0% found this document useful (0 votes)
11 views83 pages

FinalBanking (1)

The document provides definitions and explanations of various terms related to e-commerce, online marketing, and digital transactions. It covers concepts such as business models, online publishing, customer relationship management, and different types of retailers. Additionally, it discusses technologies and strategies used in online environments, including social networking, data privacy, and marketing techniques.

Uploaded by

thao.lengthanh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views83 pages

FinalBanking (1)

The document provides definitions and explanations of various terms related to e-commerce, online marketing, and digital transactions. It covers concepts such as business models, online publishing, customer relationship management, and different types of retailers. Additionally, it discusses technologies and strategies used in online environments, including social networking, data privacy, and marketing techniques.

Uploaded by

thao.lengthanh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 83

*

____ are retailers who conduct business in the physical world, in traditional stores | Brick-and-mortar distributors

_____ includes retail transactions of products/services from businesses to individual shoppers. | B2C

_____ refers to a broader definition of _____. | E-Commerce, E-Business

______ is the electronic delivery of newspapers, magazines, books, videos, music, and other digitizable information over the Internet. | Online publishing

_______ are a popular online publishing technology for creating a Web page that can be edited by anyone with a standard Web browser. | Wikis

_______ is commonly used to broadcast public lectures and e-seminars, promote the work of new or unknown musicians, and broadcast international entertainment activities. | Webcasting

_______ is the direct purchasing from internal marketplaces without the approval of supervisors and without the intervention of a procurement department. | Desktop purchasing

__ are barriers between a trusted network or PC and the untrustworthy Internet. | Firewalls

__ are brick-and-mortar retailers that offer a transactional Web site from which to conduct business. | Click-and-mortar retailers

__ are data that occur inside the Web environment, and they provide a trail of the user's activities in the Web site. | Clickstream data

__ are electronic intermediaries that provide and/or control information flow in cyberspace, often aggregating information and selling it to others. | Infomediaries

__ are firms that sell directly to consumers over the Internet without maintaining a physical sales channel. | Virtual (pure-play) e-tailers

__ are tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server. | Web bugs

__ communities belong to a company, an association, or a group of companies. | Private

__ communities open their membership to anyone. | Public

__ is a deep commitment to rebuy or repatronize a preferred product or service consistently in the future, thereby causing repetitive same-brand purchasing. | Customer loyalty

__ is a marketing arrangement by which an organization refers consumers to the selling company's Web site. | Affiliate marketing

__ is a marketplace in which an intermediary arranges barter transactions. | Bartering exchange

__ is an umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage. | Digital rights management

__ is money invested in a business by an individual, a group of individuals, or a funding company in exchange for equity in the business. | Venture capital

__ is online advertising that focuses on social networking sites. | Social network advertising

__ is online marketing, facilitated by the Internet, by which marketers and advertisers can interact directly with customers, and consumers can interact with advertisers or vendors. | Interactive
marketing

__ is the assurance of data privacy. | Confidentiality

__ is the assurance that online customers or trading partners cannot falsely deny their purchase or transaction. | Nonrepudiation

__ is the criminal, fraudulent process of attempting to acquire confidential information by masquerading as a trustworthy entity. | Phishing

__ is the name-based address that identifies an Internet-connected server. | Domain name

__ is the online B2C business model where manufacturers customize their products and services via online orders. | Make (build)-to-order
__ is the popular term for advanced Internet technology and applications including blogs, wikis, RSS, and social bookmarking. | Web 2.0

__ is the process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform. | Authorization

__ is the process of scrambling a message in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble it. | Encryption

__ is the psychological status of willingness to depend on another person or organization. | Trust

__ is the situation in which an online marketing channel upsets the traditional channels due to real or perceived damage from competition. | Channel conflict

__ is viral marketing done by bloggers. | Viral blogging

__ matches services, products, and advertising content with individuals and their preferences. | Personalization

__ refers to an online market, usually B2B, in which buyers and sellers exchange goods or services. | E-marketplace

__ refers to social networking where members converse and connect with one another using cell phones or other mobile devices. | Mobile social networking

__ refers to technologies and business practices that free the workforce from the constraints of legacy communication and productivity tools such as email. | Enterprise 2.0

__ refers to the integration of computers and wireless communications in order | b. Telematics

__ refers to the mapping and measuring of relationships and information flows among people, groups, organizations, computers, and other information- or knowledge-processing entities. | Social
network analysis

__ refers to the portion of an e-seller's business processes through which customers interact, including the seller's portal, electronic catalogs, a shopping cart, a search engine, and a payment
gateway. | Front end

__ refers to the second-generation of Internet-based services that let people collaborate and share information online in new ways, such as social networks and wikis. | Web 2.0

__ treats each customer in a unique way to fit marketing and advertising with the customer's profile and needs. | One-to-one marketing

____ are used by consumers to locate | shoppingbots

____ are used by consumers to locate the best price for a desired product | a. Shopping bots

____ enables the determination of the location of an enabled device. | b. GPS

____ includes software and integration efforts intended to increase customer satisfaction and loyalty. | e. CRM

____ is commonly used to broadcast public lectures and e-seminars, promote the work of new or unknown musicians, and broadcast international entertainment activities | Webcasting

____ is the act ferreting out previously unknown patterns and relationships from a set of data. | b. Data mining

____ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format. | e. None of the above - EDI

____ is the process of planning, implementing, and controlling the flow of goods and services from point of origin to point of consumption. | d. Logistics

____ is/are used to pay for microtransactions | either e-cash or difital cash

____ is/are used to pay for microtransactions. | d. Either A or B

____ work best with many buyers and many sellers. | b. Dynamic exchanges

____, the act of modifying a product or service to fit a given users requirements, is a possible e-commerce source of sustainable competitive advantage. | b. Customization

_____ are a popular online publishing technology for creating a Web page that | c. Wikis
_____ is a crimeware technique used to steal the identity of target companies to get the identities of their customers. | Phishing.

_____ is an advertising strategy that uses word-of-mouth marketing in which customers promote a product or service by telling others about it. | Viral marketing

_____ is commonly used to broadcast public lectures and e-seminars, promote the work of new or unknown musicians, and broadcast international entertainment activities. | Webcasting

______ can be supported more effectively and efficiently through direct buyer | a. Strategic purchases

______ can be supported more effectively and efficiently through direct buyerseller offline or online negotiations, which can be done in private exchanges or private trading rooms in public
exchanges. | Strategic purchases

______ is an EIPP many-to-many model with a third party acting as an intermediary, collecting or aggregating invoices from multiple sellers and payments from multiple buyers. | Consolidator

______ is the electronic delivery of newspapers, magazines, books, videos, | a. Online publishing

______ is the electronic delivery of newspapers, magazines, books, videos, music, and other digitizable information over the Internet | Online publishing

_______ are a popular online publishing technology for creating a Web page that can be edited by anyone with a standard Web browser | Wikis

_______ are extremely busy customers willing to shop online in order to free up time. | Leading edgers

_______ are small online payments typically under US$10: | E-micropayments

_______ is the continuous evaluation of progress toward the organizations strategic goals, resulting in corrective action and, if necessary, strategy reformulation. | strategy assessment

_______ occurs when B2B eliminates a distributor or a retailer. | Disintermediation

_______ refers to the buying and selling of goods and services; servicing of customers; collaborating with business partners; and conducting electronic transactions within an organization. | E-
business

__ are sites that evaluate and verify the trustworthiness of e-tailers | c. Trust verification sites

__ involves using various computer-based tools and techniques to | a. Knowledge creation

__ is a business strategy that enables manufacturers to control and share | c. Product lifecycle management

__ is a business strategy that enables manufacturers to control and share product-related data as part of product design and development efforts. | Product lifecycle management

__ is the assurance that data are accurate or that a message has not been altered. | Integrity

__ offer Internet Merchant Accounts, which are special accounts for credit card authorization and payment processing. | Acquiring banks

__ provides customers with exactly what they want, when and where they want it. Effective communication between the supply chain and the factory floor is needed to make it happen |
Demand-driven manufacturing

__ refers to the tendency of customers to stay at Web sites longer and | d. Stickiness

__ refers to the tendency of customers to stay at Web sites longer and come back more often. | Stickiness

__ are online markets owned and operated by a single company and may be either sell-side or buy-side. | Private e-marketplaces

__ are systems where only routine transaction processing and information flow take place between two or more organizations using a standard protocol, such as electronic data interchange (EDI).
| Interorganizational information systems

__ is the process of making the selected applications and projects a reality by hiring staff; purchasing equipment; licensing, purchasing, or writing software; and contracting vendors. | Project
management

__ means that the communication and collaboration are done in real time | *Synchronous
____ are customers who are willing to shop online because they dislike | d. Shopping avoiders

____ are customers who are willing to shop online because they dislike going to grocery stores. | Shopping avoiders

____ are financial institutions that provides a customer with a payment | b. Issuing banks

____ are financial institutions that provides a customer with a payment card. | Issuing banks

____ are gateways to storefronts and e-malls. | a. Shopping portals

____ are those who are young and comfortable with technology. | c. New technologists

____ means that the communication and collaboration are done in real | a. Synchronous

____ means that the communication and collaboration are done in real time. | Synchronous

____ provide connectivity among merchants, customers, and financial networks enabling authorization and payments is called the: | Payment processing services

_____ recognizes that __ are the core of a business and that a companys success depends on effectively managing its relationships with them. | Customer relationship management; customers

_______ are a major source of uncertainty in supply chains. | d. Demand forecasts

______is the transfer of documents and computer files while video | b. Data conferencing

__is an advertising strategy that uses word-of-mouth marketing in which | a. Viral marketing

A
A __ is a collaborative online encyclopedia jointly written by volunteers. | wiki

A __ is a company's method of doing business to generate revenue to sustain itself. | business model

A __ is a data file that is placed on a user's hard drive by a remote Web server, frequently without disclosure or the user's consent that collects information about the user's activities at a site. |
cookie

A __ is a group of people who have some kind of commercial or business relationship. | business network

A __ is a group of people with a common interest who interact on the Internet. | virtual (Internet) community

A __ is a social network whose primary objective is to facilitate business connections and activities. | business social network

A __ is an auction in which a seller entertains bids from buyers, and bidders increase the price sequentially. | forward auction

A __ is someone whose advice or view carries some weight in making a final purchasing decision. | influencer

A ____ application is one that the company depends upon for its well-being. | e. Mission critical

A ____ is an existing, often relatively inefficient application developed for an old platform. | e. Legacy application

A ____ is operated by a trusted third party that offers bandwidth and other value added services to facilitate interconnectivity among multiple organizations. | b. Value added network (VAN)

A _____ is suitable for mobile users who need to make very short-range deviceto-device wireless connections within a small space, such as a single room, and most | a. Personal area network

A _____ is suitable for mobile users who need to make very short-range device-to-device wireless connections within a small space, such as a single room, and most commonly with Bluetooth. |
personal area network

A ______ has capabilities that can be used to perform routine tasks that require intelligence such as providing customers with assistance based on their movements on a Web site | software agent
A ______ has capabilities that can be used to perform routine tasks that require intelligence such as providing customers with assistance based on their movements on a Web site. | software
agent

A ______ is a companys method of doing business to generate revenue to sustain itself. | business model

A _____ is a wealthy individual who contributes personal funds and possibly expertise at the earliest stage of business development. | angel

A B2B consortium has the potential to reduce prices of individual products, thus enabling and encouraging consortium members to buy more. | T

A botnet is: | a coordinated network of computers that can scan for and compromise other computers and launch DOS attacks.

A botnet is: | a huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.

A botnet is: | d. A coordinated network of computers that can scan for and compromise other computers

A brick-and-mortar organization performs its primary business offline, selling physical products by means of physical agents. | True

A broader definition of EC that includes not just the buying and selling of goods and services, but also servicing customers, collaborating with business partners, and conducting electronic
transactions within an organization best defines: | e-business

A business model is a description of how an organization intends to generate revenue through its business operations. | TRUE

A business model is a method of doing business by which a company can generate revenue to sustain itself. | True

A business model is an analysis of the organizations customers and, from that, a discussion of how that organization will achieve profitability and sustainability by delivering goods and services
to those customers. | T

A business model outlines how the organization or the EC project will generate revenue through sales, transaction fees, advertising fees, affiliate fees, or other revenue sources. | False

A business model outlines how the organization, or the EC project, will generate revenue through sales, transaction fees, advertising fees, affiliate fees, or other revenue sources | False

A business such as Apple Computers making online transactions with its trading partners is an example of: | B2B

A business using B2C business model trades with other businesses. | False

A card that draws the payment amount directly from the users checking account is called a(n): | debit card

A category of Internet applications that helps connect friends, business partners, or individuals with specific interests by providing free services such as photo presentation, e-mail, blogging, and
so on using a variety of tools best describes: | social networking.

A citizen surfing the Internet is a netizen. | True

A click-and-mortar retailer is a combination of both the brick-and-mortar retailer and an online transactional Web site. | TRUE

A column of data in a relation is also called : | an attribute

A commercial portal offers broad content targeted to a narrow audience. | False

A common inefficiency in procurement management is spending too much time on mros and not enough time on high value items. | True

A company allows peoples to watch a sports competition in real-time for a fee. So that companys revenue follows: | Subscription Model

A company submits its surplus to the exchange and receives points of credit, which the company can then use to buy items that it needs. | bartering exchange

A company that creates and manages many-to-many markets is called a: | market maker.

A company that manages application servers in a centrally controlled location rather than on a customer's site is called a(n) | application service provider (ASP)

A company that sells products directly to the end consumer is considered a B2C firm. | True
A company uses a third-party's Web site to help them find clients. When the sale is made, the third party helps broker and arrange shipment of the items. The third party is an online intermediary.
| True

A company-based acquisition site that uses e-procurement methods such as reverse auctions, negotiations, or group purchasing to overcome the manual searching of e-stores and e-malls, is
referred to as a(n) __ | buy-side e-marketplace.

A companys internal operations and its relationships with suppliers and other business partners are frequently: | as complex as customer-facing applications such as taking an order online.

A competitive advantage derived from ____ is generally considered the best approach for a company. | d.improved value chain and/or supply chain efficiency

A consortium trading exchange (CTE) or consortia is most appropriate for fragmented markets with large numbers of both buyers and sellers. | F

A consumer who purchases an item for a business can be described as an organizational buyer. | False

A cookie is a data file that is placed on a users hard drive by a remote Web server only when the users gives full consent to collect information about the users activities at a site. | F

A corporation uses the Internal Revenue Service's Web site to learn how to pay its estimated quarterly income taxes. This is an example of: | E2E

A criticism of Web 2.0 is the inability to create new business models. | FALSE

A CRM system hosted and maintained by an ASP is called? | On-demand CRM

A CVN: | Compares the verification number on a card to issuer records

A database management system is | a program

A decision by a judge that may be used as a standard in similar cases that follow is referred to as: | legal precedent

A domain name is | intangible property protected by law

A duty is | a legal claim that others not interfere with a protected interest

A file containing customer status and customer information that is used when processing transactions to identify known problem customers is a: | negative list.

A file is encrypted, and then decrypted using the same key. What type of encryption is described? | Private key

A firewall is configured to examine not only the header of incoming messages but also their contents. What type of firewall is described? | Stateful packet inspection

A firm that operates both physical stores and an online e-tail site is said to be a click-and-mortar business selling in a _____. | multichannel business model

A focal point for all corporate training and learning activities, including online ones best describes: | learning center.

A free Internet news service that broadcasts personalized news and information, including seminars, in categories selected by the user is known as | Webcasting.

A good example of dynamic pricing occurs in where prices vary and final prices are determined by the forces of supply and demand. | auctions

A government agency uses an online reverse auction to satisfy the tendering system requirements specified by law. This is an example of: | e-Procurement

A group of bidders artificially inflate the price of an item to scare off other bidders. They then back out at the last minute, leaving one of them with a relatively low bid. What type of fraud is
this? | Bid shielding

A hacker uses special software to access a server on your network. What type of attack is this? | Technical

A has capabilities that can be used to perform routine tasks that require intelligence such as providing customers with assistance based on their movements on a Web site. | software agent

A host-based intrusion detection system (IDS): | Resides on the server that is being monitored where it can detect whether critical or security-related files have been tampered with or
whether a user has attempted to access files that he or she is not authorized to use.

A is a companys method of doing business to generate revenue to sustain itself. | business model
A is a form of business alliance composed of several business partners that share the costs and resources for the development or production of a product or service. | virtual corporation

A is a private corporate network | intranet

A is suitable for mobile users who need to make very short-range device to-device wireless connections within a small space, such as a single room, and most commonly with Bluetooth. |
personal area network

A job opening in the Sales Department posted on the company's Intranet by the Human Resources Department is an example of: | B2E

A key feature of social media is that users control and use the media, often at little or no cost. | TRUE

A large e-tailer, such as Amazon.com, for example, uses all of these services and also employs auction services, payments services, logistics support, and more. This phenomenon is called |
hypermediation

A large number of EC companies, especially e-tailing and B2B ones, failed from 1999 to 2005 for each of the following reasons EXCEPT: | The companies failed to register with search
engines, such as Google.

A large organizations can develop an effective procurement system by creating an internal marketplace that combines the catalogs of all its approved suppliers into a single internal electronic
catalog, which is searched for product availability and delivery times. | T

A law that makes it a crime to send commercial e-mail messages with false or misleading message headers or misleading subject lines is: | CAN-SPAM.

A legally binding contract requires a few basic elements. Which of the following is not one of those elements? | agreement

A limitation of e-bartering for businesses is that excess capacity items such as office space, storage, factory space; idle facilities; and labor cannot be bartered. | F

A major block in the widespread implementation of collaborative commerce is: | the lack of universally accepted standards.

A major entertainment company has four studios that have been in the same location for more than ten years. The company includes a page on its Web site with addresses, phone numbers, and
general e-mail addresses for each of these studios. None of this information has changed since the Web site was developed. This is an example of __ content. | static

A major limitation of RFID currently is the restriction of the environments in which RFID tags are easily read. | T

A major objective of Web 2.0 is to enhance creativity, information sharing, and collaboration. | TRUE

A major problem in B2C is the increasing rate of online fraud. | TRUE

A major purpose of an organizational knowledge base is to support and allow . | knowledge sharing

A major requirement for any medium- to large-scale company that is moving to EC implies an integration between all the activities conducted on the Web and the ERP/MRP/SCM solutionsin
other words, creating an e-supply chain and managing it. | T

A major shortcoming with authentication services is: | two different authenticators may come up with different opinions regarding the authenticity and description of a given item.

A management tool that assesses organizational progress toward strategic goals by measuring performance in a number of different area is | balanced scorecard

A market maker bills a buyer for reviewing several seller contracts and making a recommendation on what to buy and from whom. The revenue model being used in this example is the: | fee for
service model.

A market maker charges a percentage on every buy and sell made in the exchange. The revenue model in place in this exchange is the: | transaction fee model.

A market maker evaluates an exchange between a buyer in the United States and a seller in Spain to ensure that import laws for the U.S. are followed. This is an example of the market maker: |
maintaining exchange infrastructure.

A market maker organizes an e-marketplace. | True

A market mechanism that uses a competitive process in which a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers best defines: | auction.

A marketer that uses e-mail to advertise to potential customers is called a: | viral marketer.
A marketplace in which sellers and buyers exchange goods and services for money (or other goods and services), but do so electronically defines __. | marketspace

A method of doing business by which a company can generate revenue to sustain itself is called: | Business model

A method of encryption that uses a pair of matched keys, including a public key to encrypt a message and a private key to decrypt it, describes: | public asymmetric key encryption.

A mode is purchasing where prices are negotiated or discounted is _____, which refers to nonfixed prices, such as those in auctions or stock markets. | dynamic pricing

A music company can file a __ against youtube and myspace for any interference with the ability to profit from its IP or for profiting from the recording industrys property without authorization
and compensation | lawsuit or civil charge

A network that uses the Internet to link ent intranets best defines: | extranet.

A new type of e-commerce refers to the localization of products and services through mobile device and context aware computing technologies is called _____ | L-Commerce

A niche e-tailer may be able to support an online effort that may not have enough customers in any particular local market. | True

A payment card that provides the holder with credit to make purchases up to a limit fixed by the card company and charges relatively high interest rates on unpaid balances is the: | credit card.

A piece of software that integrates departments and functions across a company to serve all of the company's needs is what type of system? | ERP

A plan for organizing the underlying infrastructure and applications of a site best describes: | EC architecture.

A podcast is distinguished from other digital audio formats by: | its ability to be downloaded automatically, using software capable of reading feed formats such as RSS

A portal is an information gateway that attempts to address information overload by enabling people to search and access relevant information from disparate IT systems and the Internet, using
advanced search and indexing techniques, such as Googles desktop. | T

A portal is an Internet gateway to a large variety of information and services. | True

A portal that acts as a gateway to other portals and Web sites operated by an organization is called a(n) | corporate intranet portal.

A primary key can be a: | composite

A private e-marketplace in which one company sells either standard and/or customized products to qualified companies defines __. | buy-side e-marketplace

A pure-play e-tailer dedicates the majority of their capital to online sales, with offline sales lagging behind. | False

A retail company that sell directly to consumers over the Internet without maintaining a physical sales channel. That is a example of __ | Pure-play e-tailers

A retailer is a sales intermediary, a seller that operates between manufacturers and customers. | T

A revenue model describes how a company will generate profits. | True

A row of data in a relation is also called: | a tuple

A scheme for securing e-payments using public key encryption and various technical components best describes: | public key infrastructure.

A searchable database of computer hardware that meets a strict set of environmental criteria best describes: | Electronic Product Environmental Assessment Tool.

A seller has his friend bid on his auction to help drive up the price. What type of fraud is this? | Shilling

A sell-side marketplace deals with one seller and many potential buyers. | True

A single company that deploy an E-Commerce system by build up a website where their services are sold. What kind of EC system they have? | storefront

A smart card containing a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip is a: | contact card.
A software agent that surveys user's reading interests, then uses machine learning to find new Web pages and news articles using neural-network-based collaborative filtering technology is
called: | a learning agent.

A special network model that enables transindustry collaboration is the which connects all Internet business services. | business-to-exchange (or B2X)

A special type of intermediary in e-commerce is the B2B _____ which connect manufacturers with business buyers, such as retailers or resellers in the computer industry. | e-distributor

A specific outcome of the strategy initiation phase is a clear statement of the companys ____, which summarizes the customer segment, competitor target, and the core differentiation of ones
product from the offerings of competitors. | value proposition

A specific outcome of the strategy initiation phase is the ____, which includes the vision, mission, value proposition, goals, capabilities, constraints, strengths, and weaknesses of the company. |
company analysis

A suite of network protocols designed to enable different kinds of wireless devices is called: | Wireless Application Protocol.

A summary of a message, converted into a string of digits after the hash has been applied, best describes: | message digest.

A supply chain can be broken into three major parts. The part of the supply chain includes the activities of a company with its suppliers and their connections with their suppliers. | upstream

A supply chain can be broken into three major parts. The part of the supply chain includes all of the in-house processes used in transforming the inputs received from the suppliers into the
organizations outputs. | internal

A supply chain can be broken into three major parts. The part of the supply chain includes all the activities involved in delivering the products to the final customers. | downstream

A supply chain can be broken into three major parts: upstream, internal, and downstream. | T

A supply chain involves activities that take place during the entire product life cycle, from dirt to dust. | T

A supply chain involves activities that take place during the entire from dirt to dust. | product life cycle

A supply chain is the flow of materials. | False

A system that locates, extracts, and provides specific answers to user questions expressed in natural language best describes: | automated question-answer.

A technique known as web page hijacking | enables a malicious Web master to displace the pages of an EC Web site in the Search Engine Results Pages (SERPS) to redirect customers to
another site.

A technology that is used to electronically transfer routine documents, such as invoices and purchase orders, and for financial transactions is _____. | electronic data interchange

A third party that operates an exchange and in many cases, also owns the exchange is known as a(n): | market maker

A traditional brick-and-mortar store with a mature Web site uses a click-and-mortar strategy to do all of the following EXCEPT: | reduce refunds and exchanges.

