Wal-Mart and LeviStrauss collaborate on demand customer profiles. | d. a and c
virtual (pure-play) organizations | Organizations that forecasting in order to optimize the flow of materials along
conduct their business activities solely online. the supply chain. This is an example of: | CPFR Web sites with audio interfaces that can be accessed by a
cell phone best describes: | voice portals.
Virtual catalogs and links to external sources support the Walmart's corporate social network is a major success. |
information search step in the purchase decision-making FALSE Web video analytics | A way of measuring what viewers do
process. | True when they watch an online video.
was coined by OReilly Media in 2004 to refer to a
Virtual credit cards are used to: | Use in place of actual CC supposed second generation of Internet-based services that Webcasting | A free Internet news service that broadcasts
numbers online for security let people collaborate and share information online in new personalized news and information, including seminars, in
ways, such as social networking and wikis. | Web 2.0 categories selected by the user.
Virtual manufacturing involves pretending you are creating
something. | False We can directly connect information systems with WebMD, which is the largest U.S. medical services
increased firm performance. | b. false company, is known mainly for its webmd.com consumer
Virtual or pure-play e-tailers are firms that sell directly to portal, but its core business is being an e-intermediary. | T
consumers over the Internet without maintaining a physical Web 2.0 | The second generation of Internet-based services
sales channel. | T that lets people collaborate and share information online in Webstore (storefront) | A single companys Web site where
new ways, such as social networking sites, wikis, products or services are sold and usually has an online
virtual private network (VPN) | A network that uses the communication tools, and folksonomies. shopping cart associated with it. Many Webstores target a
public Internet to carry information but remains private by specific industry and find their own unique corner of the
using encryption to scramble the communications, Web 2.0 applications enable segmented advertising. | market.
authentication to ensure that information has not been TRUE
tampered with, and access control to verify the identity of What are the basic elements of e-commerce | Web-based
anyone using the network. Web 3.0 | A term used to describe the future of the World storefronts, secure Web sites,
Wide Web. It consists of the creation of high-quality
Virtual travel agents offer only a small subset of the content and services produced by gifted individuals using What are the four major categories of e-government
services provided by a traditional travel agent. | False Web 2.0 technology as an enabling platform. services? | The four categories are: government-to-citizens,
government-to-business, government-to-government and
virtual university | An online university from which Web 4.0 | The Web generation after Web 3.0. It is still government-to-employees.
students take classes from home or other offsite locations, mostly an unknown entity. However, it is envisioned as
usually via the Internet. being based on islands of intelligence and as being What are the four types of consortium trading exchanges? |
ubiquitous. Vertical-purchasing oriented, horizontal-purchasing
virtual world | A user-defined world in which people can oriented, horizontal-selling oriented and vertical-selling
interact, play, and do business. The most publicized virtual Web analytics and mining tools and services: mining (n): oriented
world is Second Life. khai ph d? li?u clickstream (n): kch chu?t merchandisers
(n): mua hng | offer advanced functions that help marketers What are the four types of consortium trading exchanges? |
virus | A piece of software code that inserts itself into a decide which products to promote, and merchandisers Vertical-purchasing oriented, horizontal-purchasing
host, including the operating systems, in order to achieve a better understanding of the nature of demand. oriented, horizontal-selling oriented and vertical-selling
propagate; it requires that its host program be run to oriented.