A transaction completed electronically between two businesses over the Internet, extranets, intranets or private networks is a B2B transaction. | True

A type of broker that helps consumers compare different stores is a: | shopping facilitator.

A type of e-book referred to as the ______ is a truly multimedia, online-only book that has hyperlinks, three-dimensional text and display, graphics, audio, and video. It supports nonlinear
exploration of topics. | rubics-cube hyperlink book

A type of mobile social networking where the company does not have a relationship with a wireless carrier is: | off-deck.

A type of online mall that is basically a directory organized by product type best describes | referring directory.

A typical EC fulfillment process involves all of the following activities EXCEPT: | b. Just-in-time inventory management.

A user profile defines customer preferences, behaviors, and demographics and can be generated by observing what the user does online. | TRUE

A VMI system helps a firm manage its internal inventory. | False


A VPN relies on a special protocol understood only by the VPN software to transmit packets, a technique called ____. | a. Encryption

A vulnerability | is a weakness in software or other mechanisms that a hacker can use directly to gain access to a system or network.

A Web site asks users to fill out a questionnaire about themselves. The Web site then personalizes to the user and makes recommendations. What type of personalization is being used? | Rule-
based filtering

A Web site offering content created by a third party transparently to customers is an example of: | Syndication.

A Web-based seller of cds carefully monitors the prices charged by its competitors for identical products. This company has the ability to change a given price within three minutes in response to
changes by competitors. This is an example of EC: | agility.

A(n) __ is a type of pop-up ad that appears after a user clicks a link and remains | c. Interstitial

A(n) __ is an HTML coding statement that describes the content of a Web page | c. Meta-tag

A(n) __ is defined as a group of people that have some kind of commercial or business relationship such as the relationships between sellers and buyers, buyers among themselves, buyers and
suppliers, and colleagues and other colleagues. | business network

A(n) ___ is a document retrieval system designed to help find information stored on a computer system, such as on the Web, inside corporate or proprietary files, or in a personal computer |
search engine

A(n) ____ is a private corporate network that uses standard Internet protocols and interfaces. | e. Intranet

A(n) ____ is a pseudo private data network that uses public bandwidth in combination with a tunneling protocol and security procedures. | c.virtual private network (VPN)

A(n) ______ is an HTML coding statement that describes the content of a Web page and is used by search engines to index the sites content so that it can be found. | meta-tag

A(n) ______ is an order-processing technology that allows customers to accumulate items they wish to buy while they continue to shop. | Electronic shopping cart

A(n) _______ is a single point of access through a Web browser to help users find relevant and accurate business information and reduce information overload. | information portal

A(n) _______ is an online third party that brokers B2B transactions between a buyer and seller. | intermediary

A(n) _______ takes place between sellers and buyers in one industry or for one | b. Vertical auction

A(n) _______ takes place between sellers and buyers in one industry or for one commodity, such as flowers, cars, or cattle | vertical auction

A(n) __ is a company, university, or nonprofit organization that supports promising businesses in their initial stages of development | incubator

A(n) __ is a type of pop-up ad that appears after a user clicks a link and remains while content is loading to capture the users attention for a short time, either as a promotion or a lead-in to the
sites homepage or to advertise a product or a service. | interstitial

A(n) __ is defined as a group of people that have some kind of commercial or business relationship such as the relationships between sellers and buyers, buyers among themselves, buyers and
suppliers, and colleagues and other colleagues. | business network

A(n) ____ is an exact duplicate of the original Web site physically located on a Web server on another continent | mirror site

A(n) _____ is a computer system capable of integrating, storing, editing, | a. Geographical information system

A(n) _____ is a computer system capable of integrating, storing, editing, analyzing, sharing, and displaying spatial information. | geographical information system

A(n) _____ is a wealthy individual who contributes personal funds and possibly expertise at the earliest stage of business development | angel

A(n) ______ Web site does little more than provide information about the business and its products | informational

A(n) is a computer system capable of integrating, storing, editing, analyzing, sharing, and displaying spatial information. | geographical information system

A(n) is a single point of access through a Web browser to help users find relevant and accurate business information and reduce information overload. | information portal
A(n) is a type of pop-up ad that appears after a user clicks a link and remains while content is loading to capture the user's attention for a short time, either as a promotion or a lead-in to the site's
homepage or to advertise a product or a service. | interstitial

A(n) is an HTML coding statement that describes the content of a Web page and is used by search engines to index the site's content so that it can be found. | meta-tag

A(n) is an online third party that brokers B2B transactions between a buyer and seller. | intermediary

A(n) takes place between sellers and buyers in one industry or for one commodity, such as flowers, cars, or cattle. | vertical auction

A... Application is one that the company | mission critical

A__ is a company, university, or nonprofit organization that supports promising businesses in their initial stages of development. | incubator

A__ is a form of business alliance composed of several business partners that share the costs and resources for the development or production of a product or service. | virtual corporation

A______ Web site does little more than provide information about the business and its products. | informational

Acceptable use policy (AUP) | Policy that informs users of their responsibilities when using company networks, wireless devices, customer data, and so forth.

Acceptance testing | Determining whether a Web site meets the original business objectives and vision.

Access control | Mechanism that determines who can legitimately use a network resource.

Access control involves authorization and authentication. | True

Access to a network ought to be based on: | the policy of least privilege where access to network resources are blocked and permitted only when needed to conduct business.

According to a survey by Credit Research Foundation, the major reasons companies turn to EIPP solutions are all of the following EXCEPT: | elimination of billing disputes

According to an Australian Government 2.0 task force report, by embracing Government 2.0 governments can: | do all of the above.

According to an informationweek survey of business technology experts, wikis are the most useful Web 2.0 tools in Enterprise 2.0. | FALSE

According to data from emarketer, approximately __ shop online and/or research offline-sales online. | three in four Internet users age 14 and over

According to Inmon, B2C clickstream data can reveal information each of the following EXCEPT: | What goods the customer wanted to but could not find.

According to Internet statistics, 67 percent of consumers abandoned their shopping carts because of the lack of satisfactory product information. | T

According to O'Reilly (2005), Web 2.0 Level 1 applications operate offline but gain features from going online. | True

According to Peter Drucker, e-commerce is profoundly changing markets, industry structures, products and services, consumer segmentation, consumer values and consumer behavior; jobs, and
labor markets. | True

According to research, customer satisfaction with an Internet store: | drops dramatically when certain Web site features fail to perform properly, such as the contents reliability, loading
speed, or usefulness.

According to the __ revenue model, customers pay a fixed amount, usually monthly, to receive some type of service. | subscription fees

According to the _______ model, an organization can increase brand awareness or even generate sales by Web-based word-of-mouth marketing or promoting a product or service to other people.
| viral marketing

According to the ______ revenue model, companies receive commissions for referring customers to others EC Web sites. | affiliate fees

According to the ______ revenue model, customers page a fixed amount, usually monthly, to receive some type of service. | subscription fees

According to the Business Environment Impact Model, _____ provide support to organizations activities and to actual performance, countering business pressures. | EC and IT

According to the CSI Computer Crime and Security Survey, firewalls were the most commonly used defense technologies in 2008. | FALSE
According to the CSI Computer Crime Security Survey, the most frequently occurring computer attacks were from viruses in 2008. | TRUE

According to the EC consumer behavior model, personal characteristics and environmental characteristics are classified as: | independent variables

According to the model, an organization can increase brand awareness or even generate sales by Web-based word-of-mouth marketing or promoting a product or service to other people. | viral
marketing

Ad management | Methodology and software that enable organizations to perform a variety of activities involved in Web advertising (e.g., tracking viewers, rotating ads).

Ad views | The number of times users call up a page that has a banner on it during a specific period; known as impressions or page views.

Address Verification System (AVS) | Detects fraud by comparing the address entered on a Web page with the address information on file with the cardholders issuing bank.

Addressing mission-critical, high-volume transaction processes is the goal of: | production workflow applications.

Advantages of the electronic job market for employers include each of the following except | learning how to use their voice effectively in an interview.

Advertisement model | 1400712649430

Advertising in chat rooms, blogs, or social networks can achieve each of the following EXCEPT: | they can be used as one-to-one connections between a company and its customers

Affiliate marketing | A marketing arrangement by which an organization refers consumers to the selling companys Web site.

Affiliate marketing refers to using banner advertisements to bring customers to your site. | False

Affiliate model | 1400712654817

Affiliate programs can only be used in B2C models. | False

After an EC project has been implemented, the testing of the quality of user's experience when interacting with the site is called: | usability testing.

After an EC project has been implemented, the testing that is done to assure various modules in the project work together is called: | integration testing

After four years in business, a magazine publisher decides to add the online distribution of its magazine to its existing traditional publishing business. The company would need to develop a: |
business case.

Agentrics is the worlds largest B2C exchange for retailers, such as Sears and Best Buy, whose objective is to simplify and automate supply chain processes. | F

Agents can be used in B2B marketplaces to collect product data. | True

Alibaba China is Chinas largest online marketplace for both domestic and international trade among businesspeople and a trusted community of members who regularly meet, chat, search for
products, and do business online. | F

All are benefits of B2B except: | B2B increases channel conflict.

All click-and-mortar retailers started life as a traditional storefront with a physical retail presence only and over time adopted an online transactional capability as well (brick only to brick-and-
click). | F

All of the following about RFID are true EXCEPT: | an RFID tag can hold 20 times the amount of information a bar code can hold, and the tag can be read through cardboard, wood, and plastic
at a range of up to 100 feet

All of the following about the strategic planning process are true EXCEPT: | d. The strategic planning process begins with strategy formulation.

All of the following about wireless wide area networks (WWAN) are true EXCEPT: | The single WWAN network standard insures compatibility of handsets within and between countries.

All of the following apply to EC in developing economies EXCEPT: | Developing economies struggle with various issues that create too many business and technology risks to justify
investment in those economies at this time.

All of the following apply to instant video EXCEPT: | The highest quality approach is to add video cameras to the participants computers
All of the following apply to social network theory EXCEPT | Between a set of nodes, there is one kind on tie.

All of the following are advantages of building Web sites internally EXCEPT | it provides the fastest speed to market

All of the following are advantages of e-learning EXCEPT: | college professors are anxious to develop new online courses.

All of the following are advantages of e-learning EXCEPT:: All of the following are advantages of e-learning

All of the following are advantages of using purchase cards EXCEPT: | they are widely accepted in international trade.

All of the following are barriers to location-based m-commerce EXCEPT: | There are presently not enough location-based systems to make this a viable technology.

All of the following are benefits of e-auctions to buyers except: | can liquidate large quantities quickly.

All of the following are benefits of letters of credit (lcs) EXCEPT: | lcs are cheap and easy to establish.

All of the following are correct about market research methods EXCEPT: | Direct mail marketing methods are usually cost-effective.

All of the following are critical success factors (csfs) of the Old Economy EXCEPT: | Create new partnerships, stay with core competency.

All of the following are elements of a companys strategy EXCEPT: | c. Day-to-day operations.

All of the following are examples of e-government EXCEPT: | a company sells army and navy surplus supplies at auction over the Internet.

All of the following are examples of interactive entertainment EXCEPT: | purchasing theatre tickets online.

All of the following are important security functions of proxy servers except: | d. They improve network performance.

All of the following are potential benefits from auctions to sellers EXCEPT: | c. Sellers are always anonymous.

All of the following are potential drawbacks of e-learning EXCEPT: | b. Knowledge retention is lower than in traditional classrooms.

All of the following are potential sources of revenue for an exchange EXCEPT: | shipping and handling fees.

All of the following are potential sources of revenue for online independent travel agents EXCEPT: | direct marketing revenues.

All of the following are problems in implementing e-Government EXCEPT: | the technology needed to implement stage 6 of the Deloitte transformation process does not exist yet

All of the following are situations when a business plan should be done EXCEPT: | a. When an existing business is deploying a CRM system.

All of the following are true about product lifecycle management (PLM) EXCEPT: | The demand for PLM in limited because it does not apply to products that have short life cycles or are
complex.

All of the following are true about youtube EXCEPT: | Yahoo! Purchased youtube for US$1.65 billion in stock in 2006

All of the following are types of communication and collaboration done in real time EXCEPT: | blogging

All of the following are ways to use the Internet to find information about an individual EXCEPT: | Stealing the individuals computer.

All of the following categories have already been selling well online EXCEPT: | new cars

All of the following describe system scalability EXCEPT | Scalability dimensions are independent because scaling up the size of the system in one dimension does not affect the other
dimensions.

All of the following determine the degree of collaboration between off-line and online activities in a business EXCEPT: | the pricing strategy

All of the following statements apply to hate Web sites EXCEPT: | The intent of most hate Web sites is to commit fraud
All of the following would be considered c-commerce EXCEPT: | aggregating catalogs on a central server.

All the activities that are related to order aggregation and fulfillment, inventory management, purchasing from suppliers, accounting and finance, insurance, payment processing, packaging, and
delivery are done in what is termed the_______ of the business. | back end

Also known as private industrial networks are Web-based networks owned by one large seller or buyer for inter-organizational communications. | company-centered networks

Although a companys success is clearly dependent on finding and retaining customers, its success may be far more dependent on what is behind the Web page than on what is on the Web page. |
T

Although both marketplaces and marketspaces can sell physical products, the marketspace also can sell digital products, which are goods that can be transformed to digital format and delivered
instantly over the Internet. | T

Although there are practical advantages to being an e-tailer, such as lower overhead costs, it has many drawbacks and barriers so the winners in many market segments will be companies that use
the click-and-mortar approach. | T

Although used occasionally in B2C commerce, customized catalogs are especially useful in B2B e-commerce for each of the following reasons EXCEPT: | Intranets, in particular, can deliver
customized catalogs to different business customers.

Amazon e-commerce system is an example of _______ | Pure-play e-tailers

Amazon.com experienced all of the following EXCEPT: | The companys financial success has been assured.

Amazon.com experienced each of the following except | establishing a grocery delivery service called amazonconnect.

Among the forms of online B2B payments, _______ is second only to ACH in terms of frequency of use. | Fedwire, or wire transfe

An ______ is a virtual marketplace in which sellers and buyers meet and conduct different types of transactions. | e-store

An ACS System: | Verifies addresses against purchasers

An ad that appears underneath the current browser window, so when the user closes the active window the ad is still on the screen describes | pop-under ad.

An advantage of e-checks is that they: | fit current business practices, and so require little process reengineering.

An advantage of the electronic job market for job seekers is that they can assess their market value. | TRUE

An agreement that requires computer users to take specific steps to allow the collection of personal information is called: | opt-in.

An analytical tool in which a company looks for points of differentiation between competitors and itself is called: | competitor analysis grid

An attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources best describes: | denial-of-
service attack.

An attack using a previously unknown vulnerability compromises a system. What type of attack is described? | Zero-day incident

An auction in which there is one buyer and many potential sellers; or in which a buyer places an item for bid on an RFQ system and the lowest bid wins is referred to as all of the following
EXCEPT: | Reverse auctions.

An auction in which there is one buyer and many potential sellers; or in which a buyer | b. Forward auctions.

An auction is a competitive process and market mechanism that uses a competitive process by which a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers. | T

An auction is a market mechanism that uses a competitive process by which a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers. | True

An auction is characterized by the competitive nature by which the final price is reached. | True

An EC model in which all of the participants are either businesses or other organizations is | business-to-business (B2B) e-commerce.
An EC security strategy requires multiple layers of defense against risks from malware, fraudsters, customers, and employees. | TRUE

An electronic card that contains information that can be used for payment purposes best describes: | payment card

An electronic shopping cart is an order-processing technology that allows customers to accumulate items they wish to buy while they continue to shop. | TRUE

An electronic storefront includes several mechanisms that are necessary for conducting the sale. The most common mechanisms include each of the following EXCEPT: | a supply chain

An e-marketplace does not have to be centered around a physical location. | True

An e-tailer can use cookie files and other technologies to track the specific browsing and buying behavior of each consumer. With that information, the e-tailer can create a marketing plan
tailored to that consumers pattern by showing items of interest or offering incentives that appeal to that consumers sense of value, which is referred to as | personalization.

An e-tailer uses cookies to identify returning customers and to provide suggested products for purchase based on prior shopping behavior. This is an example of ___ | personalization

An example of a successful aggregation of suppliers' catalogs is that of __, which aggregates more than 10,000 items from the catalogs of approved suppliers into an internal electronic catalog. |
mastercard International

An example of business-to-consumer (B2C) is when Dell provides customer service online by collaborating electronically with its partners. | False

An example of G2C is a: | driver paying for the renewal of his auto tag online.

An exchange charges an annual fee of $25,000 for all parties who want to trade in the exchange. The revenue model in use by this exchange is the: | membership fee model.

An exchange that handles materials used by companies in different industries is referred to as a(n): | horizontal exchange

An exchange whose members are in one industry or industry segment and that trades only in materials/services unique for that industry is referred to as a(n): | vertical exchange

An extranet is a network that uses private corporate networks to link together multiple intranets. | False

An extranet is a network that uses the Internet to link together multiple intranets. | True

An extranet uses private data lines to connect several intranets. | False

An important category of intangible benefits is ______ factors that include comfort to employees, impact on the physical environment, changes to the power distribution in an organization, and
preventing invasion of the privacy of employees and customers. | social subsystem

An intermediary is a third party that operates between sellers and buyers. | TRUE

An internal corporate network that uses Internet tools, such as Web browsers, is known as an intranet. | True

An Internet acceptable use policy (AUP) is an important safeguard because | without a formal AUP, it is much more difficult to enforce acceptable behaviors and eliminate unacceptable
behaviors, and punish violators

An intranet is a private network that uses Internet protocols. | True

An intranet is an internal network for companies that uses Internet standards. | True

An item is offered with a minimum bid. The winner pays the exact price of his bid. What type of auction is being described? | Forward auction

An objective of conducting market research is to understand the relationships between dependent and intervening variables so that vendors can make informed decisions on the intervening
variables. | T

An online community that harnesses the power of one's social networks for the introduction, buying, and selling of products, services, and resources, including one's own creations describes: |
social marketplace.

An online intermediary that offers businesses access to hundreds of parts and services provided by multiple suppliers is called | e-procurement

An online seller of travel services that generates revenue by charging fees for its services is an example of a(n): | transaction broker.
An online university from which students take classes from home or other offsite locations, usually via the Internet best describes: | virtual university.

An order-processing technology that allows customers to accumulate items they wish to buy while they continue to shop best defines. | electronic shopping cart.

Angel investor | A wealthy individual who contributes personal funds and possibly expertise at the earliest stage of business development.

Animation characters that can talk are known as | chatterbots.

Anna's company sells a variety of products to her business clients. What type of model is she using? | Sell-side marketplace

Apple and Google undertook a formal merger to offer iphone capabilities, such as delivering Google services through Apple hardware. | FALSE

Application controls | Controls that are intended to protect specific applications.

Applying business analytics techniques and business intelligence such as data mining and online analytic processing to CRM applications describes what? | Analytic CRM

Approximately what percent of Internet shoppers use search engines to find products and services? | 75%

Are becoming a necessity in many industries due to the information glut. | Specialized search engines

Are computer-based whiteboards that work like real-world whiteboards with markers and erasers, except all participants can join in. | Interactive whiteboards

Are customers who are willing to shop online because they dislike going to grocery stores. | Shopping avoiders

Are extremely busy customers willing to shop online in order to free up time. | Time-starved customers

Are financial institutions that provides a customer with a payment card. | Issuing banks

Are firms that conduct retail business online. | E-tailers

Are formal agreements regarding the division of work between a company and its vendors. | Service level agreements

Are gateways to storefronts and e-malls that may be comprehensive or niche oriented. | Shopping portals

Are information portals for businesses | B2B portals

Are many-to-many e-marketplaces in which many buyers and many sellers meet electronically to trade with each other. | Exchanges

Are markets in which companies can trade or exchange placement of banner ads on each others Web sites. | Banner exchanges

Are markets in which the individual sell-side or buy-side company has complete control over participation in the selling or buying transaction. | Private e-marketplaces

Are markets that concentrate on a service, product, or materials that are used in various types of industries such as office supplies or pcs. | Horizontal marketplaces

Are markets that deal with one industry or industry segment such as steel or chemicals. | Vertical marketplaces

Are meta-search engines that search a range of related sites or search engines, seeking the best product or service for a particular consume. | Travel bots

Are online markets owned and operated by a single company. | Private e-marketplaces

Are online meetings whose members are in different locations, even in different countries. | Virtual meetings

Are organizations that conduct their business activities solely online. | Virtual (pure-play) organizations

Are portals that offer fairly routine content for broad audiences and are the most popular portals on the Internet; e.g., yahoo.com, aol.com, and msn.com. | Commercial (public) portals

Are private, third-party-managed common carriers that provide communications services and security and which are used to implement traditional EDI systems. | Value-added networks (or
vans)
Are retailers who conduct business in the physical world, in traditional stores. | Brick-and-mortar retailers

Are sites that evaluate and verify the trustworthiness of e-tailers | Trust verification sites

Are third-party vendors that conduct promotions, especially large-scale ones. | Admediaries

Are those that conduct some EC activities, usually as an additional marketing channel. | Click-and-mortar (or click-and-brick) organizations

Are those who are young and comfortable with technology. | New technologists

Are tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server. | Web bugs

Are tools that combine data from two or more Web sites to create new applications | Mashups

Are trading venues open to all interested parties (many sellers and many buyers) that use a common technology platform and that are usually run by third parties or industry consortia. | Public e-
marketplaces (or public exchanges or exchanges)

Are virtual communities organized by an interest, such as political parties, or by product, company, or health topic | Affinity portals

Arrange the following items in the correct order of Knowledge Management (start at the top, end at the bottom) | ,Create and capture,Refine,Store,Manage,Disseminate,Assess and evaluate

Arrange the following items in the correct order of the EC order fulfillment process (beginning step at top, and ending step at the bottom) | ,Making sure the customer will pay,Checking for
in-stock availability,Arranging shipments,Replenishment,Contacts with customers

As a company moves to incorporate an online presence with its traditional brick-and-mortar operation, it adds the costs related to training for all personnel in the capabilities of the EC system and
a new advertising campaign to announce its new site to the costs directly associated with building the new Web presence. In this case, training and advertising are examples of: | complementary
investments.

As in e-commerce, m-commerce B2C applications are concentrated in each of the following areas EXCEPT: | c. Telecommunications

As the volume of customers, products, vendors, and information increases, it becomes uneconomical, or even impossible, for customers to consider all relevant information and available
products and services. The practical solution to handling such information overload is to | use software or intelligent agents.

As with any IT project, management needs to be able to justify the development and use of a corporate portal by comparing its cost with its benefits. The challenge is that despite the tangible
benefits from investment in portal technology, such as include increased revenues and customer loyalty, most of the benefits of portals are intangible. | T

Association ABC helps its members get discounts on the purchases by buying in bulk. What type of business model are they using? | Group purchasing

Assurance that stored data has not been modified without authorization and a message that was sent is the same message that was received is referred to as: | integrity.

At hospitals and supermarkets, inventory reorder points have been automated so that when inventory gets down to a certain point the system will automatically notify a human of the exact
amount to reorder. | F

At the center of every exchange is a the third party that operates the exchange and, in many cases, may also own it. | market maker

Attracting and retaining loyal customers is the most important issue for e-tailers because customer loyalty can lower marketing and advertising costs, transaction costs, customer turnover
expenses, and failure costs such as warranty claims. | TRUE

Attracting large business sellers to public exchanges is often difficult for all of the following reasons EXCEPT: | advertising costs in public exchanges are very expensive

Attractors | Web site features that attract and interact with visitors in the target stakeholder group.

Auction | A competitive process in which a seller solicits consecutive bids from buyers (forward auctions) or a buyer solicits bids from sellers (backward auctions). Prices are
determined dynamically by the bids.

Auction sites like ebay have increased opportunities for ____ marketing. | C2C

Auctions are all of the following EXCEPT: | a. They are suitable for most consumer goods.
Auctions are based on dynamic pricing. | TRUE

Auctions done in exchanges or double auctions are ______ auctions. | d. Many buyers, many sellers

Audit | An important part of any control system. Auditing can be viewed as an additional layer of controls or safeguards. It is considered as a deterrent to criminal actions especially
for insiders.

Authentication | Process to verify (assure) the real identity of an individual, computer, computer program, or EC Web site.

Authentication provides the means to reconstruct what specific actions have occurred and may help EC security investigators identify the person or program that performed unauthorized actions.
| True

Authorization | Determines whether a buyers card is active and the customer has sufficient funds.

Automated Clearing House (ACH) Network | A nationwide batch-oriented electronic funds transfer system that provides for the interbank clearing of electronic payments for
participating financial institutions.

Automated warehouses for B2C companies are designed: | to facilitate the delivery of small quantities of product to a very large number of customers.

Autoresponders | Automated e-mail reply systems (text files returned via e-mail) that provide answers to commonly asked questions.

Availability | Assurance that access to data, the Web site, or other EC data service is timely, available, reliable, and restricted to authorized users.

Avatars | Animated computer characters that exhibit humanlike movements and behaviors.

B
B2B can increase the efficiency and effectiveness of supply chains or dramatically change the supply chain by eliminating one or more intermediaries. | F

B2B consortia may face antitrust challenges. Which of the following would probably not signal suspicion in a B2B consortium exchange? | Rapidly falling prices for end users

B2B EC can increase the efficiency and effectiveness of supply chains or dramatically change the supply chain by eliminating one or more intermediaries. | True

B2B EC transactions that involve one seller selling to many buyers is called an exchange. | F

B2B only includes electronic transactions between businesses conducted over the public Internet. | False

B2B payments are part of a much larger financial supply chain that includes all of the following EXCEPT: | financial reporting.

B2B portals | Information portals for businesses.

B2B systems which are used for communication, design, planning, information sharing, and information discovery are called: | collaborative commerce.

B2B transactions that involve communication, design, planning, information sharing, and activities beyond financial transactions among business partners is referred to as ______ | collaborative
commerce

B2bbusiness.com offers classified ads, a fixed price catalog, auctions and community services. What type of B2B many-to-many model are they using? | B2B portal

B2C and B2B orders have similar order-fulfillment processes and pricing models. | False

Back end | The activities that support online order fulfillment, inventory management, purchasing from suppliers, payment processing, packaging, and delivery.

Balanced scorecard | A management tool that assesses organizational progress toward strategic goals by measuring performance in a number of different areas.

Banking Trojan | A Trojan that comes to life when computer owners visit one of a number of online banking or e-commerce sites.

Banks are more selective about who gets an account for accepting credit cards online because | CNP transactions are less secure and riskier

Banner | On a Web page, a graphic advertising display linked to the advertisers Web page.
Banner ads that appear when a predetermined word is queried from a search engine are | keyword banners.

Banner advertising on Web sites helps trigger a realization that there is a gap between reality and a desired state, which occurs in the ____ stage of the EC purchase decision-making process. See
figure | need identification

Bargaining power of suppliers is not one of Porter's five forces. | False

Barriers inhibiting B2B electronic payment include all of the following EXCEPT: | strict standard formats for remittance information.

Bartering | The exchange of goods and services.

Bartering exchange | An intermediary that links parties in a barter; a company submits its surplus to the exchange and receives points of credit, which can be used to buy the items that
the company needs from other exchange participants.

Basic marketing model is based on 4P factor. There are Product, Price, Promotion, and ____ | Place

Basic options for developing an EC Web site include each of the following except: | clone a competitor's Web site.

Because conducting reverse auctions in B2B can be a fairly complex process, a(n) __ may be essential. | third-party intermediary

Because exchanges are providing a service, they do not require a revenue model. | False

Because of the complexity in building large e-marketplaces and exchanges, it is usually performed by a major B2B software company, such as Ariba or IBM, and a management consulting
company, such as pricewaterhousecoopers, usually participates. | T

Because of their large number of buyers and sellers, B2B exchanges and other e-marketplaces do not face anti-trust or other competition laws. | F

Because of their visibility and large sales volumes, larger firms are more susceptible to fraud than medium-sized firms. | False

Because of these interrelationships, the business model of the Internet economy has been called the | Internet ecosystem

Because online buyers decisions depend on numerous independent and intervening variables, decisions made by customers are classified as: | dependent variables

Because the rate of change and the level of uncertainty are expected to accelerate, organizations are | operating under increasing pressures to produce more products, faster, and with fewer
resources.

C
Can be supported more effectively and efficiently through direct buyerseller offline or online negotiations, which can be done in private exchanges or private trading rooms in public exchanges. |
Strategic purchases

Candidate Key | an attribute that uniquely determine the values of all the other attributes for a row in a relation

Capabilities of the Internet that have made it more difficult for companies to capture profits include all of the following EXCEPT: | The Internet makes it easier to make secure payments.

Captcha tool | Completely Automated Public Turing test to tell Computers and Humans Apart, which uses a verification test on comment pages to stop scripts from posting
automatically.

Card verification number (CVN) | Detects fraud by comparing the verification number printed on the signature strip on the back of the card with the information on file with the
cardholders issuing bank.

Caterpillar Inc. Created CAT U to meet its training and learning needs. | True

Cellular radio technology divides areas geographically to support services. | True

Certificate authorities (cas) | Third parties that issue digital certificates.

Challenges that Boeing faced with its global collaboration for the design and assembly process of its new Dreamliner passenger plane included each of the following EXCEPT: | Lag time
Channel conflict | Situation in which an online marketing channel upsets the traditional channels due to real or perceived damage from competition.

Channel conflict occurs when adding an online distribution channel causes problems with existing distribution channels. | T

Chaplin reports quarterly sales revenue from his business to city hall over the Internet. He pays his local business tax with a credit card. This is an example of: | G2B e-commerce

Chaplin's Pet Store has been in business for many years. Chaplin, the present owner, decides to open an online sales channel where he can advertise and sell the same gourmet pet food. This is an
example of adding: | a Webstore.

Characteristics of B2B payments include all of the following EXCEPT: | c. They require less rigor and security than B2C payments.

Characteristics of mobile devices that create special requirements that hardware and software designers need to anticipate when designing mobile computing systems include all of the following
EXCEPT: | broad bandwidth

Characteristics of the next generation Internet, Web 3.0, are expected to be all of the following EXCEPT | Decreased use of the Semantic Web

Charles wants to buy a John Lennon lithograph over the Internet, but he is unwilling to pay for it until he inspects it to ascertain authenticity. The auction site through which he purchases the
painting agrees to hold his money until he tells them to release it to the seller. This is an example of: | an escrow service.

Chatterbots | Animation characters that can talk (chat).

Chemconnect is an example of a successful e-exchange with: | many buyers and many sellers.

Childrens Internet Protection Act (CIPA) | U.S. law that mandates the use of filtering technologies in schools and libraries that receive certain types of federal funding.

Chips are tiny tags can be implanted into humans or attached to products for tracking and identification purposes. | Radio frequency identification (RFID)

Choose the best type from the following option: Uber, or grabtaxi are example of _______ | L-Commerce

Choose the right term corresponding with the following statement: "It is a method of e-commerce where shoppers friends become involved in the shopping experience; social shopping attempts
to use technology to mimic the social interactions found in physical malls and stores" | Social shopping

Choose the right term with the following description: The use of digital technologies that enable companies to collaboratively plan, design, develop, manage, and research products, services, and
innovative EC applications | collaborative commerce (c-commerce)

Choose the right type of E-Commerce based on the following statement: "The e-commerce activities conducted in social networks and/or by using social software (i.e., Web 2.0 tools)" | s-
commerce

Choose the right types and activities in knowledge management (KM) Hint: choose multiple answers (6) |Create, Capture, Refine, Store, Manage, Disseminate

Choppy connectivity is one of four trends that may slow EC and Web 3.0 and even cripple the Internet. | TRUE

CIA security triad (CIA triad) | Three security concepts important to information on the Internet: confidentiality, integrity, and availability.

Cios need to effectively communicate the value of proposed EC projects in order to gain approval for all of the following reasons EXCEPT: | Demand for expanding or initiating e-business
projects is no longer strong so there are fewer requests for funding.

Ciphertext | A plaintext message after it has been encrypted into a machine-readable form.

Civil litigation | An adversarial proceeding in which a party (the plaintiff ) sues another party (the defendant) to get compensation for a wrong committed by the defendant.

Click (click-through or ad click) | A count made each time a visitor clicks on an advertising banner to access the advertisers Web site.

Click-and-mortar (click-and-brick) organizations | Organizations that conduct some e-commerce activities, usually as an additional marketing channel.

Click-and-mortar retailers | Brick-and-mortar retailers that offer a transactional Web site from which to conduct business.

Clickstream behavior | Customer movements on the Internet.


Clickstream data | Data that occur inside the Web environment; they provide a trail of the users activities (the users clickstream behavior) in the Web site.

Clickstream data provide a trail of a users activities in a Web site including a record of the users browsing patterns of every page of every Web site the user visits, how long the user remained on
a page, and even the e-mail addresses of mail that the user sends and receives. | T

Click-through rate | The percentage of visitors who are exposed to a banner ad and click on it.

Click-through ratio | The ratio between the number of clicks on a banner ad and the number of times it is seen by viewers; measures the success of a banner in attracting visitors to click
on the ad.

Collaboration hub | The central point of control for an emarket. A single c-hub, representing one e-market owner, can host multiple collaboration spaces (c-spaces) in which trading
partners use c-enablers to exchange data with the c-hub.

Collaborative commerce (c-commerce) | The use of digital technologies that enable companies to collaboratively plan, design, develop, manage, and research products, services, and
innovative EC applications.

Collaborative computing is an approach aimed at making the human-computer interface more natural. | False

Collaborative filtering | A market research and personalization method that uses customer data to predict, based on formulas derived from behavioral sciences, what other products or
services a customer may enjoy; predictions can be extended to other customers with similar profiles.

Collaborative planning | A business practice that combines the business knowledge and forecasts of multiple players along a supply chain to improve the planning and fulfillment of
customer demand.

Collaborative planning usually only involves one firm. | False

Collaborative planning, forecasting, and replenishment (CPFR) | Project in which suppliers and retailers collaborate in their planning and demand forecasting to optimize flow of
materials along the supply chain.

Collaborative Website | A site that allows business partners to collaborate.

Collaborative workflow applications: | address project-oriented and collaborative processes

Combined with leadership, the ____ is an indispensable kind of social network for properly running the business or project and to differentiate the business from similar ones. | entrepreneurial
network

Commodities with standard specifications (e.g., books, cds, airline tickets) are expected to facilitate higher sales volumes. | TRUE

Companies are finding that __ outlets, such as blogs and wikis, not only generate faster and cheaper results than traditional focus groups, but also foster closer relationships with customers. |
conversational marketing

Companies can improve their responsibility as custodians of customers personal data by implementing | Opt in and opt out information practices.

Companies can interface with social networking in each of the following ways except: | sending flyers to customer mailboxes.

Companies can use replenishment information to reduce inventories and eliminate stocking points. | T

Companies exchange surpluses they do not need for things that they do need. So, they are using: | Membership EC Business Model

Companies that choose an intermediary to do their buying and selling will have high supply chain power and buying/selling capabilities. | T

Companies that introduce a significant change in their industries, thus causing disruption in business operations, are referred to as disruptors. | TRUE

Companies that introduce innovations that significantly change markets or entire industries due to their activities are referred to as __. | disruptors

Companies that sell to intermediaries do not care about the final customer's satisfaction. | False

Companies that use an intermediary to do their buying and selling tend to be: | low on supply chain power and low on buying/selling capabilities
Companies use ______ to sell their unneeded assets for quick disposal or to easily dispose of excess, obsolete, and returned products. | forward auctions

Companies will often separate B2C orders from B2B orders because those types of orders have different order-fulfillment processes and different pricing models. | T

Companies will usually separate B2C orders from B2B orders because B2C and B2B orders have different _______. | order-fulfillment processes and different pricing models

Company A is a retailer that sells only pre produced products. What are the steps and their order in EC order fulfillment? | Ensuring payment, checking availability, arranging shipment,
insurance, production, purchasing and warehousing, contacts with customers and returns

Company ABC has several divisions that have created private resources that can be accessed using Internet protocols. The company is now going to link these resources together. What type of
network is being described? | Extranet

Company ABC sells a variety of products on its Web site to the highest bidder. What type of business model are they using? | Online auction

Company XYZ helps individuals exchange digital products. What EC classification do they fit? | p2p

Company XYZ helps individuals sell products to other individuals and takes a small commission on each sale. What EC classification do they fit? | c2c

Company XYZ sells a variety of products on its Web site. What type of business model are they using? | E-tailing

Company XYZ sells products to individuals. What EC classification do they fit? | b2c

Company-centric EC | E-commerce that focuses on a single companys buying needs (many-to-one, or buy-side) or selling needs (one-to-many, or sell-side).

Compare current motives of hackers to those of the past. | In the early days of EC, many hackers simply wanted to gain fame or notoriety by defacing Web sites or gaining root, which
means gaining unrestricted access to a network. Criminals and criminal gangs are now profit oriented, and their tactics are not limited to the online world.

Compared to competitive markets, auction prices are often ____ when there are multiple bidders | higher

Compared to competitive markets, auction prices are often ____ when there are very few bidders | lower

Compared to general-purpose IT platforms, theweb is | fundamentally communications-oriented rather than computing-oriented.

Compared to the traditional job market, the online job market | tends to be much less expensive.

Competition among online travel e-tailers is fierce, with low margins, little customer loyalty, and increasing commoditization of products and services. | TRUE

Competitive advantages of a "pull" vehicle distribution process include | all of the above.

Competitor analysis grid | A strategic planning tool that highlights points of differentiation between competitors and the target firm.

Compliance data | All data belonging or pertaining to an enterprise included in the law, which can be used for the purpose of implementing or validating compliance.

Components of a wireless infrastructure that support delivery of services over a wireless connection are: | WAP gateways, GPS locators, and GPS satellites.

Composite key | a key that contains two or more attributes

Computer Fraud and Abuse Act (CFAA) | Major computer crime law to protect government computers and other Internet-connected computers.

Computer viruses are not a potential risk to mobile devices because they are wireless. | False

Computing Technology Industry Association (comptia) | Nonprofit trade group providing information security research and best practices.

Conducting e-commerce where the online channel of a business is integrated with the physical retail business as opposed to being a separate channel best defines | considered commerce.

Conducting research online is not always ideal, because the demographics of Internet users are not the same as the general population. | True

Confidentiality | Assurance of data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes.
Confidentiality, integrity, and awareness are the three components of the CIA security triad. | FALSE

Considered commerce | Conducting e-commerce where the online channel of a business is integrated with the physical retail business as opposed to being a separate channel.

Consortium trading exchange (CTE) | An exchange formed and operated by a group of major companies in an industry to provide industry-wide transaction services.

Consumer electronics, including cell phone sales, are the largest category of online retail. | F

Consumer interaction, the essence of consumer focused (B2C) e-commerce, is the front end to ____. | d. Both

Consumer-to-business (C2B) | E-commerce model in which individuals use the Internet to sell products or services to organizations or individuals who seek sellers to bid on products or
services they need.

Consumer-to-consumer (C2C) | E-commerce model in which consumers sell directly to other consumers.

Contact card | A smart card containing a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip.

Contactless (proximity) card | A smart card with an embedded antenna, by means of which data and applications are passed to and from a card reader unit or other device without
contact between the card and the card reader.

Content | The text, images, sound, and video that make up a Web page.

Content created by a publisher that must be read using a computer or similar handheld device is an example of what type of digital publishing? | E-book

Content creation and management for a large EC site can be slow and expensive. | True

Content management | The process of adding, revising, and removing content from a Web site to keep content fresh, accurate, compelling, and credible.

Content not available anywhere else on the Web is called | premium content

Content owners are targeting youtube and third-party video-sharing Web sites for | copyright infringements

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act | Law that makes it a crime to send commercial e-mail messages with false or misleading message
headers or misleading subject lines.

Conversion rate | The percentage of clickers who actually make a purchase.

Cookie | A data file that is placed on a users hard drive by a remote Web server, frequently without disclosure or the users consent, that collects information about the users activities
at a site.

Copyright | An exclusive right of the author or creator of a book, movie, musical composition, or other artistic property to print, copy, sell, license, distribute, transform to another
medium, translate, record, perform, or otherwise use.

Corporate portal | A major gateway through which employees, business partners, and the public can enter a corporate Web site.

Corporate portals are popular in large corporations. | True

Corporations are moving their phone systems to ____ to cut costs and boost efficiency. | voip

Cost-benefit analysis | A comparison of the costs of a project against the benefits.

Costs associated with fraudulent transactions include: | all of the above.

CPM (cost per thousand impressions) | The fee an advertiser pays for each 1,000 times a page with a banner ad is shown.

Cracker | A malicious hacker who may represent a serious problem for a corporation.

Creating content that offers upgraded or more expensive versions of the product is called | up selling
Credit cards, charge cards, and debit cards are three forms of online payment cards. | True

Critics of political spam are against its use because they believe that | all spam is a nuisance, clogs mail servers, and creates security risks

CRM analytics | Applying business analytic techniques and business intelligence such as data mining and online analytic processing to CRM applications.

Cross-selling | Offering similar or complementary products and services to increase sales.

CSI Computer Crime and Security Survey | Annual security survey of U.S. corporations, government agencies, financial and medical institutions, and universities conducted by the
Computer Security Institute.

Customer interaction center (CIC) | A comprehensive service entity in which EC vendors address customer service issues communicated through various contact channels.

Customer loyalty is a deep commitment to rebuy or repatronize a preferred product or service consistently in the future, thereby causing repetitive same-brand purchasing. | TRUE

Customer loyalty is the most significant contributor to profitability. | True

Customer loyalty leads to enhanced resistance to competitors, a decrease in price sensitivity, and an increase in favorable word-of-mouth. | TRUE

Customer movements on the Internet are known as | clickstream behavior

Customer relationship management (CRM) | A customer service approach that focuses on building long-term and sustainable customer relationships that add value both for the
customer and the selling company.

Customer-facing activities or ___ are activities, such as advertising and order taking, that are visible to customers. | front-office operations.

Customers must pay a fixed amount, usually monthly, to get some type of services from AOL. So, AOL is using: | Transaction Fees Revenue Model

Customers rarely browse online stores if they do not intend to buy. | F

Customer-to-customer (C2C) e-commerce is conducted in various ways on the Internet, but the best-known C2C activities are: | C2C auctions

Customink is a Virginia-based online retail company that enables customers to design and order custom apparel such as t-shirts and sweatshirts. Customers can upload their own art, or use the
site's design tools to create a design and order the customized product. See figure Which of the following item(s) are benefits of their E-Commerce? Hint: choose multiple answers (3) | Website
allows people to choose from customink's design ideas, clipart, fonts and colors, or upload their own images to be printed on items including apparel, bags, drinkware and office
supplies.,Artists review each design, and email the customer a picture proof of how the design will print.,Depending on the desired quality and quantity of the item, their staffs
performs screen printing, digital printing, and embroidery services.

Customization | Creation of a product or service according to the buyers specifications.

Customization allows companies to: | Produce a large number of individualized products.

Cyber cons have a negative effect on EC because | defending against these cons and compensating for damages significantly increase the costs of EC.

Cybercrime | Intentional crimes carried out on the Internet.

Cybercrimes are intentional crimes carried out on the Internet. | True

Cybercriminal | A person who intentionally carries out crimes over the Internet.

Cybermediation occurs at Web sites that use intelligent agents to facilitate intermediation. | T

D
Dan Welch, who owns three World Cup Coffee shops in Portland, Oregon, estimates that his free Wi-Fi network has added 10 percent to his overall revenue. Welch credits Wi-Fi consumers with
spending three times as much on food compared with the average consumer. This is an example of: | business ROI

Darknets | Private online community that is only open to those who belong to it.
Data analytics are a valuable tool because it can provide all of the following EXCEPT: | c. Financial reporting

Data collection methods in the Web 2.0 environment include each of the following except | branding.

Data Encryption Standard (DES) | The standard symmetric encryption algorithm supported by the NIST and used by U.S. government agencies until October 2000.

Data mart | A small data warehouse designed for a strategic business unit (SBU) or department.

Data mining | The process of searching a large database to discover previously unknown patterns; automates the process of finding predictive information.

Data warehouse (DW) | A single, server-based data repository that allows centralized analysis, security, and control over data.

Define data and information. Explain how they differ. | data are facts and figures. Information is defined as knowledge derived from data or data presented in meaningful context.- data
is imply recorded in the database, but the data must be manipulated in some way to produce information.

Define database. | a self-describing collection of integrated tables, which means that the tables store both data and the relationships btwn the data

Define e-government. | E-government is the use of IT and e-commerce to provide access to government information and delivery of public services to citizens and business partners.

Define Web 2.0. Identify five characteristics. | Web 2.0 is a popular term for advanced Internet technology and applications, including blogs, wikis, RSS, and social bookmarking. Its
characteristics include the ability to tap into the collective intelligence of users; making data available in new or never-intended ways; relying on user-generated and user-controlled
content and data; lightweight programming techniques and tools, and letting nearly anyone act as a Web site developer.

Define Web 3.0. Identify five characteristics of Web 3.0. | Web 3.0 consists of the creation of high-quality content and services produced by gifted individuals using Web 2.0 technology as
an enabling platform. Web 3.0 will provide faster, far-flung connectivity and richer ways of interacting; new Web services that work entirely within a browser window; more powerful
search engines; new artificial intelligence applications, and more uses of 3D tools.

Defreshfish has been in business for ten years selling custom fishing lures to local fishermen through its store in a shopping mall. The company's owners are considering opening a Web site and
selling their products internationally. One new risk they will face in going from a brick-and-mortar strategy to a click-and-mortar strategy is: | the risk associated with trying to comply with
conflicting rules and regulations in many different locales.

Dells cornerstone business model is based on the concept of: | build-to-order which allows customers to configure their own customized systems.

Dell's distribution strategy is best described as | direct marketing from a manufacturer.

Denial of service (dos) attack | An attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading
its resources.

Describe database migration process | tables may be created, modified or deleted, relationships may be altered, data constrains may be changed, other changes may be made as needed

Describe G2C. | The government-to-citizens model includes all interactions between a government and its citizens. This model is meant to increase efficiencies and create greater
transparency to citizens.

Describe how EBT works. | The EBT system allows the government to electronically transfer benefits to citizen's smart cards instead of sending checks or other vouchers.

Describe how to effectively manage the return of items | There are several different methodologies for return handling, including returning the item to the place where it was purchased,
separate logistics for returns, outsourcing returns, and physically dropping off the returned items to collection stations.

Describe internal efficiency e-government activities. | These activities are meant to increase operation efficiencies though the use of IT systems and processes.

Describe issues in B2B fulfillment | The major issues are shipment size, multiple distribution channels, variety of shipment frequency, uneven breadth of carrier services, fewer carrier
EC offerings, and complex EC transaction paths.

Describe the basic EIPP options. | A variety of online options are available for making payments in an EIPP system. Each differs in terms of cost, speed, auditability, accessibility, and
control. Some options include: ACH Network, Purchasing Cards, Fedwire or Wire Transfer, Letters of Credit for Global Payments

Describe the two main areas of G2B activities. | The two main areas of government to-business activities include electronic procurement where the government purchases goods from the
private sector, and electronic auctions where the government electronically auctions surplus goods to businesses.

Desktop purchasing | Direct purchasing from internal marketplaces without the approval of supervisors and without the intervention of a procurement department.
Desktop search | Search tools that search the contents of a users or organizations computer files, rather than searching the Internet. The emphasis is on finding all the information that
is available on the users PC, including Web browser histories, e-mail archives, and word-processed documents, as well as in all internal files and databases.

Despite the failures of individual companies and initiatives, the total volume of EC has been growing each year. | True

Despite the many e-tailing EC companies that have failed in the past, the dot-com failure rate has recently declined sharply. | True

Detection measures | Ways to determine whether intruders attempted to break into the EC system; whether they were successful; and what they may have done.