activate it. Web bugs | Tiny graphics files embedded in e-mail
messages and in Web sites that transmit information about What are the functions of application programs? | Create
visibility | The knowledge about where materials and parts users and their movements to a Web server. and process forms, process end users, queries, create and
are at any given time, which helps solve problems such as process reports, execute application logic, control the
delay, combining shipments, and more. Web hosting service | A dedicated Web site hosting application
company that offers a wide range of hosting services and
visit | A series of requests during one navigation of a Web functionality to businesses of all sizes. What are the key elements of PKI? | A pair of matched
site; a pause of a certain length of time ends a visit. keys a public key to encrypt a message and a private key to
Web mining | The application of data mining techniques to decrypt it, or vice versa
vlog (or video blog) | A blog with video content. discover meaningful patterns, profiles, and trends from
both the content and usage of Web sites. Also extracting What are the stages of implementation of e-government? |
voice commerce (v-commerce) | An umbrella term for the information from Web documents and Web usage. Information publishing, official two-way transactions,
use of speech recognition to allow voice-activated services multipurpose portals, portal personalization, clustering of
including Internet browsing and e-mail retrieval. Web mining hopes to accomplish all of the following common services and full integration
except: | Determine characteristics of specific users
voice portal | A Web site with an audio interface that can What are the steps and their order in EC order fulfillment? |
be accessed through a telephone call. Web mining hopes to accomplish all of the following Ensuring payment, checking availability, arranging
except: | Determine characteristics of specific users. shipment, insurance, production, plant services, purchasing
vortals | B2B portals that focus on a single industry or
and warehousing, contacts with customers and returns
industry segment; vertical portals. Web portal | A single point of access, through a Web
browser, to critical business information located inside and What are the steps in a Web-based reverse auction? |
vulnerability | Weakness in software or other mechanism outside (via Internet) an organization. Prepare and post project information, identify and approach
that threatens the confidentiality, integrity, or availability
suppliers, bids are created and submitted, bids evaluated
of an asset (recall the CIA model). It can be directly used Web self-service | Activities conducted by users on the and awarded
by a hacker to gain access to a system or network. Web to find answers to their questions (e.g., tracking) or
for product configuration. What are the steps in a Web-based reverse auction? |
W
Prepare and post project information, identify and approach
Web site content is especially important to increase suppliers, bids are created and submitted, bids evaluated
Wal-Mart and Levi Strauss collaborate on demand stickiness because | customers are expensive to acquire.
forecasting in order to optimize the flow of materials along and awarded.
the supply chain. This is an example of _____________ |
41
What are the steps in bargaining online? | Search, selection, What is not a benefit of an FAQ? | The answers can change What term refers to a primary key made up of more than
negotiation, continuing selection and negotiation, and dynamically based on the questions one field | composite key
transaction completion
What is not a benefit of an FAQ? | The answers can change What three factors facilitate online negotiations? | Voice
What are the steps in creating a vertical e-marketplace? | dynamically based on the questions. over IP systems
Thinking ahead, planning, system analysis and design,
building the exchange, testing/installation/operation, and What is NOT a major benefit of m-commerce? Hint: What type of key might Name be in problem above? |
system evaluation choose two answers | ,Reduces time utilization and Candidate Key
productivity of mobile employees,Increases time to order
What are the two most cited reasons for not purchasing What type of mechanism determines who can legitimately
online? | Security and quality assessment What is NOT one of Porter's Five Forces? | Effects of EC use a network resource? | Access Control
Systems
What are the two types of materials and supplies that are When a car manufacturer sells trucks, cars, and car parts to
traded in B2B? | Direct and indirect. What is the function of DBMS? | creates, processes and the government or military, this is an example of B2C
administers databases under the control of the DBMS marketing. | False
What are virtual (pure-play) e-tailers? Give an example.
List one advantage and one disadvantage of this model. | What is the function of the application generator in When a good or service is promoted, the purpose of the
Virtual (pure-play) e-tailers are firms that sell directly to Access? | to create and manage forms, reports and queries promotion is to inform, persuade, or remind customers. |
consumers over the Internet without maintaining a physical True
sales channel. Amazon.com is a prime example of this type What is the likely effect on intermediation of the following
of e-tailer. Virtual e-tailers have the advantage of low market events: aggregation, complex search requirements, When a supply chain is managed electronically, usually
overhead costs and streamlined processes. One and new markets? | Cybermediation with Web technologies, it is referred to as a(n) | e-supply
disadvantage is a lack of established infrastructure or back chain.