Detection measures are actions that will make criminals abandon their idea of attacking a specific system. | FALSE

Determinant | attribut or set of attributes that functionally determine the value of another attribute or set. The left-hand side of a functional dependence.A -> B, A is determinate

Determining who has the right to access a portion of a Web site is a question of: | Authorization.

Deterring measures | Actions that will make criminals abandon their idea of attacking a specific system (e.g., the possibility of losing a job for insiders).

Differentiation | Providing a product or service that is unique.

Digital divide | Refers to the gap between people with effective access to digital and information technology and those without.

Digital economy | An economy that is based on digital technologies, including digital communication networks, computers, software, and other related information technologies; also
called the Internet economy, the new economy, or the Web economy.

Digital enterprise | A new business model that uses IT in a fundamental way to accomplish one or more of three basic objectives: reach and engage customers more effectively, boost
employee productivity, and improve operating efficiency. It uses converged communication and computing technology in a way that improves business processes.

Digital envelope | The combination of the encrypted original message and the digital signature, using the recipients public key.

Digital goods are also referred to as hard goods. | False

Digital products | Goods that can be transformed to digital format and delivered over the Internet.

Digital products have different cost curves than those of regular products because: | in digitization, most of the costs are fixed, and variable costs are very low.

Digital products, such as software, music, digitized images, and electronic games are a great fit for consumer focused (B2C) e-commerce because ____. | Electronic distribution is more
efficient than alternative distribution channels for digital products

Digital rights management (DRM) | An umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage.

Digital signature is based on __ | public key infrastructure

Digital signature or digital certificate | Validates the sender and time stamp of a transaction so it cannot be later claimed that the transaction was unauthorized or invalid.

Digital signatures or digital certificates: | a and b (a.are used to validate the sender and time stamp of the transaction so it cannot be later claimed that the transaction was unauthorized
or invalid., b.have been compromised by phishers and spammers)

Direct marketers are firms that sell directly to consumers over the Internet without maintaining a physical sales channel. | FALSE

Direct marketing | Broadly, marketing that takes place without intermediaries between manufacturers and buyers; in the context of this book, marketing done online between any seller
and buyer.

Direct marketing attempts to bring customers into local stores. | False

Direct marketing describes marketing that takes place offline between manufacturers and retailers. | F

Direct materials | Materials used in the production of a product (e.g., steel in a car or paper in a book).

Disadvantages for using the off-the-shelf approach as an EC development strategy include: | Software may not exactly meet the company's needs.
Disaster avoidance | An approach oriented toward prevention. The idea is to minimize the chance of avoidable disasters (such as fire or other human-caused threats).

Discuss intermediation, disintermediation, and reintermediation. | Intermediation occurs when a third party operates between buyers and sellers. Intermediaries provide information
about demand, supply, prices, and requirements or they offer value-added services. E-marketplaces, infomediaries and portals provide information for free or low cost, resulting in
the disintermediation or elimination of the intermediary. Reintermediation occurs when the disintermediated entity takes on new intermediary roles.

Disintermediation | The removal of organizations or business process layers responsible for certain intermediary steps in a given supply chain.

Disintermediation describes: | the introduction of new intermediaries within the channel structure

Disruption did not occur in the real estate brokerage industry. | FALSE

Disruptors | Companies that introduce a significant change in their industries, thus causing a disruption in normal business operations.

Distance learning | Formal education that takes place off campus, usually, but not always, through online resources.

Document management can be an important application on corporate intranets. | True

Doing your banking on an Internet-enabled cell phone is an example of m-commerce. | True

Domain name | A name-based address that identifies an Internet-connected server. Usually it refers to the portion of the address to the left of .com and .org, etc.

Domain Name System (DNS) | A hierarchical naming system for computers, services, or any resource participating in the Internet; it is like a directory that translates (converts)
domain names to their numeric IP addresses..

Double auction | An auction in which multiple buyers and their bidding prices are matched with multiple sellers and their asking prices, considering the quantities on both sides.

Due process is | a guarantee of basic fairness and fair procedures in legal action

Dynamic pricing | Prices that change based on supply and demand relationships at any given time.

Dynamic pricing most often occurs in systemic sourcing. | False

Dynamic pricing refers to : | d. Prices that are determined by market forces.

Dynamic pricing refers to the rapid movement of prices over time and possibly across customers as a result of supply and demand matching, as in auctions. | T

Dynamic trading is trading that occurs in situations in which prices are determined by supply and demand, therefore changing continuously. | T

Dynamic Web content | Content that must be kept up-to-date.

E
Each of the following are ways to pay bills over the Internet EXCEPT: | c. Customer service provider.

Each of the following describes retailing except: | Companies that produce a larger number of products, such as Proctor & Gamble, do not need retailers for efficient distribution.

Each of the following is a characteristic of WAYN except: | When it introduced fees for its premier travel membership service, it lost most of its new subscriptions.

Each of the following is a main function of traditional and electronic markets except | financing the transformation of raw materials into finished products.

Each of the following is a major type of B2B structural model except: | collaborative union.

Each of the following is a revenue model for online independent travel agents except | direct competition revenues.

Each of the following is a true statement about access control except: | All resources need to be considered together to identify the rights of users or categories of users.

Each of the following is a type of EC search except: | .host search.


Each of the following is a way social networks generate revenues except; | hosting auctions for individuals or enterprises.

Each of the following is an example of e-government except a: | ebay-seller selling surplus army supplies.

Each of the following is one of the three major categories of auction rules EXCEPT: | a. Timing rules

Each of the following is true about auction rules EXCEPT | Rules eliminate conflicts with existing distributors and distribution channels.

Each of the following statements about digital rights management (DRM) is true EXCEPT | DRM technologies were developed with strict regard for privacy protection

Early business application programs focused on ____. | d. Both A and B

E-auctions are becoming less important selling and buying channels for companies and individuals | F

Eb2b transactions are expected to grow to $10 billion by 2008. | False

E-banking | saves time and money.

E-bartering (electronic bartering) | Bartering conducted online, usually in a bartering exchange.

Ebay auctions are mostly: | consumer-to-consumer

E-book | A book in digital form that can be read on a computer screen or on a special device.

E-books are delivered in each of the following ways except: | via RFID.

E-business | A broader definition of EC that includes not just the buying and selling of goods and services, but also servicing customers, collaborating with business partners, and
conducting electronic transactions within an organization.

E-business refers to selling goods and services. | False

EC applications are supported by infrastructure and by each of the following support areas EXCEPT: | Mobile devices

EC architecture | A plan for organizing the underlying infrastructure and applications of a site.

EC businesses generate user profiles in each of the following ways except by: | using customer segmentation to identify customers' preferences.

EC can be conducted in an ... Where buyers and sellers meet online to exchange goods, services, money, or information. | electronic market (e-marketplace)

EC can take several forms depending on the degree of digitization of the following three dimensions _____ | the product or service sold, the process, and the delivery method.

EC competition is very intense because online transactions enable each of the following EXCEPT: | Higher prices because of a greater number of potential buyers.

EC costs and benefits can be classified into two broad categories: | tangible and intangible

EC enablers include electronic markets, e-stores, and e-catalogs. | TRUE

EC is primarily an IT field, it is not interdisciplinary. | False

EC offers companies new opportunities to test prices and make prices more precise, which are referred to as | optimal prices.

EC reduces cycle time in all of the following ways except: | Customer satisfaction.

EC security programs | All the policies, procedures, documents, standards, hardware, software, training, and personnel that work together to protect information, the ability to conduct
business, and other assets.

EC security strategy | A strategy that views EC security as the process of preventing and detecting unauthorized use of the organizations brand, identity, Web site, e-mail, information,
or other asset and attempts to defraud the organization, its customers, and employees.
EC sellers need to protect against fraud and each of the following EXCEPT: | Public keys

EC suites that enable an organization to quickly build an e-business include all of the following EXCEPT: | Virtual Computing Laboratory

E-check | A legally valid electronic version or representation of a paper check.

E-commerce (EC) risk | The likelihood that a negative outcome will occur in the course of developing and operating an electronic commerce strategy.

E-commerce 2.0 is based primarily on blogs and corporate-sponsored collaboration. | False

E-commerce and client/server network applications are associated with: | Enterprise databases

E-commerce strategy (e-strategy) | The formulation and execution of a vision of how a new or existing company intends to do business electronically.

Economic, legal, societal, and technological factors have created a highly competitive business environment in which customers are becoming less powerful. | False

EDI is no longer used. | False

E-distributor | An e-commerce intermediary that connects manufacturers with business buyers (customers) by aggregating the catalogs of many manufacturers in one placethe
intermediarys Web site.

Edutainment is the combination of education and entertainment. | True

Efficient transactions, price comparisons for customers, and global reach are three major capabilities that contribute to the growth of EC. | True

Egghead.com realized a substantial reduction in operating costs and inventory costs by eliminating its brick-and-mortar stores and becoming a pure-play in e-commerce. | T

E-government | E-commerce model in which a government entity buys or provides goods, services, or information to businesses or individual citizens.

E-government can generally include all of the following except: | Selling commercial items.

E-grocer | A grocer that takes orders online and provides deliveries on a daily or other regular schedule or within a very short period of time.

EIPP is used for: | Presenting and paying B2B invoices online

E-learning | The online delivery of information for purposes of education, training, or knowledge management.

E-learning drivers driving the transition from traditional education to online learning include each of the following except: | faculty with specialized expertise.

Electronic (online) banking or e-banking | Various banking activities conducted from home or the road using an Internet connection; also known as cyberbanking, virtual banking,
online banking, and home banking.

Electronic auctions (e-auctions) | Auctions conducted online.

Electronic cash is not an important part of EC. | False

Electronic catalogs (e-catalogs) | The presentation of product information in an electronic form; the backbone of most e-selling sites.

Electronic commerce (EC) | The process of buying, selling, or exchanging products, services, or information via computer.

Electronic commerce is an interdisciplinary field. | True

Electronic commerce is the process of buying, selling, or exchanging products, services, or information via computer | True

Electronic CRM (e-CRM) | Customer relationship management conducted electronically.

Electronic market (e-marketplace) | An online marketplace where buyers and sellers meet to exchange goods, services, money, or information
Electronic markets are the EC mechanism supporting the | presence and delivery, find information, compare, and analyze EC activities.

Electronic Product Environmental Assessment Tool (EPEAT) | A searchable database of computer hardware that meets a strict set of environmental criteria.

Electronic retailing (e-tailing) | Retailing conducted online, over the Internet.

Electronic shopping cart | An order-processing technology that allows customers to accumulate items they wish to buy while they continue to shop.

Electronic signature | A generic, technology-neutral term that refers to the various methods by which one can sign an electronic record.

Electronic storefronts, Internet malls, and exchanges are major B2B e-marketplaces. | FALSE

Electronic voting involves many steps. | True

E-loyalty | Customer loyalty to an e-tailer or loyalty programs delivered online or supported electronically.

E-loyalty is customer loyalty to an e-tailer or loyalty programs delivered online or supported electronically. | TRUE

E-mail spam | A subset of spam that involves nearly identical messages sent to numerous recipients by e-mail.

E-mall (online mall) | An online shopping center where many online stores are located.

E-marketplace | An online market, usually B2B, in which buyers and sellers exchange goods or services; the three types of e-marketplaces are private, public, and consortia.

E-marketplaces, especially for B2B and mega B2C such as Amazon.com may be plagued by | information overload

E-micropayments | Small online payments, typically under $10.

Employees purchasing office supplier for their work through an outside vendor is an example of B2E. | False

Emulate the work and behavior of human agents in executing organizational processes, such as travel authorization, planning, or decision making. | Software (or intelligent) agents

Enable an organization that has suffered a loss due to spammers to bring a lawsuit against spammers responsible for the loss | Civil laws

Encryption | The process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble (decrypt) it.

Encryption algorithm | The mathematical formula used to encrypt the plaintext into the ciphertext, and vice versa.

Encryption algorithm is the mathematical formula used to encrypt plaintext into ciphertext, and vice versa. | TRUE

Encryption components include each of the following except: | internal control environment.

E-newsletter | A collection of short, informative articles sent at regular intervals by e-mail to individuals who have an interest in the newsletters topic.

Enterprise 2.0 | Technologies and business practices that free the workforce from the constraints of legacy communication and productivity tools such as e-mail. Provides business
managers with access to the right information at the right time through a Web of interconnected applications, services, and devices.

Enterprise application integration (EAI) | Class of software that integrates large systems.

Enterprise search | The practice of identifying and enabling specific content across the enterprise to be indexed, searched, and displayed to authorized users.

Enterprise social networks are privately owned by corporations and operate inside them. | True

E-payment methods that can address the lower or higher end of the price continuum are unlikely to be widely accepted because of cost and security issues. | False

E-payment systems that require the payer to install specialized security software have proven more likely to succeed. | False
E-procurement | The electronic acquisition of goods and services for organizations. E-procurement supports the purchase of both direct and indirect materials and employs several
Web-based functions such as online catalogs, contracts, purchase orders, and shipping notices.

Erratic shifts in orders up and down supply chains is know as the: | Bullwhip effect.

E-sourcing | The process and tools that electronically enable any activity in the sourcing process, such as quotation/tender submittance and response, e-auctions, online negotiations,
and spending analyses.

E-supply chain | A supply chain that is managed electronically, usually with Web technologies.

E-supply chain management (e-SCM) | The collaborative use of technology to improve the operations of supply chain activities as well as the management of supply chains.

E-supply chain management is the collaborative use of technology to enhance B2C processes and improve speed, agility, real-time control, and customer satisfaction. | F

E-supply chains are usually managed using traditional, non-web-based systems. | False

E-tailers | Retailers who sell over the Internet.

E-tailing | Online retailing, usually B2C.

Ethics | The branch of philosophy that deals with what is considered to be right and wrong.

Ethics is the branch of philosophy that deals with what is considered to be right and wrong. | True

Every time a customer orders a DVD player from an online record store, the inventory for that player is reduced in the inventory system. This is an example of the: | order entry function

Evidence indicates that the basic principles that apply to retail success do not apply to e-tail success. | F

Examples of direct materials for a food processing company are computers and communication devices. | F

Examples of electronic signatures to help distinguish between legitimate and fraud transactions include all of the following EXCEPT: | a Web site development agreement

Exchanges (trading communities or trading exchanges) | Many-to-many e-marketplaces, usually owned and run by a third party or a consortium, in which many buyers and many sellers
meet electronically to trade with each other.

Exchanges, like all organizations, require | revenue

Expanding access to information for people with disabilities is a performance objective of which category of e-government? | G2C

Expert location systems (ELS) | Interactive computerized systems that help employees find and connect with colleagues who have expertise required for specific problemswhether they
are across the country or across the roomin order to solve specific, critical business problems in seconds.

Expertise location systems are designed to: | do all of the above.

Explain the difference between a candidate key and a primary key | while there can be several candidate keys, any of which could be the primary key, there is only one primary key
actually used to be the "official" key of a relationship

Exposure | The estimated cost, loss, or damage that can result if a threat exploits a vulnerability.

Extranet | A network that uses a virtual private network to link intranets in different locations over the Internet; an extended intranet.

Extranets are a major network structure in B2B exchanges. | True

F
Facebook is an example of an enterprise social network. | False

Factors determining usability include: | all of the above.


Factors influencing whether a particular e-payment method achieves critical mass include: | all of the above.

Factors that come into play in determining whether a particular method of e-payment achieves critical mass include all of the following EXCEPT: | full traceability of the buyers.

Factors that determine whether a first mover succeeds or fails in the EC marketplace include all of the following EXCEPT: | the speed of market entry

Factors that determine whether a particular method of e-payment achieves critical mass include each of the following except: | full traceability of the buyers.

Fair use | The use of copyrighted material for noncommercial purposes.

Fair use means | that copyrighted material can be used for noncommercial purposes without paying royalties or getting permission.

FAQ page | A Web page that lists questions that are frequently asked by customers and the answers to those questions.

Finding and retaining customers is a major critical success factor for most offline and online businesses. | TRUE

Finding information and knowledge that describe the relationships among consumers, products, marketing methods, and marketers is the goal of | market research.

Finding relevant and accurate information is often time-consuming and requires access to multiple systems causing organizations to lose a lot of productive employee time. One solution to this
problem is the use of: | portals.

Fingerprint scanners, facial recognition systems, and voice recognition are examples of __ that recognize a person by some physical trait. | biometric systems

Firewall | A single point between two or more networks where all traffic must pass (choke point); the device authenticates, controls, and logs all traffic.

Firewalls that filter requests from the Internet to a private network based on the IP address of the computer sending or receiving those requests are called: | packet-filtering routers.

Flappybird is a game that allows peoples to play games for free. So that case study follows: | None of the others

Flexibility is a benefit of e-learning. | True

Folksonomy (collaborative tagging, social classification, social indexing, social tagging) | The practice and method of collaboratively creating, classifying, and managing tags to annotate
and categorize content.

For _______ companies, it may be even more important to change strategies quickly. | pure play

For a company to obtain competitive advantage it must use a technology/process that is: | d. A and c

For a given type of payment card and processing system, the processes and participants are essentially the same for offline (card present) and online (card not present) purchases. | True

For a manufacturer, the supply chain ends: | when the product is used up and disposed of.

For all types of e-marketplaces, the most important key to the success of any third-party exchange is the critical mass of buyers and sellers. | T

For Governments, an example of an intangible EC metric is: | reelection of candidates

For many firms, presentment and payment processes are all of the following EXCEPT: | c. Secure.

Ford's strategy is best described as: See figure | direct marketing from a manufacturer.

Forecasting means identifying business, technological, political, economic, and other relevant trends that are currently affecting the business or that have the potential to do so in the future. |
True

Foreign key | the attribute that is a primay key is one table that is then place in a second table to form a relationship to the first table by sorting linking values. The term foreign key
refers to the attribute in the second table.

Formal education that takes place off campus, usually, but not always, through online resources best defines: | distance learning.

Forward auction | An auction in which a seller entertains bids from buyers. Bidders increase price sequentially.
Forward auctions expand online sales and offer businesses a new venue for quickly and easily disposing of excess, obsolete, and returned products. | T

Forward auctions give company Web sites "stickiness." This means that it is difficult to sell goods and have the customer "stick" to the site. | False

Fraud | Any business activity that uses deceitful practices or devices to deprive another of property or other rights.

From 2001 to 2006, a majority of e-exchanges: | folded due to a lack of customers, cash, or both.

From a bank's perspective, online banking offers a cheap alternative to branch banking as well as a chance to enlist customers in remote areas. | T

From and reports are examples of | application components

From the perspective of the billing firm, all of the following are advantages of e-billing EXCEPT: | universal availability.

From the perspective of the customer, all of the following are advantages of e-billing EXCEPT: | greater security than other types of payments.

Front end | The portion of an e-sellers business processes through which customers interact, including the sellers portal, electronic catalogs, a shopping cart, a search engine, and a
payment gateway.

Front end refers to the activities that support online order fulfillment, inventory management, purchasing from suppliers, payment processing, packaging, and delivery. | F

Functional dependency | relationship between attributes in a relation where the value of one or more attributes determines the value of another attribute. A -> B expressed the fact that
if we know a value of A we will always know the corresponding value of B

Functional products are staple products, such as groceries or gasoline, that have stable and predictable demand. For these products, an effective supply chain emphasizes speed, responsiveness,
and flexibility rather than low costs. | F

Functionalities provided by EC merchant server software include | all of the above.

Fundamentally, the success of the pure-play jewelry e-tailer Blue Nile was due to the companys use of Internet technologies to: | offer lower prices than competitors

G
G2G (government-to-government) includes only intergovernmental activities. | True

Gateways to e-storefronts and e-malls describes __. | shopping portals

Gateways to storefronts and e-malls are | shopping portals.

Gaye operates a B2B exchange that services a vertical market that marketers have difficulty targeting. What type of revenue model should she consider first? | Advertisement fee

General controls | Controls established to protect the system regardless of the specific application. For example, protecting hardware and controlling access to the data center are
independent of the specific application.

General Motors B2B initiatives successfully enable the auto giant to reduce inventory cost, minimize operational problems, and shorten procurement processes. | T

Geographical information system (GIS) | A computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information.

Give an example of a single-user database application and a multiuser database application. | membership database (single-user), video/dvd rental store that is used by several
employees(multi-user)

Global positioning system (GPS) | A worldwide satellite-based tracking system that enables users to determine their position anywhere on the earth.

Good management and effective operations and rules are critical to the success of B2B exchanges because good governance provides the rules for the exchange, minimizes conflicts, supports
decision making, and tries to induce the necessary liquidity. | T

Goods with the following characteristicguarantee provided by highly reliable or well-known vendorsare expected to facilitate higher sales volumes. | T

Google and ebay have similar core competencies. | False


Googles _______ is its expertise in information search technology. | c. Core competency

Governments use Web 2.0 tools mainly for: | collaboration, dissemination of information, e-learning, online forums, and citizen engagement.

Government-to-business (G2B) | E-government category that includes interactions between governments and businesses (government selling to businesses and providing them with
services and businesses selling products and services to the government).

Government-to-citizens (G2C) | E-government category that includes all the interactions between a government and its citizens.

Government-to-employee applications can lead to significant efficiency improvements for all of the reasons EXCEPT: | Most government employees use handheld digital devices.

Government-to-employees (G2E) | E-government category that includes activities and services between government units and their employees.

Government-to-government (G2G) | E-government category that includes activities within government units and those between governments.

GPS systems are key to the future of l-commerce. | True

Green computing | The study and practice of ecofriendly computing resources; is now a key concern of businesses in all industriesnot just environmental organizations.

Green IT | Green IT begins with manufacturers producing environmentally friendly products and encouraging IT departments to consider more friendly options like virtualization,
power management, and proper recycling habits.

Grid computing is a form of distributed computing. | True

Group purchasing | The aggregation of orders from several buyers into volume purchases so that better prices can be negotiated.

Group ware is appropriate in all of the following situations EXCEPT: | d. For people working on different tasks or projects

Groupware are software products used to support individualized workflows. | False

Guidelines regarding enterprise social networking activities include: | all of the above.

H
Hacker | Someone who gains unauthorized access to a computer system.

Has one seller and many buyers, or one buyer and many sellers. | A private marketplace

Hash | A mathematical computation that is applied to a message, using a private key, to encrypt the message.

Having control over the collection, storage, and dissemination of personal information is included in the category of: | privacy

Help customers do comparison-shopping in B2C by collecting data from multiple sellers sites. | Software agents (or intelligent agents)

Hit | A request for data from a Web page or file.

Honeynet | A network of honeypots.

Honeypot | Production system (e.g., firewalls, routers, Web servers, database servers) that looks like it does real work, but that acts as a decoy and is watched to study how network
intrusions occur.

Hope that consumers will use the trustmark seal as an assurance and as a proxy for actual research into their conduct of business, privacy policy, and personal information protection. | TRUSTe

Horizontal marketplaces | Markets that concentrate on a service, material, or a product that is used in all types of industries (e.g., office supplies, pcs).

How is the one-to-one relationship achieved? | By understanding a customers preferences and needs based on past transactions.

How many common types of Revenue model existing in E-Commerce? | 5


How many main steps are existing in a generic purchasing-decision model in E-Commerce? | 5

How many type of E-Commerce do you know? Typing these names of them! | 4

How was the transformation to a customer-intimate business accomplished? | The company uses extensive SAS decision support and data mining software.

Human or electronic intermediaries attempt to address each of the following limitations of direct interaction EXCEPT: | product distribution.

Identify five guidelines for enterprise social networking activities. | Five guidelines include allowing employees to collaborate and communicate in an employee-driven system; promoting
the use of enterprise wikis via demonstrations; setting up internal blogs and incorporating them into internal directories so users can see who has a blog; setting up enterprise social
bookmarking systems so users can see what sort of content their colleagues are tagging; and cios should be involved from the beginning to make sure the right infrastructure and tools
are in place.

Identify four trends that may slow EC and Web 3.0 and even cripple the Internet. | Security concerns, lack of net neutrality, copyright complaints, and choppy connectivity are four trends.

Identity theft | Fraud that involves stealing an identity of a person and then the use of that identity by someone pretending to be someone else in order to steal money or get other
benefits.

I
If a company purchases Godiva chocolates as gifts for its employees and has Godiva mail them directly to the recipient, the company is engaged in B2B2C. | True

If A determine B, what is true? | B=f(A)

Impacts of auctions include: | all of the above.

Impacts of e-marketplaces on B2C direct marketing include all of the following EXCEPT: | Brand images for new companies have become more difficult to establish.

Impacts of the Web on the travel and tourism industry include all of the following EXCEPT | Decrease in direct sales of travel packages on the global market by small, local players

Implementing EC often requires significant investments in infrastructure. Therefore, a good way to start is to undertake __. | one or a few small EC pilot projects

Implementing Web 2.0 sites, especially social networks and similar communities, does all of the following EXCEPT: | Will quickly have a massive impact on almost every company that
produces consumer goods

Important trends in B2C EC include all of the following EXCEPT: | the Internet will influence approximately 25 percent of all retail sales by 2010.

In , the prices are usually dynamic and are based on changes in supply and demand. | spot sourcing

In , the prices are usually negotiated or fixed. | strategic sourcing

In 2005, human error was responsible for almost _______ percent information security breaches in organizations | 60

In a ______, one company sells to many business buyers from e-catalogs or auctions, usually over an extranet. | sell-side e-marketplace

In a B2C Storefront, the function that provides customers with information about the product through their browser is called the | product presentation function.

In a client/server application, the ____ logic provides the user interface. | c. Presentation

In a database table, two records: | cannot have the same primary key

In a marketspace, some goods can be digitized. | True

In a relation, cells in a table can hold: | only a single value

In a sell-side e-marketplace, a business sells products and services to business customers, frequently over ____. | an extranet

In a sell-side e-marketplace, a business sells products and services to business customers, frequently over . | an extranet
In a sell-side marketplace, the seller must produce all or part of the goods they sell. | True

In a supplier aggregation model the exchange attempts to group many seller's products and services into one exchange. | True

In addition to EC being conducted via the Internet, EC can be conducted over local area networks (lans). | True

In addition to providing an easy mechanism for buying books, the Amazon.com Web site is easily searchable by book title and author. It also has book reviews and suggests titles based on
previous purchase activity. These enhancements make the Amazon site a favorite for readers. This is an example of | internal Web site promotion

In an effort to increase inter-organizational information flow, many companies expand access to corporate intranets to include selected trading partners and customers by creating a(n) ____. | b.
Extranet

In an e-market, Federal Express is an example of a(n): | service provider.

In an exchange where plastic components are bought and sold, the market maker collects money from the buyer, and releases it to the seller once successful delivery is completed. This is an
example of: | transaction facilitation.

In an exchange where plastic components are bought and sold, the market maker purchases a new server that will be used to conduct auctions. This is an example of: | maintaining exchange
infrastructure.

In an organizational transformation | there is always a sharp break with the past and every aspect of the business will probably change

In B2B exchanges, software agents can facilitate management of multiple trading partners and their transactions across multiple virtual industry exchanges. | T

In B2C, an example of a tangible EC metric from the buyers perspective is: | cost/price of the product.

In chapter 8 - Marketing and Advertising in E-Commerce, AIDA model is mentioned and used to analyze their differences in illustrating an online purchasing behavior. What does the second A
in AIDA stand for? | Action

In collaborative work, members frequently are in different locations. Using , group members can work on the same document, which is shown on the PC screen of each participant. | Using
screen-sharing software

In company-centric marketplaces, the individual company has very little control over who participates in selling or buying transactions. | False

In cyberspace, there are intermediaries that provide and/or control information flow. These electronic intermediaries are known as | infomediaries.

In dealing with exchange members, the management of the exchange should: | make certain that the exchange is neutral in its dealings with all members.

In digital signature, which of the following encryption algorithm is applied? | RSA

In direct marketing: | customers are contacted directly without the help of intermediaries.

In EC Framework, which of the following items are belong to infrastructure layer? Hint: choose multiple answers (2) | Security, Messaging and information distribution

In E-Commerce B2B context, what does PRM stand for? See figure | Partner Relationship Management

In E-Commerce framework, the Policy part is belonged to _____ | Support services layer

In E-Commerce, what do PLM and voip stand for? Statement A: PLM stands for Product Life Management Statement B: voip stands for Voice over Internet Protocol Choose the right answer
from the two statements! | Statement A is False, and Statement B is True

In E-Commerce, what does PKI stand for? Hint: capitalize the first letter of each word (e.g. NIC you need to enter Network Interface Card only) | Public key infrastructure

In electronic auctions, near-perfect market information is available about prices, | d. Buyers and sellers

In electronic auctions, near-perfect market information is available about prices, products, current supply and demand, and so on. This feature provides benefits to . | buyers and sellers

In electronic exchanges and traditional open-air marketplace, buyers and sellers can interact and negotiate prices and quantities. | T
In e-procurement, office supplies for a manufacturing company would be considered direct materials. | False

In financial supply chain management, the goal is to optimize all of the following | d. The physical supply chain

In financial supply chain management, the goal is to optimize all of the following EXCEPT: | the physical supply chain

In general, online real estate is replacing existing real estate agents in most markets. | F

In general, the benefits of contract-management software include all of the following EXCEPT: | Reduces contract-related risks.

In general, what is the relationship between the cost of building and installing an EC system and the cost of operating and maintaining it? | It costs about as much time, effort, and money to
operate and maintain as to build and install a system.

In global trade, a __ is a written agreement by a bank to pay the seller, on account of the buyer, a sum of money upon presentation of certain documents. | letter of credit

In implementing a successful click-and-mortar strategy, a company must make sure that whether a customer establishes contact through face-to-face encounters with store personnel or through
the Web page, the information and service received is consistent. | T

In law, fair use refers to the use of copyrighted material for __ purposes. | noncommercial

In marketing, an intermediary is a third party that operates between sellers and buyers. Intermediaries of all kinds offer their services on the Web. | T

In order for a cell phone to be used for m-commerce, it must have a display screen. | True

In order to create a relationship btwn the Student and Grade tables they must contain: | the same column (or field)

In organizational transformation: | there is always a sharp break with the past and every aspect of the business will probably change.

In reviewing integration of new B2B systems with existing information systems, we find which of the following to be untrue? | Most major software vendors do not provide for integration.

In SCM, the supply chain of a manufacturer ends when__ | the product is used

In selling directly, manufacturers may encounter a similar problem to that of B2C, namely _____ with the regular distributors, including corporate dealers. | channel conflict

In spot-sourcing, prices are: | dynamic and set based on supply and demand.

In static trading prices are quickly influenced by supply and demand. | False

In the authorization process, money is transferred from the buyer's to the merchant's account. | False

In the consortia model: | several industry players come together to establish the exchange for the benefit of all.

In the consumer decision process, which of the following roles ultimately makes the buying decision or any part of it? | decider

In the consumer decision-making process, the buyer is the person who ultimately makes the buying decision. | FALSE

In the context of EC, ____ are electronic trading-community meeting places for many sellers and many buyers, and possibly for other business partners. | exchanges

In the decision-making process, virtual catalogs and links to external sources support the evaluation and selection phase of that process. | F

In the field, a sales representative writes notes with a mobile handwriting-recognition computer immediately after a sales call. This can be viewed as an EC activity. | False

In the internal part of the supply chain, the major concerns are production management, manufacturing, and inventory control. | T

In the one buyer, many potential sellers dynamic pricing configuration, the sellers use a forward auction. | FALSE

In the online world, merchants are not held liable for fraudulent transactions. | False
In the online world, virtually every attempt to disintermediate cash and credit cards has failed. | True

In the purchase decision-making process, blogs and search engines support the evaluation, negotiation, and selection step. | FALSE

In the real world, negotiations are done primarily electronically and with negotiation support tools. | F

In the settlement process, the systems must determine whether a buyer's card is active and whether the cardholder has sufficient funds available for the purchase. | False

In the strategy implementation phase, general long-term plans are continuously evaluated. | False

In the United States, which the federal laws place legal limits on monitoring activity? | The Wiretap Act and the Pen Register, Trap, and Trace Devices statute

In the upstream supply chain, attention is directed at distribution, warehousing, transportation, and after-sale service. | F

In the US, cellular companies are not required to support 911 calls. | False

In today’s digital economy, click-and-mortar retailers sell via stores, through voice phone calls to human operators, over the Internet through interactive Web sites, and by mobile devices. | T

In what way does mobile computing not help organizations? | Costs of hardware are increasing

In which type of market would a third-party exchange most likely be less successful? | Balanced market

Incorrect approaches to EC strategy selection include all of the following EXCEPT: | using a late-mover strategy.

Increasing self service is a benefit of EC. | True

Increasing the number of regular suppliers and integrating with their information systems and possibly with their business processes | Enables customized online catalogs with the same prices
for different customers.

Incubator | A company, university, or nonprofit organization that supports businesses in their initial stages of development.

Indirect materials | Materials used to support production (e.g., office supplies or lightbulbs).

Indirect materials are generally purchased in horizontal exchanges. | True

Indirect materials are typically used in ______ activities. | maintenance, repair, and operation (MRO)

Individual buyers are more important than organizational buyers. | False

Individual buyers do most of the actual shopping in cyberspace in terms of dollar volume of sales. | F

Infomediaries | Electronic intermediaries that provide and/or control information flow in cyberspace, often aggregating information and selling it to others.

Information architecture | How the site and its Web pages are organized, labeled, and navigated to support browsing and searching throughout the Web site.

Information assurance (IA) | The protection of information systems against unauthorized access to or modification of information whether in storage, processing, or transit, and against
the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.

Information portals offer a variety of services to encourage users to use and return to their Web sites. | True

Information visibility | The process of sharing critical data required to manage the flow of products, services, and information in real time between suppliers and customers along the
supply chain.

Informational Web site | A Web site that does little more than provide information about the business and its products and services.

Infrastructures that support the wireless connection are: | a. Network access points, mobile communications server switches, and cellular

Infringement | Use of the work without permission or contracting for payment of a royalty.
Insuring: | is the in-house development of applications.

Intangible metrics in the model for IT project justification include each of the following except: | lead-time.

Integration testing | Testing the combination of application modules acting in concert.

Integrity | Assurance that stored data has not been modified without authorization; a message that was sent is the same message as that which was received.

Intellectual property | Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce.

Intellectual property law is the area of law that is associated with each of the following EXCEPT: | business contracts

Intelligent agents | Software applications that have some degree of reactivity, autonomy, and adaptability as is needed in unpredictable attack situations. An agent is able to adapt itself
based on changes occurring in its environment.

Intelligent agents are capable of more sophisticated tasks than search engines. | True

Interactions within mobile social networks are currently limited to exchanging simple text messages on a one-to-one basis. | FALSE

Interactive marketing | Online marketing, facilitated by the Internet, by which marketers and advertisers can interact directly with customers, and consumers can interact with
advertisers/vendors.

Interactive voice response (IVR) | A voice system that enables users to request and receive information and to enter and change data through a telephone to a computerized system.

Interactive voice response (IVR) systems allow users to send and receive information through an interface that is controlled by their voice. | True

Interactive Web site | A Web site that provides opportunities for the customers and the business to communicate and share information.

Intermediaries are human or electronic agents that play an important role in EC by providing value-added services such as making payment arrangements to buyers and sellers. | T

Intermediaries help to decrease contracting risk in marketspaces. | True

Intermediaries in B2B commerce, which may be virtual or click-and-mortar intermediaries, are third parties that broker transactions between buyers and sellers. | T

Intermediary | A third party that operates between sellers and buyers.

Internal aggregation of products for group purchasing is usually done by large organizations. | True

Internal control environment | The work atmosphere that a company sets for its employees.

Internal procurement marketplace | The aggregated catalogs of all approved suppliers combined into a single internal electronic catalog.

Internet capabilities that make it more difficult for companies to capture profits include each of the following except: | The Internet makes it easier to make secure payments.

Internet fraud has grown even faster than the Internet itself. | TRUE

Internet radio | A Web site that provides music, talk, and other entertainment, both live and stored, from a variety of radio stations.

Internet technologies can provide consumers with easier access to pricing information, | d. Reducing prices.

Internet technologies can provide consumers with easier access to pricing information, which increases their bargaining power. To remain competitive and profitable, sellers need smarter pricing
strategies, which include all of the following strategies EXCEPT: | reducing prices.

Internet underground economy | E-markets for stolen information made up of thousands of Web sites that sell credit card numbers, social security numbers, other data such as numbers
of bank accounts, social network ids, passwords, and much more.

Internet XML has no advantage over traditional EDI systems. | False


Interoperability | Connecting people, data, and diverse systems; the term can be defined in a technical way or in a broad way, taking into account social, political, and organizational
factors.

Intrabusiness EC | E-commerce category that includes all internal organizational activities that involve the exchange of goods, services, or information among various units and
individuals in an organization.

Intrabusiness EC is comprised of B2E commerce only. | False

Intrabusiness EC is usually performed over intranets and/or __. | corporate portals

Intra-business e-commerce is sometimes called ____ e-commerce. | e. None of the above B2E

Intranet | An internal corporate or government network that uses Internet tools, such as Web browsers, and Internet protocols.

Intra-organizational e-commerce is ____ focused. B2B focuses on improving information exchanges throughout the ____. | c. Value chain/supply chain

Intrusion detection system (IDS) | A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated
action based on what it sees.

Investors in e-tailers which report small losses on each unit sold should not be concerned because the huge volume of business available online should more than offset these small marginal
losses. | F

Involves providing a product or service that is unique and not available elsewhere | Differentiation

Involves the management of workflows so that documents, information, or tasks are passed from one participant to another in a way that is governed by the organizations rules or procedures to
achieve required deadlines. | Workflow management

Involves using various computer-based tools and techniques to analyze transaction data and generate new ideas. | Knowledge creation

IP address | An address that uniquely identifies each computer connected to a network or the Internet.

Is a 3-dimensional word where residents retain the rights to their digital creations and can buy, sell, and trade with other residents are able to sell them at various in-world venues. | Second Life

Is a business strategy that enables manufacturers to control and share product-related data as part of product design and development efforts and in support of supply chain operations. | Product
lifecycle management

Is a business strategy that focuses on managing an enterprises interactions with its suppliers. | Supplier relationship management

Is a business strategy that focuses on providing comprehensive quality service to business partners. | Partner relationship management

Is a characteristic that influences the average length of time a visitor stays in a site. | Stickiness

Is a collaborative online encyclopedia that volunteers primarily write | Wikipedia

Is a combination of both the brick-and-mortar retailer and an online transactional Web site. | click-and-mortar retailer

Is a company that facilitates transactions between buyers and sellers. | broker

Is a complex process that requires the coordination of many activities so that the shipment of goods and services from supplier right through to customer is done efficiently and effectively for all
parties concerned. | Supply chain management

Is a computer program that can access databases of Internet resources, search for specific information or keywords, and report the results | search engine

Is a corporate or government network that uses Internet tools, such as web browsers, and Internet protocols. | intranet

Is a corporate-based acquisition site that uses reverse auctions, negotiations, group purchasing, or other e-procurement method. | buy-side e-marketplace

Is a description of how a company or an EC project will generate revenue. | revenue model


Is a directory of over 700,000 manufacturers and distributors from 28 countries | Thomas Global (thomasglobal.com)

Is a flexible language for capturing financial information throughout a business information processes, which makes the analysis and exchange of corporate information more reliable and easier
to facilitate. | XBRL (or extensible Business Reporting Language)

Is a form of distributed computing that involves coordinating and sharing computing, application, data, storage, or network resources across dynamic and geographically dispersed organizations. |
Grid computing

Is a for-profit very rapidly growing Web site that is tapping into the enthusiasm and knowledge of people to build a better search engine than Google. | Wikia.com

Is a gateway through which employees, business partners, and the public can enter a corporate Web site. | Corporate portal

Is a general-purpose architecture that enables distributed applications to be assembled from a Web of software services in the same way that Web sites are assembled from a web of HTML pages.
| Web services

Is a many-to-many marketplace owned by one company. | Private exchange

Is a marketing strategy in which customers agree to accept advertising and marketing materials, known as opt-in. | Permission advertising

Is a marketplace in which sellers and buyers exchange goods and services for money or for other goods and services, but do so electronically. | Marketspace

Is a method of doing business by which a company can generate revenue to sustain itself. | Business model

Is a model devised by Porter that says that five major forces of competition determine industry structure and how economic value is divided among the industry players in an industry; analysis of
these forces helps companies develop their competitive strategy. | Competitive forces model

Is a network that uses the Internet to link multiple intranets. | Extranet

Is a public electronic market with many buyers and sellers. | Exchange

Is a single point of access through a Web browser to critical business information located inside and outside of an organization | Information portal

Is a standard used to improve compatibility between different systems of business partners by defining the meaning of data in business documents. | Extensible markup language (or XML)

Is a tendering (bidding) system in which suppliers are invited to bid on the fulfillment of an order and the lowest bid wins. | Reverse auction

Is a virtual marketplace in which sellers and buyers meet and conduct different types of transactions | E-marketplace

Is a Web development technique for creating quicker and more responsive Web applications by exchanging small amounts of data with the server so that the entire Web page does not have to be
reloaded each time the user makes a change | Ajax

Is an advertising strategy in which customers agree to accept advertising and marketing materials. Known as opt-in. | Permission marketing

Is an approach aimed at making the humancomputer interface more natural. | Social computing

Is an architecture that enables the assembly of distributed applications from software services and ties them together. | Web Services

Is an arrangement whereby a marketing partner or individual refers consumers to the selling company’s Web site. | Affiliate marketing

Is an EC architecture consisting of four tiers: Web browsers, Web servers, application servers, and database servers. | Multitiered application architecture

Is an EC model in which a business provides some product or service to a client business that maintains its own customers | Business-to-business-to-consumer (B2B2C)

Is an EC model in which businesses sell to individual shoppers. | Business-to-consumer (B2C)

Is an EC model in which EC transactions and activities conducted in a wireless environment. | Mobile commerce (m-commerce)

Is an E-commerce category that includes all internal organizational activities that involve the exchange of goods, services, or information among various units and individuals in an organization. |
Intrabusiness EC
Is an exchange formed and operated by a group of major companies in an industry to provide industrywide transaction services. | Consortium trading exchange

Is an exchange that handles materials used by companies in different industries. | Horizontal exchange

Is an exchange whose members are in one industry or industry segment. It trades only in materials/services unique for that industry. | Vertical exchange

Is an invitation to participate in a tendering (bidding) system. | Request for quote (or RFQ)

Is an m-commerce application targeted to a customer whose preferences and needs and location (e.g., using GPS) are known in real time. | Location-based commerce

Is based on the Circle of Friends technique for networking individuals in virtual communities and was the top online social network service until overtaken by myspace. | Friendster

Is marketing that treats each customer in a unique way to fit marketing and advertising with the customer’s profile and needs. | One-to-one marketing

Is money invested in a business by an individual or a group of individuals in exchange for equity in the business | Venture capital

Is MS Access a DBMS? | Is not just a DBMS, combines a DBMS and an application generator.

Is one of an individual’s unique physical or behavioral characteristics that can be used to identify an individual precisely. | Biometric

Is one of Oracle’s key applications. It supports product catalog and content management, interactive and complex selling, personalized pricing, flexible check and payment options, account and
contract management, and post-sales order and shipping services. | iStore

Is one of the two major models of third-party exchanges where distributors standardize, index, and aggregate suppliers’ catalogs and make them available to buyers in a centralized location. |
Supplier aggregation model

Is one type of exchange in which several industry players collaborate to build an exchange so that all can benefit. | A consortium (or co-op)

Is the collaborative use of technology to enhance B2B processes and improve speed, agility, real-time control, and customer satisfaction. | E-supply chain management

Is the continuous evaluation of progress toward the organization’s strategic goals, resulting in corrective action and, if necessary, strategy reformulation. | Strategy assessment

Is the degree to which something can be bought or sold in a marketplace without significantly affecting its price. | Market liquidity

Is the electronic delivery of newspapers, magazines, books, videos, music, and other digitizable information over the Internet. | Online publishing

Is the electronic transfer of specially formatted standard business documents, such as bills, orders, and confirmations, sent between business partners. | Electronic data interchange (or EDI)

Is the elimination of intermediaries between sellers and buyers. | Disintermediation

Is the mapping and measuring of relationships and flows between people, groups, organizations, animals, computers or other information or knowledge processing entities. | Social network
analysis

Is the method of bringing together the products offered by many different suppliers into one place for consideration by all the buyers at a given company. | Aggregating catalogs

Is the portion of an e-seller’s business processes through which customers interact, including the seller’s portal, electronic catalogs, a shopping cart, a search engine, and a payment gateway. |
Front end

Is the practice of using games, particularly computer games, to advertise or promote a product, an organization, or a viewpoint. | Advergaming

Is the process made up of a range of activities by which an organization obtains or gains access to the resources they require to undertake their core business activities. | Procurement

Is the process of buying, selling, or exchanging products, services, or information via computer networks. | Electronic commerce

Is the process of making the selected applications and projects a reality by hiring staff; purchasing equipment; licensing, purchasing, or writing software; and contracting vendors. | Project
management

Is the process whereby intermediaries, either new ones or those that had been disintermediated, take on new intermediary roles. | Reintermediation
Is the psychological status of depending on another person or organization to achieve a planned goal. | Trust

Is the purchase of goods and services as they are needed, usually at prevailing market prices. | Spot buying

Is the rapid production of customized products or services at a reasonable cost for a large number of customers. | Mass customization

Is the term that refers to the collective functionality of ERP, SCM, CRM, and e-business solutions. | Enterprise systems

Is the transfer of documents and computer files while video conferencing | Data conferencing

Is the use of Web-based technologies to support the material acquisition, warehousing, and transportation processes. | E-logistics

Is typically a third party that operates between sellers and buyers | Intermediary

Islands of automation do not allow for productivity of individual functional groups. | b. False

ISP hosting service | A hosting service that provides an independent, stand-alone Web site for small and medium-sized businesses.

Issues related to trust in EC include all of the following EXCEPT: | As a result of trust-transference programs through portal affiliation, seal of approval programs, online shopping
communities, and customer endorsements, customers are fully confident in online purchasing transactions.

It can be said that competition between companies is being replaced by competition between _____ . | Networks

It has been well known for generations that the success of many private, public, and military organizations depends on their ability to manage the flows of materials, information, and money,
which is referred to as the product life cycle. | T

It is currently known that if a front-end application such as a Web site is effectively secured, then | The data itself may not be secure because the application may not function as planned.

J
Jackie has an e-card that she uses to purchase office supplies for the company she works for. What type of smart card is she using? | Purchase card

Jackie has an e-card that she waves at the turnstile to enter the subway. What type of smart card is she using? | Contactless card

Jackie purchases a new e-book from an online publisher. She loses power to her computer in a thunderstorm before the download is completed. When she tries to restart the download, she
receives a message saying her download is complete. Jackie will need the: | customer service function

Jackie uses a software system to place bids automatically on her behalf until her predetermined maximum price is reached. The software bids in such a way as to minimize the final bid. This is
referred to as: | proxy bidding

Jami sells construction equipment. Whenever she calls on her building contractor customers, she asks if they are having any problems. In doing so, Jami is addressing which of the following core
aspects of marketing? | Satisfying customer needs and wants

Janice and Tony decided to buy the new computer system Paul suggested after careful analysis. Janice directed Rich, her assistant, to order the system. In this example, what purchasing role does
Rich play? | Buyer

Janice and Tony decided to buy the new computer system Paul suggested after careful analysis. Janice directed Rich, her assistant, to order the system. In this example, what purchasing role does
Janice play? | Buyer

Jeff wants to purchase online, but is concerned about a company's privacy policy. What online purchase decision aid should he use? | Trust verification site

Jewelry sales over the Internet is just beginning, but could be one of the top sellers on the Internet in the near future. | F

Job seekers can both reply to ads and post their information on several online recruiting sites. | True

John wants to know if the first edition novel he just purchased through an e-auction is | b. Authentication

John wants to know if the first edition novel he just purchased through an e-auction is actually a first edition. The auction host helps him locate an expert that will him whether the novel is a
genuine first edition or a fake. This is an example of: | authentication
Joining a public e-marketplace provides a business with greater buying and selling capabilities, but the tradeoff is lower supply chain power. | T

Julie is using an intelligent agent to help her find the best price on a CD she would like to purchase. What type of agent is she using? | Merchant brokering

Justifying an EC investment by comparing the costs of each project against its benefits is known as a cost-benefit analysis. | True

Justifying information security projects: | should be done because employee security training is usually poorly done

K
Key (key value) | The secret code used to encrypt and decrypt a message.