What is the most commonly used type of database? |
office to support the online front-office activities.
relational database When a tee shirt manufacturer states, "We only sell it in
What does C2B stand for? Hint: capitalize the first letter of black because that way we can buy plenty of black fabric
What is the name of TCUs football team? | e. Horned Frogs and run our plant efficiently," their statement reflects the
each word. E.g: if NIC, you need to enter Network
(hint pick this one) views that were popular in which era of the evolution of
Interface Card only. | consumer-to-business
marketing? | Production-oriented
What is the primary advantage of catalog sales? | Catalogs
what does database migration mean? | used to describe the
eliminate the constraints of When Chaplin's auto lease is about to expire, he decides it
process of redesigning an existing database to meet new or
changing database requirements. is time to buy a new car. This imbalance between a desired
What is the primary responsibility of the Chief Information state and an actual state is called need identification. |
Officer? | c. set and guide the information systems strategy TRUE
What does DBMS stand for? | database management
system What is the proper order for the steps in market research? | When Chaplins auto lease is about to expire, he decides it
Problem Definition, Research Methodology, Data is time to buy a new car. This imbalance between a desired
what does DDL stand for? | data definition language, used
Collection and Analysis, Results and Recommendation state and an actual state is called need identification. | T
for creating tables, relationships, and other database
querying and modifying data What is the purpose of a database? | to help people keep When choosing between two identical goods, customers
track of things will always choose the lowest price. | False
what does DML stand for | data manipulation languages,
used for querying and modifying data What is the relationship between a primary key and a When compared to the traditional job market, an advantage
candidate key? | A primary key is a candidate key of the online job market is its long life cycle. | TRUE
What has been the impact of the introduction of EC on
customer loyalty in general? | Loyalty has decreased What is the role of data mining? | It allows the firm to
because of customers ability to shop, compare, and shift When comparing retailing to e-tailing, e-tailing has a lower
anticipate customer needs.4. Why must the online presence cognitive shopping overhead due to easy-to-establish
vendors. and the telephone system be integrated? | So that all data mutual trust. | FALSE
constantly and consistently enters the system.
What is a benefit of e-auctions to sellers? | Convenience
since the bidding can occur anywhere and any time. When computing agency cost, companies should consider |
what is the SQL SELECT/FROM/WHERE framework? | only production-related costs and ignore transaction costs.
SELECT clause specifies which columns are to listed in the
What is a benefit of e-auctions to sellers? | The optimal
query results FROM clause specifies which tables are to bu When creating a new business, the first step is to | identify
price is determined by the market.
used in the query WHERE clause specifies which rows are a consumer or business need that isn't presently being met
What is a closed-loop stored-value card? | A card can only to listed in the query result
be spent for its initial value When creating a new business, the first step is to: | identify
What is the three models of EIPP? | Buyer, Seller, and a consumer or business need that is not presently being
What is a normal form? | one category in a set of categories Consolidator met.
used to describe relations according to the type of
What is the typical order of the phases of the auction When Dell purchases Godiva chocolates as gifts for its
anomalies that can occur in the relations.
process? | Searching and comparing, getting started at an employees and has Godiva mail them directly to the
What is a virtual community? Identify six common auction, the actual bidding and post auction follow-up recipient Dell is engaged in B2B2C. | True
classifications. | A virtual community is a group of people
What is true regarding competitive advantage. | d.it is When large suppliers or buyers are involved, a workflow
with similar interests who interact with one another using
difficult to sustain system: | is needed for both the collaborative efforts and for
the Internet. Six common classifications are transaction,
purpose or interest, relations or practices, fantasy, social supply chain and production improvements.
What is true regarding competitive advantage? | it is
networks, and virtual worlds. difficult to sustain When making a purchasing decision, deciding what
What is cybercrime? | Intentional crimes carried out on the what job functions does a database administrator perform? | product to buy is referred to as product brokering. | TRUE
Internet. designs, constructs, and manages databases When measuring the effectiveness on an online
What is cybercriminal? | A person who intentionally carries What relations are in 1NF? | Any relation is, by definition, advertisemen | click-throughrate
out crimes over the Internet. in 1NF When measuring the effectiveness on an online
What is metadata? How does this term pertain to a advertisement, the __________ is the percentage of visitors
What strategic benefits are associated with using social to a page who click on an advertisement. | e. click-through
database? | Metadata is data about data. Metadata in networks? | They allow a business to better access
databases allow them to be self-describing. rate
customers for sales, feedback and research.
When membership fees are the basis for revenue
generation in an e-exchange, it has been shown that: | low
42
membership fees often result in losses to the exchange,; Which of the following about business plans and business Which of the following E-Commerce model conduct
however, high fees discourage participation. cases is NOT correct? | c. The audiences are the samesenior almost through out wireless network or portable device? |
management and the board or directors. M-Commerce
When planning an EC project, planners must first consider:
| how the EC project aligns with the organization's overall Which of the following advertising methods involves the Which of the following factors would not affect a demand
business plans and processes. use of games? | Advergaming forecast? | Production schedule
When planning, designing and implementing integrated Which of the following are benefits of social commerce to Which of the following forms of connectivity is the least
supply chain operations, management requires a holistic the consumer and to vendors? Hint: choose multiple scalable? | d. private leased network
focus that takes account all of the following primary factors answers | ,Customers' expectation can be meet in fully and
EXCEPT: | location and revenues. quickly.,Increate trust via direct conversations.,Target Which of the following groups is the least likely to own a
advertisements more accurately B2B exchange? | Mid-sized industry player
When the supermarket scans your premier customer card it
links you to your purchases and then uses that information Which of the following are EC activities supported by Web Which of the following is a benefit of EC? | Individuals can
to establish a personal shopping pattern for you. 2.0 tools and social network services? | entertainment telecommute more easily
Subsequently, the supermarket uses that information to
target advertising (like coupons and mailers) directly to Which of the following are main major characteristics of Which of the following is a free method used to help deter
Web 2.0? Hint: choose multiple (3) answers | ,Rich User fraud in online auctions? | Grading services
you based on your established shopping patterns, a form of
one-to-one, __________ marketing. | e.relationship Experience,User Participation,Collaborative
Which of the following is a limitation of auctions? |
When the works of sale employees are recorded in real Which of the following businesses is an information Potential for fraud
time, the organization benefits through each of the portal? | Company D provides news, bulletin boards and
classified ads for a particular vertical market Which of the following is a limitation of EC? | Special
following EXCEPT: | more extensive collaboration and
network and hardware requirements
sharing of customer leads
Which of the following businesses is an information
portal? | Company D provides news, bulletin boards and Which of the following is a major characteristic of m-
When would you use a surrogate key? | when the non-
classified ads for a particular vertical market. commerce? | Reachability
surrogate primary key would be too large and unwieldy
Which of the following case-study is opening case of Which of the following is a private B2B e-marketplace? |
Where do a huge majority, possibly as high as 95 percent,
of hackers reside? | Turkey, China, Romania, or Brazil. chapter 8 - "Marketing and Advertising in E-Commerce"? | Company ABC sells machine parts to their 20 customers
Netflix Increases Sales Using Movie Recommendations on their Web site
Where does the value of a surrogate key come from? | A and Advertisements
Which of the following is a private B2B e-marketplace? |
surrogate key value is normally assigned by the BDMS
Which of the following categories of e-government Company ABC sells machine parts to their 20 customers
when a new row is created
on their Web site.
increases the number of grant programs available for
Where is Web 2.0 software going? | Large companies are electronic application? | G2G
Which of the following is a technological limitation of EC?
adding Web 2.0 tools to their existing collaboration
products and IBM Lotus and Intel are adding social Which of the following categories of e-government reduces | Order fulfillment requirements of large-scale B2C.
networking software to their software suites. the average time for citizens to find benefits? | G2C
Which of the following is a virtual organization? | Two
Whether the delivery is made by company-owned vehicles Which of the following categories of e-government reduces companies combine resources to market a new product.
the average time for businesses to comply with They know this product can only be sold for the next 3
or is outsourced to a carrier, an express delivery model is months.