Key business drivers for B2B are all of the following EXCEPT: | the willingness of companies to incur higher costs to improve collaboration.

Key factors limiting the use of personalization include | privacy and trust issues.

Key performance indicators (kpis) | The quantitative expression of critically important metrics.

Key space | The large number of possible key values (keys) created by the algorithm to use when transforming the message.

Key strategies for successful online community include all of the following EXCEPT: | Control the sharing of information or sensitive opinions

Keystroke logging (keylogging) | A method of capturing and recording user keystrokes.

Keystroke logging captures and records user keystrokes. | True

Keyword banners | Banner ads that appear when a predetermined word is queried from a search engine.

Knowledge discovery in databases (KDD)/knowledge discovery (KD) | The process of extracting useful knowledge from volumes of data.

Knowledge generated in e-business contributes to the enhancement of three core operating processes, which include all of the following EXCEPT | project management

Knowledge is of limited value if: | a. It is not shared

Knowledge management (KM) | The process of capturing or creating knowledge, storing it, updating it constantly, disseminating it, and using it whenever necessary.

Knowledge management uses knowledge: | to improve the functioning of an organization.

L
Lack of consumer confidence in EC security is a limitation of EC. | True

Lack of search and retrieval tools is a common problem for corporate portals. | True

Large private organizational buyers and government agencies make large-volume or large-value purchases through __, also known as reverse auctions. | electronic tendering systems

Learning agent technology is a nonintrusive way to personalize web content by watching a user's actions. | True

Learning, training, and knowledge sharing in social networks and by using social software tools for learning best describes: | social learning.

Light bulbs and office supplies might be purchased in a(n) _____ by both an automaker and a steelmaker. | horizontal exchange

Lightweight programming techniques and tools letting nearly anyone act as a Web site developer is a representative characteristic of Web 2.0. | TRUE

Limitations of e-auctions include all of the following EXCEPT: | Dynamic pricing

Limitations of online research methods are all of the following EXCEPT: | E-mail surveys have the lowest response rate.
List and briefly describe the three components of the CIA security triad. | The CIA triad includes confidentiality, integrity, and availability. Confidentiality is the assurance of data
privacy. The data or transmitted message is encrypted so that it is readable only by the person for whom it is intended. The confidentiality function prevents unauthorized disclosure
of information. Integrity is the assurance that data are accurate or that a message has not been altered. It means that stored data has not been modified without authorization; a
message that was sent is the same message that was received. Availability is the assurance that access to data, the Web site, or other EC data service is timely, available, reliable, and
restricted to authorized users.

List and briefly discuss the five major roles that people play in the decision-making process. | The major roles are initiator, influencer, decider, buyer, and user. The initiator is the person
who first suggests or thinks of the idea of buying a particular product or service. The influencer is the person whose advice or view carries some weight in making a final purchasing
decision. The decider is the person who ultimately makes a buying decision or part of it, such as whether to buy, what to buy, how to buy, or where to buy. The buyer is the person
who makes the actual purchase. The user is the person who consumes or uses the product or service.

List consequences of poorly designed database. | poor performance, difficult to revise adapt to changing circumstances, hard to navigate, slow

List five business models by distribution channel. | The five business models are direct marketing by mail-order retailers that go online, direct marketing by manufacturers, pure-play e-
tailers, click-and-mortar retailers, and Internet malls.

List four reasons why Web advertising is growing rapidly. | Seven reasons are mentioned in the textbook and include cost, richness of format, personalization, timeliness, location-basis,
linking, and digital branding. Referencing cost, online ads are sometimes cheaper than those in other media. In addition, ads can be updated at any time with minimal cost. In terms of
format richness, Web ads effectively use the convergence of text, audio, graphics, and animation. In addition, games, entertainment, and promotions can be easily combined in online
advertisements. When using personalization, Web ads can be interactive and targeted to specific interest groups or individuals, and the Web is a much more focused medium. In the
area of timeliness, Internet ads can be fresh and up-to-the-minute. Web advertising can be location based; Internet ads can be sent to consumers whenever they are in a specific time
and location. With linking, it is easy to link from an online ad to a storefront. In the area of digital branding, even the most price-conscious online shoppers are willing to pay
premiums for brands they trust.

List the six major EC trading activity categories. | presence and discovery, find information, compare, analyze; , (2) trading buy, sell, exchange; (3) communicate, collaborate, learn; (4)
entertainment; (5) improve performance; (6) other activities, recruit, customer service.

List the six major objectives of EC defense strategies. | Prevention and deterrence, detection, containment, recovery, correction, and awareness and compliance are the six objectives.

Localization | The process of converting media products developed in one environment (e.g., country) to a form culturally and linguistically acceptable in countries outside the original
target market.

Location-based m-commerce (l-commerce) | Delivery of m-commerce transactions to individuals in a specific location, at a specific time.

Lower prices on products is not a consumer benefit of EC. | False

Lowering a customer's search cost allows them to: | Research more items to find the best price

M
Macro virus (macro worm) | A macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed.

Maintenance, repair, and operation (MRO) | Indirect materials used in activities that support production.

Major barriers to EC include all of the following EXCEPT: | Lack of technology

Major barriers to EC include all of the following except: | Lack of programmers

Major characteristics of the digital economy include obsolescence, digitization, and wars. | True

Major department and discount stores are classified as: | General malls.

Major implementation challenges that companies must consider when planning e-procurement initiatives include all of the following EXCEPT: | Increasing the number of regular suppliers
and integrating with their information systems and possibly with their business processes.

Malware (malicious software) | A generic term for malicious software.

Many auction sites are implementing _______ because of the significant | d. M-commerce applications

Many auction sites are implementing __ because of the significant increase in the number of users who browse the Internet wirelessly. | M-commerce applications
Many B2C and B2B businesses rely on specialized third-party software and services to calculate the taxes associated with a sale because: | Of the complexities.

Many companies employ a(n) ____, which is a gateway for customers, employees, and partners to reach corporate information and to communicate with the company. | Corporate portal

Many companies use a corporate portal, which is a gateway for customers, employees, and partners to reach corporate information and communicate with the company. | True

Many companies use different names, colors, sizes, and packaging for their overseas products and services. This practice is referred to as: | Localization.

Many companies use intermediaries or trading assistants instead of implementing e-auctions themselves for each of the following reasons EXCEPT: | To avoid tax and legal fees.

Many experts believe that the next major step in the evolution of computing will be _______ in which almost every object will have processing power and a wired or wireless connection to a
network. | Pervasive computing

Many insurance companies use a dual strategy, keeping human agents but also selling online. | TRUE

Many of the outcomes from the first two phases of the strategic planning process, such as a determination of goals, competitor analysis, strategic opportunities, and risk analysis come together in
a __. | Business plan

Mark is purchasing crude oil through an online system. This is an example of strategic sourcing. | False

Mark is using an intelligent agent to help him determine which CD to purchase. What type of agent is he using? | Product brokering

Market liquidity refers to the degree to which a product or service can be bought or sold in a marketplace without significantly affecting its price. | T

Market segmentation | The process of dividing a consumer market into logical groups for conducting marketing research and analyzing personal information.

Market segmentation increases the size of the group you are selling to. | False

Marketing and advertising approaches has evolved from mass marketing to market segmentation to one-to-one marketing. This evolution occurred because: | The Internet enabled companies to
better communicate with customers and understand their needs and buying habits.

Marketing done online between any seller and buyer is indirect marketing. | FALSE

Marketing that takes place without the help of intermediaries is called: | Direct marketing.

Markets in which several large sellers sell to a large number of buyers are called: | Seller-concentrated markets.

Markets that deal with one industry or industry segment are: | Vertical marketplaces.

Markets that focus on providing materials or products that are used in various types of industries are known as horizontal marketplaces. | T

Marketspace | A marketplace in which sellers and buyers exchange goods and services for money (or for other goods and services), but do so electronically.

Marketspaces are defined by their physical locations. | False

Mark's company helps several buyers and sellers meet and conduct business online. What type of model is he using? | Many-to-many marketplace

Mass customization | A method that enables manufacturers to create specific products for each customer based on the customer’s exact needs.

Mass marketing is an approach to marketing that treats each customer in a unique way such as fitting advertising to the customer’s profile and needs. | F

Maverick buying | Unplanned purchases of items needed quickly, often at non-pre-negotiated higher prices.

McAfee allows users of its VirusScan virus-detection software to automatically update the latest security patches online. This is an example of _______ to attract customers who value this
automatic update. | Product or service differentiation.

M-commerce allows for localization of services by knowing exactly where a user might be located. | True

M-commerce is also known as m-business. | True


M-commerce transactions and activities require _______ and __. | Hardware and software infrastructures; infrastructure support

Means that the communication and collaboration are done in real time. | Synchronous

Measures the time required to complete an operation such as downloading a Web page. It is an indicator of the user’s experience with the system. | Latency

Membership in the exchange should be inclusive and allow a variety of businesses to take part. Which of the five critical success factors identified by Ramsdell is being described? | Openness

Merchant brokering | Deciding from whom (from what merchant) to buy products.

Merchant brokering agents help users decide which product to purchase. | False

Merchant server software commonly includes the following features EXCEPT | Order management that optimizes movement of products through the supply chain.

Merchants can study and find out what customers want through | Market research.

Message digest (MD) | A summary of a message, converted into a string of digits after the hash has been applied.

Metadata | Data about data, including software programs about data, rules for organizing data, and data summaries.

Metadata can be examined in MS-Access in: | Design View

Methodology and software that enable organizations to perform a variety of activities involved in Web advertising, such as tracking viewers and rotating ads is known as | Ad management.

Metric | A specific, measurable standard against which actual performance is compared.

Metrics are used to describe each of the following EXCEPT: | Standards.

Microblogging | A form of blogging that allows users to write messages (usually up to 140 characters) and publish them, either to be viewed by anyone or by a restricted group that can
be chosen by the user. These messages can be submitted by a variety of means, including text messaging, instant messaging, e-mail, MP3, or just on the Web.

Microfinance | Refers to the provision of financial services to poor or low-income clients, including consumers and the self-employed.

Micropayments are electronic payments: | c. That are less than $10.00.

Micropayments are generally under: _____ . | $10

Microsoft built its internal marketplace, named for the procurement of small items. | MS Market

Middleware provides all of the following functions or features EXCEPT: | Integrates large systems with one or more back-end databases

Mike's business plan calls for him to coordinate several businesses together in one exchange. Together, he hopes that this group of businesses will receive better pricing from the big vendors.
What type of model is Mike using? | Buyer aggregation

Mobile access supports the two functions of sales force mobilization and field service, which extends the reach of to both employees and business partners on a 24/7 basis to any place where
recipients are located. | Customer relationship management

Mobile access supports the two functions of sales force mobilization and field service, which extends the reach of _____ to both employees and business partners on a 24/7 basis to any place
where recipients are located. | Customer relationship management

Mobile advertising (m-advertising) | Ads sent to and presented on mobile devices.

Mobile business applications can be used to support employees through Internet-based and non-Internet-based applications. | True

Mobile commerce (m-commerce or m-business) | Any business activity conducted over a wireless telecommunications network or from mobile devices.

Mobile commerce is any EC done in a wireless environment. | True

Mobile commerce refers to transactions made using wireless devices. | True


Mobile devices can be used to pay for items from a vending machine using a micropayments system. | True

Mobile entertainment | Any type of leisure activity that utilizes wireless telecommunication networks, interacts with service providers, and incurs a cost upon usage.

Mobile government (m-government) | The wireless implementation of e-government mostly to citizens but also to businesses.

Mobile portal | A portal accessible via a mobile device.

Mobile social networking | Members converse and connect with one another using cell phones or other mobile devices.

Mobile worker | Any employee who is away from his or her primary workspace at least 10 hours a week or 25 percent of the time.

More and more people are willing to pay for digital music, as shown by the success of __ | Apple’s iTunes

Morgan has an e-card that he uses to access different parts of his company's R&D offices. What type of smart card is he using? | Smart card

Most EC applications are based on _____ that begin with an order, frequently a __ order. | Pull operations; customized

Most of the social-networking sites expect to earn revenue from: | Transaction Fees

Most online travel agents do not offer real travel bargains. | True

Most selling-oriented consortia are horizontal. | False

Most social networks, such as LinkedIn and Weibo, are private communities. | FALSE

Most universities use e-learning: | d. As a supplementary channel to traditional classrooms.

Most US companies have an intranet. | True

Most WLANs run on a telecommunications standard known as ______, which is more commonly called __. | IEEE 802.11; Wi-Fi

MRO stands for maintenance, repair, and operation which refer to indirect or nonproduction materials that support the production process. | T

MSN or Yahoo! are types of exchanges that generate revenue through membership fees. | F

Multichannel business model | A business model where a company sells in multiple marketing channels simultaneously (e.g., both physical and online stores).

Multimedia messaging service (MMS) | The emerging generation of wireless messaging; MMS is able to deliver rich media.

Myspace is an example of a B2B site. | False

N
Name-your-own-price model | Auction model in which a would-be buyer specifies the price (and other terms) he or she is willing to pay to any willing and able seller. It is a C2B model
that was pioneered by Priceline.com.

Negotiation agents are most commonly used in a B2B setting. | True

Negotiation and bargaining are two types of auctions where prices are not fixed, but rather are allowed to fluctuate as market supply and demand change. | F

Net-a-Porter buying merchandise from its designers is an example of B2B commerce. | True

Netflix implemented intelligent agents in its movie recommendation service called Cinematch to help customers select movies they would like to watch and to better manage its inventory. | T

Network infrastructures include cell phones and other electronic devices that are located in various locations by telecommunications networks, including wireless ones. | True

Network-based positioning | Relies on base stations to find the location of a mobile device sending a signal or sensed by the network.
Networked computing connects multiple computers and other electronic devices that are located in various locations by telecommunications networks, including wireless ones. | True

Neutrality among members and groups is vital for the management of an exchange. | True

No two (row/column) entries can have the same value | row

Nonproduction materials such as equipment and tools that support production are called: | indirect materials

Nonproduction materials, such as office supplies, that support production are called: | indirect materials.

Nonrepudiation | Assurance that online customers or trading partners cannot falsely deny (repudiate) their purchase or transaction.

Normal form | one category in a set of categories used to describe relations according to the type of anomalies that can occur in the relations

Not all EC investments need to be formally justified. All of the following are cases where formal evaluation may not be needed EXCEPT: | When competitors have made that type of
investment

O
Observing members are not generally allowed to trade in exchanges. | True

Occurs when 13213 eliminates a distributor or a retailer. | Disintermediation

Offer two-way video, on-the-fly interaction, and application sharing. Such systems provide for interactive remote instruction systems, which link sites over a high-speed intranet. | E-learning
systems

Offering quality merchandise at good prices, coupled with excellent service, and cross-channel coordination and integration in which customers can almost seamlessly operate between the online
and physical environments of a business are also important elements in successful e-tailing. | T

Offers one of the most popular storefront packages at with three levels of merchant solutions: starter, standard, and professional | Yahoo!

Offline transactions are somewhat influenced by research conducted online, with approximately one-third of online shoppers reporting that they used the Internet to research and influence their
offline shopping choices. | F

Old economy processes will be broken into specialized segments that can be delivered by specialized intermediaries. | Unbundling

On a(n) ____ architecture, the server does most of the work. | d. Thin client

Once a company knows a consumer's preferences, the company can predict, without asking the consumer directly, what other products or services that consumer might enjoy through |
Collaborative filtering

On-demand CRM | CRM hosted by an ASP or other vendor on the vendor's premise; in contrast to the traditional practice of buying the software and using it on-premise.

On-demand delivery service | Express delivery made fairly quickly after an online order is received.

On-demand delivery services usually rely on third party shipping agents (like UPS). | False

One basic way to categorize different EC investments is to distinguish between investments in infrastructure and investment in specific EC applications because benefits from infrastructure
investments: | Are made for the long-term.

One company sells to many business buyers from e-catalogs or auctions, usually over an extranet. | Sell-side e-marketplace

One initiative underway that could lead to widespread support for the introduction of RFID | d. Electronic Product Code

One initiative underway that could lead to widespread support for the introduction of RFID is the __, which identifies the manufacturer, producer, version, and serial number of each item and
does not require line-of-sight contact to be read. | Electronic Product Code

One major characteristic of all exchanges is that they are electronic trading-community meeting places for a single seller and many buyers, and possibly for other business partners. | F
One of the facilitators of e-learning is __ technologies, such as blogs and wikis. | Web 2.0

One of the factors that has led to the failure of initial B2B exchanges was the failure of these marketplaces to foster a broad-based sharing of | Information

One of the factors that influence the success of a B2B exchange is __, which provides the rules for the exchange, minimizes conflicts, and supports decision making. | Governance

One of the first decisions to be made in building a Web site is: | Who will host it

One of the keys to building effective customer relationships is an understanding of intelligent agents. | FALSE

One of the major benefits of e-markets is the improvement in supply chains with the creation of a(n) __. | Hub-based chain

One of the major challenges of one-to-one advertising is __, or the flooding of users with junk e-mail, banners, and pop-ups. | Spamming

One of the major phenomena of Web 2.0 is the emergence and rise of e-auctions. | FALSE

One of the major problems facing direct sellers is __. | How to find buyers

One of the most important issues in implementing e-government is: | Its adoption and usage by citizens.

One of the most significant differences between Web 2.0 and the traditional Web is the greater collaboration among Internet users and other users, content providers, and enterprises. | TRUE

One of the strengths of EC is the ease with which its adopters can reach a global population of consumers. However, EC-driven businesses must consider the critical elements affecting the value
of EC across cultures. Those elements include all of the following EXCEPT | Delivery delays

One problem with the Address Verification System (AVS) for fraud prevention is the number of false positives, meaning that the merchant rejects a valid order. | True

One problem with Web analytics, Web mining, and clickstream data is that we observe and follow a computer, not knowing who is actually moving the mouse. | True

One unique item is offered. The price starts high until someone bids and becomes the winner. What type of auction is being described? | Quickwin auction

One way to share information with supply chain partners is wireless ___, which is the science of measuring physical phenomena such as temperature, volume, or an on/off condition at a remote
point and transmitting the value to a distant recorder or observer. | Telemetry

Online analytical processing (OLAP) | End-user analytical activities, such as DSS modeling using spreadsheets and graphics, that are done online.

Online auctions are a good example of customer-to-customer (C2C) EC. | True

Online banking is purely an expense for banks, it offers no advantage other than to retain current customers. | False

Online delivery of information for purposes of education is L-Commerce. | False

Online group purchasing organizations are known as: | E-co-ops

Online intermediary | An online third party that brokers a transaction online between a buyer and a seller; may be virtual or click-and-mortar.

Online market research is generally less expensive than traditional market research. | True

Online markets owned and operated by a single company and may be either sell-side or buy-side. | Private e-marketplaces

Online methods of bringing new customers to a B2B site when a B2B vendor wants to grow by adding new customers or products include all of the following EXCEPT: | Through direct mail
campaigns.

Online negotiation can be facilitated by computer technology for the negotiation process and software agents for searches and comparisons. | T

Online publishing only seeks to digitize materials that have traditionally been available in print. | False

Online trading and investing in stocks is one of the fastest growing areas of EC. | True
Online travel services have high margins because of their multiple revenue models including commissions, revenue from advertising, lead-generation payments, consultancy fees, subscription or
membership fees, and revenue-sharing fees. | F

Operational data store | A database for use in transaction processing (operational) systems that uses data warehouse concepts to provide clean data.

Opt-in | Agreement that requires computer users to take specific steps to allow the collection of personal information.

Options for acquiring storefronts include all of the following EXCEPT: | Join a mall

Opt-out | Business practice that gives consumers the opportunity to refuse sharing information about themselves.

Ordering using EC benefits buyers, but not sellers. | False

More and more people are willing to pay for digital music, as shown by the success of __ | Apple’s iTunes

Organizations are embracing mobilized computing technologies for several reasons EXCEPT: | Wireless security problems have been solved with encryption.

Most WLANs run on a telecommunications standard known as ______, which is more commonly called __ | IEEE 802.11; Wi-Fi

Outsourcing | A method of transferring the management and/or day-to-day execution of an entire business function to a third-party service provider.

Outsourcing options for creating and operating EC applications include: | All of the above.

P
P2P systems have all of the following key characteristics EXCEPT: | The overall system is well integrated, but lacks tools for easy creation of content or for adding functionalities.

P2P systems primarily allow business to share media with customers. | False

Packet | Segment of data sent from one computer to another on a network.

Packing, delivery, accounting and logistics are examples of: | c. Back-office operations.

Page | An HTML (Hypertext Markup Language) document that may contain text, images, and other online elements, such as Java applets and multimedia files. It can be generated
statically or dynamically.

Partner relationship management (PRM) | Business strategy that focuses on providing comprehensive quality service to business partners.

Patent | A document that grants the holder exclusive rights to an invention for a fixed number of years.

Paying a yearly fee to access Salon.com's articles is an example of a subscription business model. | True

Payment card | Electronic card that contains information that can be used for payment purposes.

Payment service provider (PSP) | A third-party service connecting a merchant’s EC system to the appropriate acquiring bank or financial institution. PSPs must be registered with the
various card associations they support.

Peer-to-peer (P2P) technology can be used in C2C, B2B, and B2C. | True

Penetration test (pen test) | A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source, (e.g., a cracker).

Perhaps a potential customer’s most common path to a previously unknown website is through a(n) ____ | a. Search engine

Permission advertising (permission marketing) | Advertising (marketing) strategy in which customers agree to accept advertising and marketing materials (known as opt-in).

Personal area network (PAN) | A wireless telecommunications network for device-to-device connections within a very short range.

Personal characteristics of customers, such as age and income, are independent variables, which are uncontrollable variables for EC companies. | T
Personal digital assistant (PDA) | A stand-alone handheld computer principally used for personal information management.

Personal firewall | A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s
network interface card.

Personalization | The tailoring of services, products, and advertising content with individual consumers and their specific preferences.

Personalization and user profiling strategies include each of the following EXCEPT: | Segmenting the market based on demographics.

Personalization matches services, products, and advertising content with large groups of customer segments. | FALSE

Personalized content | Web content that matches the needs and expectations of the individual visitor.

Person-to-person lending | Lending done between individuals circumventing the bank’s traditional role in this process.

Perspectives about Web 2.0 include all of the following EXCEPT | Web 2.0 is organized around pages, software, technology, individuals, and corporations.

Phishing | A crimeware technique to steal the identity of a target company to get the identities of its customers.

Phishing is rampant because some people respond to it and make it profitable. | True

Plaintext | An unencrypted message in human-readable form.

Platform for Privacy Preferences Project (P3P) | A protocol allowing Web sites to declare their intended use of information they collect about browsing users.

PLM focuses on managing a product over time. | True

Political and government is an example of a societal business pressure. Answer: | False

Popular search engines include all of the following EXCEPT: | c. Altavista

Popular search engines include each of the following except: | .Linux.

Pop-up ad | An ad that appears in a separate window before, after, or during Internet surfing or when reading e-mail.

Pop-up under ad | An ad that appears underneath the current browser window, so when the user closes the active window the ad is still on the screen.

Portal ABC was designed for a company’s intranet. It has a broad amount of information designed for a narrow audience. What type of portal is being described? | Corporate portal

Portal ABC was designed for a large and diverse audience. It has little individual customization available. What type of portal is being described? | Publishing portal

Potential advantages of e-learning include each of the following EXCEPT: | College professors are anxious to develop new online courses.

Potential drawbacks of e-learning include each of the following EXCEPT: | Knowledge retention is lower than in traditional classrooms.