referred to as an | on-demand delivery service. regulations? | G2B
which are the most popular type of B2B consortium, Which of the following categories of e-government reduces Which of the following is an area where supply chains can
the average time to process clearance forms? | IEE be improved? | Manufacturing processes
consist of a group of companies that join together to
streamline purchasing processes. | Purchasing-oriented Which of the following is an electronic magazine delivered
consortia Which of the following companies does not trade stocks
online? | Priceline.com over the internet? | E-Zine
Which factor is responsible for most information security
breaches? | Human error Which of the following connects a circle of Weblogs with a Which of the following is an example of a general purpose
common focus or theme? | blogring pure-play e-tailer? | Store A does not have a physical
location and sells a variety of products.
which involve bundling some goods and services together
to provide more value than from offering them separately. | Which of the following content are benefit of E-Learning?
Hint: choose multiple answers | ,Reduces travel time and Which of the following is an example of disintermediation?
complementarities | In addition to selling through department stores, a firm
travel costs for off-campus students,Self-paced learning
modules allow students to work at their own pace begins to sell online
which is a data file that is stored on the users hard drive,
frequently without disclosure or the users consent. | cookie Which of the following is an example of disintermediation?
Which of the following content is NOT the benefits of E-
Government? Commonwealth: khu v?c th?nh vu?ng | | In addition to selling through department stores, a firm
Which is an example of reintermediation | Using a
salesperson to negotiate a large, complex agreement Reduced access to information. It reduces a greater amount begins to sell online.
of information to businesses and provides it in a more
Which of the following is an example of edutainment? | a.
Which is an example of reintermediation? | Using a organized and accessible manner.
an online game that uses colorful characters to teach young
salesperson to negotiate a large, complex agreement
Which of the following do businesses consider the least children about
Which is INCORRECT about company-centric important when creating portal services? | News services
Which of the following is an example of edutainment? | An
marketplaces term? | It is a public marketplace entities
Which of the following does not correctly describe what online game that uses colorful characters to teach young
owned by that company.
firewalls protect against? | c. Macros are the electronic children about numbers
Which is not a characteristic of permission marketing? | equivalent of junk mail.
Which of the following is an example of G2C ? U.S.
Spamming
Which of the following does not create dynamic pricing? | Census: co quan di`u tra dn s cu?a Mi~ Chamber of
Which is not a characteristic of strategic sourcing? | Long-term contracts Commerce: pho`ng thuong ma?i Mi~ | a driver applies for
Supported through third-party exchanges and pays for the renewal of his auto tag online.
Which of the following does not describe intrabusiness
Which is true when talk about "e-check"? | All of the above workflows after the addition of m-commerce? | Work Which of the following is an example of government-to-
orders assigned by multiple dispatchers citizen (G2C) EC? | Electronic benefits transfer (EBT)
which normal forms re concerned with functional
dependencies? | 2NF to Boyce-Codd NF Which of the following is an example of matching? | A
B2C EC site
43
Which of the following is an example of peer-to-peer EC? | Which of the following is not a customer service metric? | Which of the following is not an example of B2E? | A
File sharing Product quality business advertises for new employees on their Web site
Which of the following is an intermediary? | Computer Which of the following is not a disadvantage of paper Which of the following is not an example of company-
system that matches buyers with "Goods Wanted" to seller catalogs? | Portability centric EC? | A group of companies purchase office
with "Goods for Sale" supplies from a consolidated online catalog
Which of the following is not a driver in the electronic job
Which of the following is generally the "best" way for market? | Size of labor market Which of the following is not an example of company-
customers to deal with returns? | Establish drop off centric EC? | A group of companies purchase office
locations for returns Which of the following is not a future direction of CRM? | supplies from a consolidated online catalog.
Reduced impact of open source products
Which of the following is generally the lowest ranked Which of the following is not an example of post auction
attack type? | DOS attacks Which of the following is not a goal of procurement follow-up? | Snipping
management? | Increase maverick buying
Which of the following is INCORRECT about Which of the following is not an example of web self-
edutainment? | Some adult games like Doom, Grand Theft Which of the following is not a limitation of EC? | service? | Call center support
Auto, are example of edutainment. Customers now have nearly unlimited bandwidth.
Which of the following is not an identified benefit of
Which of the following is likely to have the lowest cost of Which of the following is not a limitation of e-cash? | Lack electronic benefits transfer (EBT)? | Ease in assigning taxes
entry? | a. an e-retailer of potential uses
Which of the following is not an interaction element in a
Which of the following is not a benefit of auctions to Which of the following is not a limitation of m-commerce? virtual community? | e-book
buyers? | Disintermediation | Potential user base
Which of the following is not an online banking application
Which of the following is not a benefit of auctions to Which of the following is not a limitation of m-commerce? category? | delivery
sellers? | Entertainment | Power consumption
Which of the following is not an organizational buyer? |
Which of the following is not a benefit of forward Which of the following is not a limitation of traditional Student purchasing school supplies
auctions? | Increased product quality auctions? | Technical ability of buyers
Which of the following is not an synchronous collaboration
Which of the following is not a benefit of Internet- based Which of the following is not a limitation of traditional tool? | Voice mail
XML over traditional EDI | Guarantees universal auctions? | Duration of sale
compatibility Which of the following is not characteristic of an e-check? |
Which of the following is not a part of the EC Consumer Work under a new, enhanced legal framework
Which of the following is not a benefit of Internet- based Behavior Model? | Decider variables
XML over traditional EDI? | Guarantees universal Which of the following is not characteristic of an m-wallet.
compatibility Which of the following is not a reason to outsource? | The | Is currently only experimental and not used by the public
function is a core competence
Which of the following is not a benefit of using the Internet Which of the following is not currently a factor in the
to aid real estate transactions? | Online services eliminate Which of the following is NOT a standard used in E- development of m-commerce? | Reluctance of vendors
the need to visit houses Commerce? | IFI
Which of the following is not decreasing? | Web site
Which of the following is not a benefit of using wireless Which of the following is not a type of Internet security defacements
phones in auctions? | Security tactic? | PPT
Which of the following is not one of the advantages of the
Which of the following is not a benefit to working with an Which of the following is not a typical service provided by electronic job market for employees? | Lack of Internet
intermediary? | Increased control over auction sales online travel agents? | True bargains on airfare cost users
Which of the following is not a capability of home Which of the following is not an advantage of online Which of the following is not one of the four phases of risk
banking? | Print new checks online banking? | Personal interaction with staff management? | Reporting
Which of the following is not a challenge in e-learning? | Which of the following is not an advantage of virtual Which of the following is not one of the major benefits of
Student interest private networks (VPN) for data communications? | They 13213? | Enables customized online catalogs with the same
ensure the confidentiality and integrity of the data prices for different customers.
Which of the following is not a change in the travel transmitted over the Internet without requiring encryption.
industry created by online travel agents? | Higher total trip Which of the following is not one of the major benefits of
cost due to lost services Which of the following is not an area where supply chains B2B? | Enables customized online catalogs with the same
can be improved? | Customer research prices for different customers.
Which of the following is not a characteristic of sell-side
merchants? | They slightly increase prices for online sales Which of the following is not an attribute of a corporate Which of the following is not one of the major types of
portal? | The public uses this portal to access the Internet payment cards? | Flip cards
Which of the following is not a characteristic of sell-side
merchants? | They slightly increase prices for online sales. Which of the following is not an attribute of a corporate Which of the following is not one of the parties usually
portal? | The public uses this portal to access the Internet. associated with electronic payments? | Enforcer
Which of the following is not a characteristic of the Digital
Revolution? | Many business processes are expedited by up Which of the following is not an environmental variable in Which of the following is not part of the CIA triad? |
to 50 percent. EC purchasing? | Climate variables Pricing
Which of the following is not a characteristic of the Digital Which of the following is not an established application of Which of the following is not part of the required
Revolution ? | a. Many business processes are expedited by e-government? | G2P infrastructure for a B2B marketplace? | Proprietary, private
up to 50 percent. networks
Which of the following is not an example of a P2P system?
| User interfaces are based inside a Web browser Which of the following is not required for an intranet? |
Which of the following is not a characteristic on an
intranet? | Uses proprietary stands Access to the Internet
Which of the following is not an example of a P2P system?