Potential uses for a corporate intranet can be best described as: | Robust, potential uses still being discovered.

Pouilly’s Poodle Shop wants to produce monthly cash flows from its Internet Doggie-Cam investment. The most appropriate method for assessing this investment is: | Internal rate of return
(IRR).

Preventing vulnerability during the EC design and pre-implementation stage is far more expensive than mitigating problems later. | False

Prevention measures | Ways to help stop unauthorized users (also known as intruders) from accessing any part of the EC system.

Prices, advertising, promotions, and logistics are intervening variables that can be controlled by vendors. | T

Pricing, technical support, and logistics support are several of the __ that can be controlled by EC vendors and sellers. | Intervening variables
Primary key | The candidate key selected to be the "official" key of a relationship

Privacy | The right to be left alone and free of unreasonable personal intrusions.

Private key | Encryption code that is known only to its owner.

Private online communities that are only open to those who belong to them are called: | Darknets

Procter & Gamble (P&G) used the Internet in the new product development of Whitestrips, a teeth-brightening product. Based on this experience, P&G: | Reduced the time-to-market from
concept to market launch by approximately two years.

Procurement | The process made up of a range of activities by which an organization obtains or gains access to the resources (materials, skills, capabilities, facilities) it requires to
undertake its core business activities.

Procurement management | The planning, organizing, and coordinating of all the activities related to purchasing goods and services needed to accomplish the organization’s mission.

Product brokering | Deciding what product to buy.

Productivity benefits from using EC are difficult to measure because: | EC gains in certain areas of the company may be offset by losses in other areas.

Project management is the process of making the selected applications and projects a reality, including hiring staff; purchasing equipment; and licensing, purchasing, or writing software. | True

Projections of the business technological, political, economic, and other environments are called: | Forecasts

Property rights relevant to e-commerce include all of the following EXCEPT: | The right to bring criminal charges against a violator

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction best defines: | Information
security

Protocol tunneling | Method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets, sending them in packets across the Internet,
and decrypting them at the destination address.

Provide connectivity among merchants, customers, and financial networks enabling authorization and payments is called the: | Payment processing services

Psychographic segmentation involves dividing customers based on where they live. | False

Public (asymmetric) key encryption | Method of encryption that uses a pair of matched keys — a public key to encrypt a message and a private key to decrypt it, or vice versa.

Public e-marketplaces | Third-party exchanges open to all interested parties (sellers and buyers).

Public e-marketspaces are | All of the above.

Public exchanges are many-to-many marketplaces that are open to all interested sellers and buyers and usually run by third parties. | T

Public key | Encryption code that is publicly available to anyone.

Public key infrastructure (PKI) | A scheme for securing e-payments using public key encryption and various technical components.

Public key infrastructure (PKI) is an authentication method | a. That has become the cornerstone for secure e-payments and intranet applications.

Purchases by governments, private corporations, resellers, and other organizational buyers often are used to create other products or services by adding value to them. | T

Purchases of goods and services based on long-term contracts is referred to as: | Strategic sourcing

Purchases of goods or services that are based on short-term contracts and frequently purchased in large quantities are known as strategic sourcing. | F

Purchasing a computer from dell.com is an example of B2B commerce. | False

Purchasing a computer from Dell's Web site is partial EC because the merchandise is physically delivered. | True
Purchasing a Dell computer online for use at home is an example of e-tailing. | True

Purchasing new computers or technologies generally leads to a competitive advantage for a company. | b. False

Purchasing-oriented (procurement) consortia have not yet been a successful or popular B2B consortium model. | F

Purely physical companies are referred to as ______ companies, whereas companies that are engaged only in EC are considered ____ companies. | Brick-and-mortar; virtual

Pure-play organizations are old-economy organizations that perform their primary business offline, selling physical products by means of physical agents. | False

R
Random banners | Banner ads that appear at random, not as the result of the user’s action.

Rapid technological obsolescence is an example of a technological business pressure. | True

Real transformation of government structure takes place in what stage of implementation? | Clustering of services

Real-time location system (RTLS) | Systems used to track and identify the location of objects in real time.

Recognizes that ____ are the core of a business and that a company’s success depends on effectively managing its relationships with them. | Customer relationship management; customers

Records user activities at a company’s Web site. | Transaction log

Referencing the licensing fees revenue model, a company receives commissions for referring customers to others' websites. | False

Referential integrity constraint | A constraint on a foreign key that states that no value can be placed in the foreign key unless it already exists as a primary key value in the linked table.

Referral economy | The effect upon sales of consumers receiving a referral or recommendation from other consumers.

Refers to a broad range of business activities that includes not just the buying and selling of goods and services, but also servicing customers, collaborating with business partners, and conducting
electronic transactions within an organization. | E-business

Refers to a customer’s loyalty to an e-tailer or a manufacturer that sells directly online or to loyalty programs delivered online or supported electronically. | E-loyalty

Refers to a single company’s Web site where products and services are sold. | Storefront

Refers to any situation in which direct competition and/or damage caused by bypassing a former existing channel partner is perceived to have resulted from the introduction of a new, often
online, channel. | Channel conflict

Refers to communication systems that transmit voice calls over Internet-Protocol-based networks. | Voice-over-IP (VoIP)

Refers to erratic shifts in orders up and down supply chains. | Bullwhip effect

Refers to M-commerce transactions targeted to individuals in specific locations, at specific times. | Location-based commerce (L-commerce)

Refers to prices that are not fixed, but that are allowed to fluctuate as supply and demand in a market change. | Dynamic pricing

Refers to the benefits, including the intangible, nonquantitative ones, that a company can derive from using EC. | Value proposition

Refers to the conduct of e-commerce via wireless devices or from portable devices. | Mobile commerce

Refers to the integration of computers and wireless communications in order to improve information flow. | Telematics

Refers to the matching of services, products, and advertising content to individuals and their preferences. | Personalization

Refers to the planning, organizing, and coordination of all the management activities pertaining to the purchasing of goods and services needed to accomplish the mission of an enterprise. |
Procurement management
Refers to the practice of promoting a product or service to a subset of customers or prospects. | Market segmentation

Refers to the process and tools that enable any activity in the sourcing process to be done electronically, including identifying new suppliers for a specific category of purchasing requirements. |
E-sourcing

Refers to the rapid movement of prices over time and possibly across customers, as a result of supply and demand matching. | Dynamic pricing

Refers to the removal of organizations or business process layers responsible for certain intermediary steps in a given supply chain. | Disintermediation

Refers to the second-generation of Internet-based services that let people collaborate and share information online in new ways, such as social networks and wikis. | Web 2.0

Refers to the use of data mining techniques for discovering and extracting information from Web documents. | Web mining

Refers to the use of digital technologies that enable companies to collaboratively plan, design, develop, manage, and research products, services, and innovative EC applications. | Collaborative
commerce

Refers to transactions between businesses conducted electronically over the Internet, extranets, intranets, or private networks. | Business-to-business e-commerce (or B2B)

Refers to various banking activities conducted from home or the road using an Internet connection. | Electronic (online) banking

Regulatory compliance | Systems or departments in an organization whose job is to ensure that personnel are aware of and take steps to comply with relevant laws, standards, policies,
and regulations.

Reintermediation | The process whereby intermediaries (either new ones or those that had been disintermediated) take on new intermediary roles.

Relation | A table-like structure of rows and columns; each column has a unique name, all values in a column are for the same attribute, cells only hold single values, order of rows or
columns doesn't matter, and each row as a whole must be unique.

Reprise Electronics... This is an example of adding: | A portal

Request for proposal (RFP) | Notice sent to potential vendors inviting them to submit a proposal describing their software package and how it would meet the company’s needs.

Request for quote (RFQ) | The invitation to participate in a tendering (bidding) system.

Research has shown that e-commerce sites that use an auction model tend to: | a. Reach critical mass more quickly than catalog-order-based.

Researchers believe that the use of technology to facilitate collaboration among trading partners will help the expansion of the exchanges. | Wireless

Responses to environmental pressures may include activities that exploit opportunities created by changing conditions. | True

Retailers make their suppliers responsible for determining when to order and how much to order. The retailer provides the supplier with real-time information, inventory levels, and a threshold
below which orders are replenished. | Vendor-managed inventory

Retailers stand to benefit from online communities in several important ways EXCEPT | Viral marketing will be replaced by free advertising

Retailers who sell over the Internet are called | E-tailers

Retailing conducted over the Internet is called | Electronic retailing

Reusability | The likelihood a segment of source code can be used again to add new functionalities with slight or no modification.

Reverse auction (bidding or tendering system) | Auction in which the buyer places an item for bid (tender) on a request for quote (RFQ) system, potential suppliers bid on the job, with
the price reducing sequentially, and the lowest bid wins; primarily a B2B or G2B mechanism.

Reverse auctions are a type of __ auctions. | One buyer, many potential sellers

Reverse auctions are bidding or tendering systems in which the buyer places an item for bid on a request for quote system; then potential suppliers bid on the job, with the price reducing
sequentially, and the lowest bid wins. | True
Reverse auctions did not exist before being created on the Internet. | True

Reviews, testimonials, expert advice, or further explanation about the product are called: | Cross-selling

RFID can provide immediate, short-term, and long-term value to organizations. An example of immediate value from RFID is when: | An RFID tag tells inventory control every time a roll of
wire moves out of the warehouse and onto the factory floor

RFID tags are very expensive. | False

Rick purchased and downloaded a new firewall software suite online. After installing the suite, he finds that he is unable to connect with the Internet so he visits the FAQ for the software to look
for solutions to the problem. This is an example of the | Product support function

Rick sends a message from a delayed flight to his friend on her cell phone that he will be arriving late. The service that allows the sending and receiving of such short text messages on mobile
phones is called: | SMS

Risk | The probability that a vulnerability will be known and used

Risks in corporate blogging include all of the following EXCEPT: | The risk of disciplinary action against abusive bloggers

Rite Aid, a click-and-mortar firm, enhanced its EC future by: | Buying an equity stake in an existing EC company

Rivalry among existing competitors is one of Porter's five forces. | True

ROI calculator | Calculator that uses metrics and formulas to compute ROI

RUBEE is meant to replace RFID | False

Rubee relies on low-frequency magnetic waves to track products and transfer information. It is becoming a replacement for RFID because Rubee overcomes many of RFID’s limitations. | F

S
Sales force automation (SFA) | Software that automates the tasks performed by salespeople in the field, such as data collection and its transmission

Sales model | 1400712659179

Scalability | How big a system can grow in various dimensions to provide more service; measured by total number of users, number of simultaneous users, or transaction volume

Scenario planning | A strategic planning methodology that generates plausible alternative futures to help decision makers identify actions that can be taken today to ensure success in
the future

SCM aims to minimize inventory levels, optimize production and increase throughput, decrease manufacturing time, optimize logistics and distribution, streamline order fulfillment, and overall
reduce the costs associated with these activities. | True

S-commerce refers to electronic commerce activities conducted on Facebook or influenced by the site | False

Search engine | A computer program that can access databases of Internet resources, search for specific information or key words, and report the results

Search engine optimization (SEO) | The craft of increasing site rank on search engines; the optimizer uses the ranking algorithm of the search engine (which may be different for different search
engines) and best search phases, and tailors the ad accordingly.

Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine's unpaid results - often referred to as "natural," "organic," or "earned"
results. In general, the earlier (or higher ranked on the search results page), and more frequently a site appears in the search results list, the more visitors it will receive from the search engine's
users. Which of the following category SEO is belonged to? | Marketing and advertising

Search engine spam | Pages created deliberately to trick the search engine into offering inappropriate, redundant, or poor-quality search results

Search engines not only search and match, but also have capabilities that can be used to perform routine tasks that require intelligence. | False

Search tools that search the contents of a user's or organization's computer files, rather than searching the Internet are | Desktop search tools
Sears marketing strategy would best be described as: | A click-and-mortar strategy

Secondary content that offers a coupon, rebate, or special service is called: | Promotion

Section 5 of the FTC Act does each of the following EXCEPT: | Requires monitoring of employees e-mail

Secure Socket Layer (SSL) | Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality

Secure Socket Layer (SSL), which is also known as Transport Layer Security (TLS): | Is one of the major generally accepted protocols for securing e-commerce used by Microsoft and
Netscape

Security functions or characteristics of digital signatures include each of the following except: | A digital signature is the electronic equivalent of a personal signature, which can be forged

See the figure and choose the right options to fill in blank A and B | A is Infrastructures and B is Support services

Segmentation refers to the matching of services, products, and advertising content to individuals and their preferences. | False

Select the correct answer from the choices below to fill in blank. Click in to figure to see the blank | Customize

Select the correct answer from the choices below which is corresponding with the following statement in STRATEGIC PLANNING TOOLS: It is a methodology that surveys external
opportunities and threats and relates them to internal strengths and weaknesses. | SWOT analysis

Select the correct definition of "Spot buying" term from the choices below | Is the purchase of goods and services as they are needed, usually at prevailing market prices

Self-hosting | When a business acquires the hardware, software, staff, and dedicated telecommunications services necessary to set up and manage its own Web site

Selling and buying electronically can be either business-to-consumer or business-to-business. | True

Selling as many products as possible to one customer over a long period of time and across different product lines to maximize customer value is known as relationship marketing. | True

Selling products/services online is called: | Viral Marketing

Sell-side e-marketplace | A Web-based marketplace in which one company sells to many business buyers from e-catalogs or auctions, frequently over an extranet

Semantic Web | An evolving extension of the Web in which Web content can be expressed not only in natural language, but also in a form that can be understood, interpreted, and used
by intelligent computer software agents, permitting them to find, share, and integrate information more easily

Sending a large number of messages to a server that is unable to handle it. What type of attack is described? | Denial of service (DOS)

Sending a piece of code that replicates and sends itself to everyone in your address book. What type of attack is described? | Worm

Sending spam that disguises a sales pitch to look like a personal e-mail so that it will bypass e-mail spam filters violates the | Controlling the Assault of nonsolicited Pornography and
Marketing (CAN-SPAM) Act

Separating a company’s online operations into a new company makes sense in each of the following situations EXCEPT: | When the company is unable to form new alliances, attract new
talent, or raise additional funding

Service-level agreement (SLA) | A formal agreement regarding the division of work between a company and a vendor

Settlement | Transferring money from the buyer’s to the merchant’s account

Several businesses create a single online catalog for their customers. This is an example of: | Catalog aggregation

Several identical items are offered with a minimum bid. The winners pay the same lowest price. What type of auction is being described? | Dutch auction

Shopbots are tools that rate businesses based on multiple criteria. | False

Shoppers can rely on fraud protection provided by credit card issuers to protect them from identity theft. | False
Shopping carts for B2B are fairly simple, but a shopping cart for B2C may be more complex. | False

Shopping portals | Gateways to e-storefronts and e-malls; may be comprehensive or niche oriented

Shopping robots (shopping agents or shopbots) | Tools that scout the Web on behalf of consumers who specify search criteria

Short message service (SMS) | A service that supports the sending and receiving of short text messages on mobile phones

Since 2001, no other company has had more of an impact on EC than | Google

Since business-to-consumer (B2C) transactions are segments in the supply chain, they should be examined in light of other supply chain activities such as manufacturing, procurement,
shipments, and logistics. | False

Site navigation | Aids that help visitors find the information they need quickly and easily

Slow connections to WAP sites are a limitation of m-commerce. | True

Smart card | An electronic card containing an embedded microchip that enables predefined operations or the addition, deletion, or manipulation of information on the card

Smart card operating system | Special system that handles file management, security, input/output (I/O), and command execution and provides an application programming interface
(API) for a smart card

Smart card reader | Activates and reads the contents of the chip on a smart card, usually passing the information on to a host system

Smart phone | A mobile phone with PC-like capabilities

Social bookmarking | Web service for sharing Internet bookmarks. The sites are a popular way to store, classify, share, and search links through the practice of folksonomy techniques
on the Internet and intranets

Social capital | A sociological concept that refers to connections within and between social networks. The core idea is that social networks have value. Just as physical capital or human
capital can increase productivity (both individual and collective), so can social contacts affect the productivity of individuals and groups

Social class, lifestyle, personality, and activities are descriptors used in market segmentation. | Psychographic

Social computing | An approach aimed at making the human-computer interface more natural

Social engineering | A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network

Social engineering attacks are: | Take advantage of Web 2.0 applications like social networking sites, blogs, wikis and RSS feeds

Social engineering is an example of an unintentional threat. | False

Social factors such as customer endorsement strategies and word-of-mouth are independent variables that play an important role in EC shopping and purchases. | True

Social marketing | A combination of social policy and marketing practices to achieve a set of social behavioral goals within a target audience

Social marketplace | The term is derived from the combination of social networking and marketplace. An online community that harnesses the power of one's social networks for the
introduction, buying, and selling of products, services, and resources, including one's own creations. Also may refer to a structure that resembles a social network but is focused on
individual members.

Social media | The online platforms and tools that people use to share opinions, experiences, insights, perceptions, and various media, including photos, videos, and music, with each
other

Social media is limited to text and images. | False

Social media marketing | A term that describes use of social media platforms such as networks, online communities, blogs, wikis, or any other online collaborative media for marketing,
market research, sales, CRM, and customer service.
Social network | A category of Internet applications that help connect friends, business partners, or individuals with specific interests by providing free services such as photo
presentation, e-mail, blogging, and so on using a variety of tools.

Social network advertising | Online advertising that focuses on social networking sites.

Social network analysis (SNA) | The mapping and measuring of relationships and information flows among people, groups, organizations, computers, and other information- or
knowledge-processing entities. The nodes in the network are the people and groups, whereas the links show relationships or flows between the nodes. SNAs provide both visual and a
quantitative analysis of relationships.

Social network analysis provides both a visual and a mathematical analysis of relationships where the nodes in the network are the people or groups, and the links show relationships between
nodes. | True

Social network service (SNS) | A service that builds online communities by providing an online space for people to build free homepages and that provides basic communication and
support tools for conducting different activities in the social network.

Social networking | Social networks and activities conducted in social networks. It also includes activities conducted using Web 2.0 (e.g., wikis, microblogs) not within social networks.

Social networking is the execution of any Web 2.0 activity, such as blogging and/or having a presence in a social network. | True

Social networks connect people with specific interests. | True

Social networks, such as Facebook, YouTube, and MySpace, are Web sites that connect people with specific interests by providing free services such as photo sharing, e-mail, and blogging. |
True

Software applications for the administration, documentation, tracking, and reporting of training programs, classroom and online events, e-learning programs and training content best describes: |
Learning management systems.

Software applications that address project management concerns are examples of: | Collaborations workflow applications.

Software that gathers user information over an Internet connection without the users knowledge is known as | Spyware.

Software that helps integrate different types of information systems among collaborating companies is called: | Middleware.

Software tools that scout the Web for stores that sell similar items at low prices are called: | Shopbots.

Software tools that scout the Web on behalf of consumers who specify search criteria are | Shopping robots

Solutions to problems in the supply chain for EC companies are: | Generic across both EC and traditional companies.

Some of the benefits of a(n) _____ are that distributors can check inventory, make transactions, and look up the status of their orders, significantly reducing the number of phone calls, e-mails,
and incorrect product shipments. | Extranet-based order-entry tool

Some Web sites allow buyers to purchase travel at a deep discount if it is purchased at the last minute. | True

Someone being influenced by friends is an example of a social environment variable. | True

Spam | The electronic equivalent of junk mail.

Spam site | Page that uses techniques that deliberately subvert a search engine's algorithms to artificially inflate the page's rankings.

Spamming | Using e-mail to send unwanted ads (sometimes floods of ads).

Specialized businesses operate in a very narrow market and would find it difficult to survive in the physical world because they would not have enough customers or could not hold the variety of
stock. | True

Specialized firms that offer customized Web advertising, such as brokering ads and targeting ads to select groups of consumers are known as | Advertising networks.

Splog | Short for spam blog. A site created solely for marketing purposes.
Spot buying | The purchase of goods and services as they are needed, usually at prevailing market prices.

Spot sourcing of direct materials takes place: | In vertical exchanges.

Spyware | Software that gathers user information over an Internet connection without the user's knowledge.

Spyware is tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server. | False

SRM systems manage shipping of products. | False

Standard of due care | Care that a company is reasonably expected to take based on the risks affecting its EC business and online transactions.

Stickiness | Characteristic that influences the average length of time a visitor stays in a site.

Storebuilder service | A hosting service that provides disk space and services to help small and microbusinesses build a Web site quickly and cheaply.

Stored-value card | A card that has monetary value loaded onto it and that is usually rechargeable.

Storefronts, malls, and portals are EC mechanisms that support the entertainment EC activity. | False

Strategic (systematic) sourcing | Purchases involving long-term contracts that usually are based on private negotiations between sellers and buyers.

Strategic planning is used to direct a company’s long term goals. The process is a cycle of assessment, initiation, formulation, and implementation. | True

Strategic sourcing refers to purchases involving long-term contracts that usually are based on private negotiations between sellers and buyers. | True

Strategic sourcing requires a holistic process that automates the entire sourcing process, including order planning, RFQ creation, bid evaluation, negotiation, settlement, and order execution. |
True

Strategy | A broad-based formula for how a business is going to accomplish its mission, what its goals should be, and what plans and policies will be needed to carry out those goals.

Strategy assessment | The continuous evaluation of progress toward the organization's strategic goals, resulting in corrective action and, if necessary, strategy reformulation.

Strategy formulation | The development of strategies to exploit opportunities and manage threats in the business environment in light of corporate strengths and weaknesses.

Strategy implementation | The development of detailed, short-term plans for carrying out the projects agreed on in strategy formulation.

Strategy initiation | The initial phase of strategic planning in which the organization examines itself and its environment.

Strong competition and increased power of consumers are two of the major market pressures in today’s business environment. | True

Strong EC security makes online shopping more convenient for customers. | False

Studies have shown that electronic-based collaboration and product lifecycle management (PLM) can reduce product costs and travel expenses by 50 percent, as well as significantly reduce costs
associated with product-change management. | False

Subscription model | 1400712643513

Such as Amazon.com, are firms that sell directly to consumers over the Internet without maintaining a physical sales channel. | Pure-play e-tailers

Supplier relationship management (SRM) | A comprehensive approach to managing an enterprise's interactions with the organizations that supply the goods and services it uses.

Supply chain | The flow of materials, information, money, and services from raw material suppliers through factories and warehouses to the end customers.

Supply chain activities usually involve communication and collaboration. | True

Supply chain improvements and collaborative commerce are a basic type of B2B which has a hub manager for supply chain improvements, communicating, collaborating, and information
sharing. | True
Supply chain management (SCM) | A complex process that requires the coordination of many activities so that the shipment of goods and services from supplier right through to
customer is done efficiently and effectively for all parties concerned. SCM aims to minimize inventory levels, optimize production and increase throughput, decrease manufacturing
time, optimize logistics and distribution, streamline order fulfillment, and overall reduce the costs associated with these activities.

Supply chain management involves integrating the efforts of: | All of these.

Supply chain partners using Web-based systems to combine orders to decrease costs is an example of group purchasing. | True

Supply chain problems can cause delays, products not being where they are required at the right time, customer dissatisfaction, lost sales, and high expenses that result from fixing the problems
once they occur. | T

Suppose a relation describes students at a university including studentid, Name, and Major. What determines what? | studentid determines student major

Suppose we try to enter a grade in the grade table for a student that has not yet been entered in the Student table. This violates: | referential integrity

Surrogate key | a column of artificial data added to a relation to serve as the primary key

SWOT analysis | A methodology that surveys external opportunities and threats and relates them to internal strengths and weaknesses.

Symmetric (private) key encryption | An encryption system that uses the same key to encrypt and decrypt the message.

Syndicated content is Web content that matches the needs and expectations of the individual visitor. | False

Syndication | The sale of the same good (e.g., digital content) to many customers, who then integrate it with other offerings and resell it or give it away free.

T
Tag A | Nonhierarchical keyword or term assigned to a piece of information (such as an Internet bookmark, digital image, video clip, or any computer document).

Technologies and business practices that free the workforce from the constraints of legacy communication and productivity tools such as e-mail describes: | Enterprise 2.0.