Which of the following is not a classification of exchange? | User interfaces are based inside a Web browser. Which of the following is not the function of a market? |
| Tangential E-Exchange Ensuring profits of brokers
Which of the following is not an example of an e-payment?
Which of the following is not a common use of smart | Cash Which of the following is not true about the anatomy of
cards? | PC replacement cyber attacks? | Reporting serious attacks has increased
44
Which of the following is not true of targeted advertising? | Which of the following major factors is the most important of Facebook, which originally referred to the social
Customers inform vendors of their locations predictor of online buying behavior? | product information network of relationships between users of the social
requested networking service provided by Facebook. The idea was
Which of the following is not true of targeted advertising? | for Facebook to benefit from the social graph by taking
Customers inform vendors of their locations. Which of the following network type has the largest range advantage of the relationships between individuals that
of geography implement? | WAN Facebook provides, to offer a richer online experience.
Which of the following is the central point of control for an This definition was expanded to refer to a social graph of
e-market? | collaboration hub Which of the following parties use the Internet job market? all Internet users." | Social graph
| all of the above
Which of the following is the e-government category that Which of the following term is correct with the following
includes interactions between governments and businesses? Which of the following provides learning to an employee statement: "Develops knowledge of the Internet and
| government-to-business. while the work is being done? | learning on-demand computers skills that will help learners throughout their
lives, careers and they can study anywhere they have
Which of the following is the e-government category that Which of the following refers to the mapping and
access to a computer and Internet connection". | E-Learning
includes activities and services between government units measuring of relationships and flows between people,
and their employees? | government-to-employees groups, organizations, animals, computers or other Which of the following term is the best description for the
information- or knowledge-processing entities? | social figure? | E-Government
Which of the following is the e-government category that network analysis
includes all the interactions between a government and its Which of the following types of products is not typically
citizens? | government-to-citizens. Which of the following services does an automated search offered on priceline.com? | Antiques
service provide? | Searches several auction sites for a
Which of the following is the e-government category that particular product selected by the user Which of the following types of virtual communities just
includes activities within government units and those facilitates the exchange of information on a topic of mutual
between governments? | government-to-government Which of the following spurred the use of debit cards by interest and does not support trading? | purpose or interest
eliminating the requirement for merchants to issue receipts
Which of the following is the flow of materials, for debit purchases of $15 or less? | U.S. Electronic Funds Which of the following wireless technology has the lowest
information, money and services from raw materials Transfer Act coverage of signal? | WiFi
suppliers to end customers? | Supply chain
Which of the following statements about bartering is false? Which of the following would not create a "bullwhip" in
Which of the following is the most popular online customer | It is primarily done between individuals and private the supply chain? | Accurate demand forecasts
service tool? | E-mail parties.
Which of these following items are benefits of E-Learning?
Which of the following is the most serious strategic threat Which of the following statements about blogs is not true? | Hint: choose multiple answers (3) | lower cost, greater
to traditional travel agents? | Intelligent software agents c. Blogs are limited to one-way communication. flexibility, more effective learning
Which of the following is the underlying reason why Which of the following statements about differentiation Which technologies are designed and used to secure EC
comprehensive EC security is necessary? | C) Security and personalization is not correct? | Products must be communications across a network? | Access control lists,
costs and efforts from reacting to online attacks and paying differentiated for perfect competition. tokens, passwords, and biometric systems
for damages are greater than if an EC security strategy is in
place. Which of the following statements about hardware and Which type of shopping software agent learns a user's
software security defenses is | a. Hardware and software preferences over time? | Learning agent
Which of the following is true about copyrights? | The security defenses protect against irresponsible business
entertainment industry, led primarily by the Motion Picture Which types of services are outsourced the most? | IT
Association of America (MPAA) and RIAA, is trying Which of the following statements about hardware and services are most often outsourced.
technical solutions via the legal system to protect its software security defenses is false? | Hardware and
interests software security defenses protect against irresponsible Which U.S. law mandates the use of filtering technologies
business practices or corrupt management. in schools and libraries that receive certain types of federal
Which of the following is true about copyrights? | The funding? | Children's Internet Protection Act
entertainment industry, led primarily by the Motion Picture Which of the following statements about the rights to
Association of America (MPAA) and RIAA, is trying privacy and free speech is not correct? | The Internet has Why does MS Access hide important database technology?
technical solutions via the legal system to protect its destroyed the right to privacy. | to make it easier for beginning users to create and work
interests. with small database applications
Which of the following statements about the rights to
Which of the following is true about the scope of business privacy and free speech is not correct? | The Internet has Why is a database considered to be self-describing? |
ethics? | The scope of business ethics has expanded to destroyed the right to privacy. because it contains a description of itself- such as what
encompass the nature and quality of the relationships with tables are in the database, which columns are in each table
shareholders, customers, business partners, suppliers, the Which of the following systems have suppliers and and what kind of data is store in each column
community, environment, and future generations retailers collaborating in their planning and demand
forecasting to optimize the flow of materials along the Why is B2C generally less attractive than B2B? | Channel
Which of the following is true about the scope of business supply chain? | CPFR conflict
ethics? | The scope of business ethics has expanded to
encompass the nature and quality of the relationships with Which of the following systems make suppliers responsible Why is being number one in operation efficiency not
shareholders, customers, business partners, suppliers, the for retailers inventory levels? | VMI enough to keep 1-800-Flowers.com at the top of its
community, environment, and future generations. industry? | More is needed because all other competitors
Which of the following systems use algorisms to identify offer similar efficiencies.
Which of the following is true of virtual banks? | Virtual optimal solutions to complex planning problems that are
banks have no physical location. bound by constraints? | APS why is SQL described as a data sublanguage? | consists
only of language statements for defining and processing a
Which of the following is true regarding a second round of Which of the following technologies is safe to use in database
financing? | IPO investors will pay the highest price per tissue? | RUBEE
share. Why would a merchant want to customize products? | To
Which of the following technologies use item level charge a higher price
Which of the following item is NOT included in the four tracking of items? | RUBEE
major categories of e-government services? | government- Wi-Fi (wireless fidelity) | The common name used to
to-customers Which of the following technologies use magnetic waves describe the IEEE 802.11 standard used on most WLANs.
to track items? | RFID
Which of the following items drivers of m-commerce? wiki (wikilog) | A blog that allows everyone to participate
Hint: choose multiple (3) answers | ,The handset Which of the following term is CORRECT with the as a peer; anyone may add, delete, or change content.
culture,Improving bandwidth,Improved price/performance description paragraph: "A term coined by Mark Zuckerberg
45
Wikipedia.com, a Web site that allows people to work advertisements and earn them a few cents for each click. |
together online and share information, is an example of Sploggers
Web 2.0. | True
Worldwide purchases of EPEAT-registered products result
Wikis, blogs and RSS are replacing e-mail for all of the in each of the following except: | reduced staffing
following EXCEPT | Wikis, blogs and RSS are more requirements.
secure than e-mail.
worm | A software program that runs independently,
will play a major role in facilitating B2B because it makes consuming the resources of its host in order to maintain
it easier to meet the demands of business customers and itself, that is capable of propagating a complete working
channel partners. | Web Services version of itself onto another machine.
Windows Live Expo is an online You are walking near a coffee shop and suddenly your cell
_________________________ similar to Craigslist in that phone beeps with a message: ?Come inside and get a free
it provides online classifieds and lets users choose listings biscotti with any purchase.? This is an example of: |
they want to search sorted either by friends and contacts or location-based advertising
by geographic proximity | social marketplace
Z
wireless local area network (WLAN) | A
telecommunications network that enables users to make
short-range wireless connections to the Internet or another
network.
46