Technologies in the Dreamliner aircraft to support maintenance activities. | RFID

Technology enables networked peer computers to share or swap data files, music, videos, software, and processing with each other directly. | Peer-to-peer (P2P)

Telematics is the integration of cell phones and GPS systems. | False

Tendering (bidding) system | Model in which a buyer requests would-be sellers to submit bids; the lowest bidder wins.

Terminal-based positioning | Calculating the location of a mobile device from signals sent by the device to base stations.

Terms that describe columns | Columns, attributes, fields

Terms that describe rows | Rows, tuples, records

Terms that describe table | Table, relation, file

Text mining | The application of data mining to nonstructured or less-structured text files.

That monitors traffic on a B2B exchange and takes appropriate actions when needed, such as sending an alert to management when traffic is too heavy or routing traffic to other places. |
Software agent

The “Name-your own-price” Model pioneered by Priceline.com is a type of _____ auction. | One buyer, many potential sellers

The _____ support area includes: sellers, buyers, intermediaries, information systems specialists, other employees | Public policy

The __ is an auction in which the buyer places an item for bid on a request for quote system, potential suppliers bid on the job, with the price reducing sequentially, and the lowest bid wins. |
Reverse auction
The __ is an auction model in which a would-be buyer specifies the price he or she is willing to pay to any willing and able seller. | Name-your-own-price model

The __ is the online B2C business model where a manufacturer sells to a business, but delivers to individual customers. | B2B2C

The _______ consists of a number of interrelated sub processes that extend from the acquisition of materials from suppliers to packaging it and moving it to distributors and retailers. | Supply
chain

The _______ pricing strategy means adding up all the costs involved, such as material, labor, rent, overhead, and so forth, and adding a percentage mark-up as profit. | Cost-plus

The __ is how Web pages are organized, labeled, and navigated to support browsing and searching | information architecture

The __ is the intrinsic unit of thought on the Web. | Hyperlink

The ______ give law enforcement agencies broader range in their efforts to protect the public | USA PATRIOT Act

The _______ is the name-based address that identifies an Internet-connected server | Domain name

The __ auction model is popular in B2B. | One-buyer, one-seller

The 3G standard does not yet support multimedia such as video clips. | False

The administrative activities of order taking and fulfillment involve all of the following activities EXCEPT: | Accounts payable

The advantages of virtual private networks (VPN) for data communications include all of the following EXCEPT: | They ensure the confidentiality and integrity of the data transmitted over
the Internet without requiring encryption.

The aggregation of orders from several buyers into volume purchases so that better prices can be negotiated. | Group purchasing

The aggregation of suppliers catalogs on the buyers server to make it easier to centralize and control all procurement is called a(n): | Internal procurement marketplace

The aim of market research is to discover marketing opportunities and issues, to establish marketing and advertising plans, to better understand the purchasing process, and to evaluate marketing
performance. | True

The amount and percentage of goods and services sold on the Internet is increasing rapidly, despite the failure of many dot-com companies. | True

The application logic in a handheld PDA, smartphone, Palm or Wintel notebook is called: | A mobile application user interface

The approach that seeks to make tapping into computing resources as simple as plugging in a lamp into an electrical outlet is called | Utility computing

The assurance that an online customer or trading partner cannot falsely deny their purchase or transaction is referred to as: | Nonrepudiation

The average-cost curve (AVC) of physical products and digital products: | Are different because the AVC of digital products declines as quantity increases forming a L-shape, while the
AVC of physical products is U-shaped.

The banking industry was a good candidate for disruption by person-to-person (P2P) technology and disintermediation by ZOPA because: | The industry was making a huge profit margin off
its customers.

The barrier to selling books online, either hardcopy or electronic, is technical and not financial. | False

The basic reasons that companies invest in IT and EC are all of the following EXCEPT: | To justify new marketing campaigns

The basic security concepts relating to customers and other users are: | Authentication, authorization, and nonrepudiation

The bidder details exactly what they are willing to pay. The seller accepts or rejects the price. What type of auction is being described? | Name-your-own-price auction

The business forces that are driving the transition from traditional education to online learning are all of the following EXCEPT: | Limited supply of faculty with specialized expertise

The central portal for an entire organization is called a(n): | enterprise portal
The Cisco Connection Online (CCO) Web site receives over 2 million hits per month for technical assistance, ordering, order checking, or software downloads. This online service had been so
well received that nearly ___ percent of all customer service inquiries and ___ percent of software updates are delivered online. | 85 / 95

The combination of the encrypted original message and the digital signature, using the recipient's public key, best describes: | digital envelope

The concept of consistency in Web site design includes: | making sure Web pages look the same no matter which browser a customer is using

The concept of liquidity for a B2B exchange is the: | number of buyers and sellers in a market

The consists of a number of interrelated subprocesses that extend from the acquisition of materials from suppliers to packaging it and moving it to distributors and retailers. | supply chain

The core of the new marketing model consists of: | customer relationships

The cost of converting an existing client-server network to an internal Web is very expensive, even if the business is currently using the Internet. | False

The Council of Supply Chain Management Professionals defines _______ as: | logistics

The current Internet sales tax moratorium in the United States applies to: | all sales made over the Internet if the seller has no physical presence in the state where the buyer lives

The development of ____ has been more evolutionary than revolutionary. | Intra-business e-commerce

The development of m-commerce is being driven by the following technological, business, social, and economic factors EXCEPT: | The transition to a manufacturing economy

The development of the first database technology was driven by the need for: | data integration

The difference between a business plan and a business case is: | all new businesses should have a business plan, but only existing businesses planning a major EC or IT initiative should
develop a business case

The digital economy refers to an economy based on digital communication networks, computers, software, and other related information technologies that provide a global platform over which
people and organizations interact, communicate, collaborate, and search for information. | True

The digital enterprise shifts the focus from managing individual information resources such as devices, applications, and data to that define the business and ultimately deliver value to customers
and end users. | orchestrating the services and workflows

The disadvantage of the NPV method for evaluating EC and IT is: | it is difficult to compare projects of unequal lifespans or sizes

The disintermediation of cash and credit cards has been successful in the online world. | False

The downstream part of the supply chain includes the activities of a company with its suppliers, which can be manufacturers, assemblers, or both, or service providers, and their connections with
their suppliers. | False

The dynamic pricing configuration where the resulting price is determined by each party's bargaining power, supply and demand in the item's market, and possibly business environment factors
best describes | A) one buyer, one seller.

The EC application development option that is most appropriate when an application is needed quickly, money is in short supply, and/or the new system is not expected to provide a competitive
advantage is: | purchasing a commercial application.

The EC application development option that is most appropriate when the application is needed quickly, money is a critical concern, and/or large amounts of maintenance are required is called |
leasing.

The EC application development technique that is most appropriate for strategic applications that will differentiate the company from its competitors is called: | insourcing

The EC application development technique which entire applications are employed in the new system, that is especially useful when applications from several business partners must be
integrated is called | enterprise application integration.

The e-commerce model in which a business provides some product or service to a client business that maintains its own customers is called: | business-to-business-to-consumer.

The electronic acquisition of goods and services for organizations is | e-procurement.


The electronic job market can create high turnover costs for employers by accelerating employees' movement to other jobs. | TRUE

The electronic job market has increased the number of individuals who advertise their availability. | True

The elimination of various types of agents that mediate between buyers and sellers, such as travel and insurance agents, is referred to as: | disintermediation

The emergence of electronic marketplaces has resulted in lower information search costs for buyers and lower transaction and distribution costs for sellers. | T

The e-SCM process that includes integrated production and distribution processes is: | supply chain replenishment

The ethical issue raised by collaborative filtering is | invasion of privacy.

The exchange model in which a third party sets up the exchange and promises to run it efficiently and without bias is called the: | neutral entrepreneur model.

The exchange model in which rfqs are aggregated then linked to a pool of suppliers who are notified automatically of the RFQ is the __ model. | buyer aggregation

The exchange of updated information with other computing devices is called: | synchronization.

The exclusively online publication of Stephen King's e-book Riding the Bullet in March 2000 | as disrupted by hackers who breached security, then distributed free copies of the book.

The factors that are critical for an e-payment method to achieve critical mass | All of above

The final participants in B2B transactions are consumers. | False

The financial crisis of 2008-2010 resulted in many companies going out of business or being acquired by other companies. | True

The first generation of EC involves social networks, virtual worlds, and online transactions. | False

The first major step in developing and e-commerce project is | identify, justify, and plan the EC system

The first step in creating a new company or adding an online project is to identify a consumer or business need in the marketplace. | True

The first step in the auction process is: | d. Searching and comparing.

The first step in the purchase decision-making process is product evaluation and comparison. | FALSE

The following direct metrics indicate progress in e-procurement EXCEPT: | reduced inventory costs.

The functions and efficiency of an e-market are the same as that of a physical marketplace. | False

The general premise of ____ is to effectively | supply chain management

The Global Transportation Network (GTN) provides participating carriers and customers with significant cost savings because it frees individual carriers from the huge capital costs of advanced
technologies. | T

The goal of collaborative planning, forecasting, and replenishment (CPFR) is to streamline product flow from manufacturing plants to retailers. | F

The government-to-employees category consists of EC activities between units of government, including those within one government body. | False

The greatest difficulty in dealing with venture capital is: | finding a willing venture capitalist.

The growth in electronic meeting systems has been driven by all of the following EXCEPT: | Shorter cycle times.

The hotdeal.vn, muachung.vn websites are examples of __ | B2B2C model

The IEEE standard offers bandwidth transfer rates of 200 to 540 Mbps, which makes it impractical because it exceeds the limits of most broadband connections used by homes and small
businesses | 802.11n
The implementation of most EC applications requires the use of all of the following | d. Manufacturing

The implementation of most EC applications requires the use of all of the following support services EXCEPT: | manufacturing

The inability to deliver products on time is a typical problem: | in both off-line and e-commerce.

The incidence of online fraud and identity theft has increased for each of the following | c. New effective phishing scams and schemes being carried out by computer experts.

The Internet and its network protocols were never intended for use by untrustworthy people or criminals. | TRUE

The Internet ecosystem refers to animals and plants discussed online. | False

The Internet has created a large demand for personalized products and services. Manufacturers can meet that demand by using a | mass customization

The Internet has influenced industry structures in each of the following ways EXCEPT: | b. Increases differences among competitors whose offerings are kept proprietary.

The Internet introduced the concept of interactive marketing, which has enabled marketers and advertisers to interact or communicate directly with customers and consumers can interact with
marketers/advertisers. | interactive marketing

The introduction of EC has | decreased customer loyalty because customers can more easily shop, compare, and switch to different vendors.

The key difference between an e-business plan and a traditional business plan is that the entrepreneur must | understand that the Internet is a unique sales channel

The key problem that biometric marketing is intended to solve is | knowing the identity of the actual shopper.

The key reasons why EC criminals cannot be stopped include each of the following | b. Sophisticated hackers use browsers to crack into Web sites.

The last fifteen orders from a manufacturer to its suppliers range from $100,000 to $8,740,000. This is an example of: | the bullwhip effect.

The least effective method to protect against pop-up ads and their risk is: | Minimizing the pop-up window

The legal term for the use of the work without permission or contracting for payment of a royalty is | infringement.

The limitations of mobile auctions are all of the following EXCEPT: | d. Internet cell phones are less private than a PC <498: more private>

The main purpose of LinkedIn is to allow registered users to | create and maintain a list of contact details of people they know and trust in business.

The major B2C e-marketplaces are storefronts and Internet malls. | B2C

The major 13213 services include each of the following EXCEPT: | Retail

The major attributes that enable development of new applications that are possible only in a mobile environment include all of the following EXCEPT: | Security

The major B2B e-marketplaces are electronic storefronts, Internet malls, and exchanges. | F

The major B2B services include each of the following EXCEPT: | Retail

The major benefit of an DSS is _____ | in easier decision making

The major benefit of group decision support systems is: | in conducting virtual meetings

The major characteristic of B2B commerce is that companies attempt to electronically automate trading, communication, and collaboration processes in order to improve them, which cannot be
done without the Internet. | F

The major difference between e-logistics and traditional logistics is: | traditional logistics deals with movement of large amounts of materials to a few destinations

The major disadvantage of banners is | their cost


The major e-marketplaces are storefronts and Internet malls. | B2C

The major enterprise mobile applications are all of the following EXCEPT: | research and development

The major environmental variables influencing EC purchasing are: | social, cultural, community, regulatory, political, and legal

The major limitations of e-auctions are insufficient security, risk of fraud, and a limited pool of participants | T

The major risk of online trading is | security

The major steps in the process of justifying large-scale EC and IT projects include all of the following EXCEPT: | Be careful not to over-estimate cost and under-estimate benefits (a
tendency of many managers)

The major tasks of knowledge management include each of the following except: | supplementing knowledge

The membership business model gives members discounts when they make purchases. | True

The most attractive industries for a vertical exchange are characterized by: | a market in which a small number of very large orders account for more than half the total market volume per
year

The most cited reason for not purchasing online is price. | False

The most common and traditional form of auctions in which one seller entertains bids from many buyers is referred to as: | forward auctions

The most cost-effective approach to EC security is to develop and implement a strategy that | proactively meets regulatory, financial, marketing and operational requirements

The most dangerous risk to a company engaged in e-commerce is: | b. Business risk

The most difficult and crucial task in evaluating a vendor and a packaged system is: | to determine a weighted set of detailed criteria for choosing the best vendor and package

The most efficient way to expand an organization's scope is: | to introduce new products or services into new or existing markets without increasing production facilities or staff

The most important objectives of strategic assessment are all of the following EXCEPT: | Identify what competitors are doing to avoid head-on competition

The most serious disadvantage of e-auctions is: | a. The risk of fraud

The motives of hackers have shifted from the desire for fame and notoriety to advancing personal and political agendas. | False

The name-your-own-price model pioneered by Priceline.com is a type of auction. | one buyer, many potential sellers

The nationwide batch-oriented electronic funds transfer system that provides for interbank clearing of electronic payments for participating financial institutions is called the: | Automated
Clearinghouse Network

The New York Metropolitan Transit Authority (MTA) did not need to open another airport for almost two decades, even though air traffic had tripled because of productivity gains derived from
improved IT systems. This case illustrates that: | Intangible benefits can be complex, yet substantial

The newest areas of e-commerce are | Web 2.0 applications

The online delivery of information for purposes of education, training, or knowledge management best describes: | E-learning

The online platforms and tools that people use to share opinions and experiences, including photos, videos, music, insights, and perceptions with each other are known as __. | social media

The original click-and-mortar strategy used by Toys R Us failed, as did the original toy venture of Amazon.com. Afterwards, Toys R Us sold toys online through Amazon.com. This is an
example of: | an alliance of a pure-player with a traditional retailer

The original objections to the relational database model were that it was: | too slow and used too many resources

The overwhelming majority of B2C purchases are paid for by smart cards. | False
The person who first suggests a purchase is the Initiator. | True

The portion of an e-seller's business through which customers interact, including the seller's portal, electronic catalogs, shopping cart, and payment gateway is the | front end of the business

The power adapters Dell sells with its computers are built by small companies who specialize in power-related accessories. Dell and the power adapter manufacturers are engaging in B2B
marketing. | True

The practice by sellers of having associates place fake bids in an auction as a way to drive up the selling price is called: | shilling

The presentation of product information in an electronic form and also serving as the backbone of most e-selling sites describes | electronic catalog

The price of a product: | all of them are correct

The primary advantage that e-books offer publishers is: | lower production, marketing, and distribution costs

The primary benefits of workflow management systems include all of the following EXCEPT: | increased data security

The primary reason for writing a business plan is to: | acquire external funding

The process by which companies present invoices and make payments to one another through the Internet is known as: | enterprise invoice presentment and payment

The process of building auction applications is complex for all of the following reasons EXCEPT: | auctions must provide payment systems

The process of capturing or creating knowledge, storing it, updating it constantly, disseminating it, and using it whenever necessary best describes: | knowledge management

The process of determining whether a card is active and whether the customer has sufficient funds for the purchase is called: | authorization

The process of dividing a consumer market into logical groups for conducting marketing research and analyzing personal information is | market segmentation

The process of selecting a software vendor and EC package includes each of the following except: | close vendor contract

The process of verifying the real identity of an individual, computer, computer program, or EC Web site best describes: | authentication

The process whereby intermediaries take on new intermediary roles describes __. | reintermediation

The processing of card payments has two major phases: identification and settlement. | False

The procurement inefficiency refers to the unplanned purchases of items needed quickly, often at non-negotiated higher prices. | maverick buying

The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as: | information
assurance

The psychological status of willingness to depend on another person or organization best defines | trust

The purchase of goods and services as they are needed, usually at prevailing market prices is referred to as: | spot buying

The purchase of goods and services as they are needed, usually the purchase of commodities at prevailing market prices, is referred to as demand buying. | False

The purpose of a consumer behavior model is to help firms understand how a consumer makes a purchasing decision to be able to influence that decision through advertising, special promotions,
or other marketing method. | True

The purpose of CPFR is to: | ensure that members of the supply chain will have the right amount of raw materials and finished goods when they need them

The real estate brokerage industry has been disrupted by companies such as Zillow and Homegain for each of the following reasons EXCEPT | The Web 2.0 real estate sites have driven down
commissions from 6 percent to almost 1 percent

The relationship between EC investment and organizational performance is: | indirect

The relationship between stock price and when an investor invests is | IPO investors will pay the highest price per share
The risks of being a first mover include all of the following EXCEPT | the risk that the move will be too late

The risks of e-mail advertising management include all of the following EXCEPT: | measuring e-mail advertising effectiveness

The search war between Google and Yahoo! And other search engines is about: | Internet advertising dollars

The Sears marketing strategy is best described as | a click-and-mortar strategy

The second generation of Internet-based services that lets people collaborate and share information online in new ways, such as social networking sites, wikis, communication tools, and
folksonomies best defines: | Web 2.0

The second most often cited reason for customers not buying on the Web is: | a. The lack of a good return mechanism

The second-generation of Internet-based services that lets people collaborate and share information online is known as Web 2.0. An example of this is: | blogging

The security of an intranet is important, so many businesses use firewalls to protect them. | True

The services provided through location-based m-commerce focus on key factors which include all of the following EXCEPT: | Geocaching, or determining the topography of an area

The single factor that will determine which intermediaries continue to exist and which are replaced is: | the addition of value-added services by the intermediary

The sole purpose of e-government is to use EC technologies to sell products to citizens and collect taxes. | False

The spread of instant messaging and Internet telephony has naturally led to the idea of linking people via a video chat room, which is called | instant video

The steps required to approve an expense report is an example of: | administrative workflow applications

The strategy of providing comprehensive, quality e-service for business partners is called customer relationship management (CRM). | False

The structure of a social network is often very simple. | False

The study and practice of ecofriendly computing resources, and it is now a key concern of businesses in all industries best describes: | green computing

The success and security of EC depends on the of information and the business Web site. | confidentiality, integrity, and availability

The success of an e-payment method depends on its interoperability with existing enterprise systems and applications. | True

The success of an e-supply chain depends on managing information with strict policies, discipline, and daily monitoring. | True

The success of an e-supply chain depends on an e-supply chain that is loosely integrated both within a company and across an extended enterprise made up of suppliers, trading partners, logistics
providers, and the distribution channel. | False

The success of many organizations—private, public, and military—depends on their ability to manage the flow of materials, information, and money into, within, and out of the organization.
Such a flow is referred to as a | supply chain

The tasks of KM include each of the following EXCEPT | restricting knowledge access to prevent its transfer between individuals

The technology platform to keep every online transaction secured is __ | PKI

The term __ is an online community that uses the power of social networks for the introduction, buying, and selling of products and services, including people's own creations. | social
marketplace

The term _____ refers to the number of distinct individuals requesting pages from the website during a given period, regardless of how often they visit. | unique visitor

The term _____ refers to the number of times users call up a page that has a banner on it during a specific period. | ad view

The term _____ refers to the way of measuring the success of an online advertising campaign for a particular website as well as the effectiveness of an email campaign by the number of users
that clicked on a specific link. | click through rate
The term domestic key is not used. If it were used, what do you think it would mean? | the primary key in the relation that the foreign key links to

The term supply chain comes from the concept of how systems and processes within an organization are linked together. | False

The term supply chain comes from the concept of how the partnering organizations are | linked

The threat of substitute products or services is a major force that can endanger a company's position in a given industry. | True

The three functions of a market include: matching buyers and sellers, facilitating transactions and institutional infrastructure. | True

The three major elements of Caterpillar Inc.'s learning infrastructure include: | all of the above

The time required for negotiation online is the same for all products because of the use of intelligent agents. | False

The tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server are | Web bugs

The top 500 e-tailers accounted for 65 percent of all online sales in 2009. | True

The topic of e-learning is gaining much attention, especially because world-class universities such as MIT, Harvard, and Stanford in the United States and Oxford in the United Kingdom are
implementing it. | True

The transfer of money from the buyers to the sellers account is called: | settlement

The trouble with most virtual e-tailers is that they | lose money

The truste seal is an example of: | a trustmark

The two key factors limiting the use of personalization to more precisely target marketing efforts to individual customers are: | privacy and trust issues

The two most cited reasons for abandoning a shopping cart and not making the purchase are shipping charges and security concerns. | False

The two types of materials and supplies traded in B2B are: | direct and indirect

The type of contact card that is erasable and modifiable is: | EEPROM

The type of e-auction is based on______ | demand and supply relationship

The type of EC transactions used by Zappos are: | business-to-consumer

The type of portal which acts as an interface between companies, customers, and suppliers, revealing subsets of information to specific audiences is called a(n): | extranet portal

The U.S. agencies dedicated to eliminating fraud resulting from phishing and crimeware are: | The High-Tech Crime Network, Anti-Phishing Working Group, and Federal Trade
Commission

The ultimate objective of a company’s website is to add enough value to achieve ____, a state in which the customer has a vested interest to stay with the company because switching to a
competitor entails significant switching costs. | lock-in

The underlying reasons why a comprehensive EC security strategy is needed include | managers treating EC security as a process

The unique combination of resources, experiences, and expertise within a particular firm is called their: | core competencies

The use of cookies | is one of the most controversial issues in EC

The use of Web technologies to manage warehousing and transportation processes is called: | e-logistics

The vast majority of B2B payments are: | still made by paper check

The volume of business should be high to reduce transaction fees. Which of the five critical success factors identified by Ramsdell is being described? | Early liquidity
The way government makes use of Web 2.0 technologies to interact with citizens and provide government services best describes: | Government 2.0

The ways in which EC is done include: | the Internet, value-added networks, on local area networks using intranets, or on a single computerized machine

The ways in which EC is done include: | the Internet, value-added networks, on local area networks using intranets, or on a single computerized machine

The Web hosting option under which the business acquires the hardware, software, staff, and dedicated telecommunications services needed to host a Web site is called: | self-hosting

The wireless implementation of e-government mostly to citizens but also to businesses best describes: | mobile government

The work atmosphere that a company sets for its employees describes: | internal control environment

There are two statements: Statement A: WAP stands for Wireless Application Protocol Statement B: voip stands for Video over Internet Protocol Which of the statements is/ are correct? | A is
True, B is False

Thirty-eight percent of all merchants use negative lists, which are files that include a customer's information and the status of that customer. A customer's transaction is matched against these
files and flagged if the customer is a known problem. | True

This is the IEEE standard for WiMAX. | 802.16

This software allows for viewing of web pages on mobile devices. What type of software is being described? | Microbrowser

This software is used to view online WML content. What type of software is being described? | Microbrowser

This technology is the most popular WWAN standard. | GSM

This transmission media is used for short distance, wireless communication between computers. | Bluetooth

This wireless standard is a set of protocols that allows portable devices to communicate with the Internet | WAP

This wireless standard is used to accommodate voice. | VXML

This wireless technology will provide faster display of multimedia. | 4G

Thomas Register is basically a directory for buyers using search engines because it does not offer any opportunity for trade or transactions on its site. | False

Three RFID supply chain applications are: | Food, Labeling and Inventory

To avoid getting false information from participants of online surveys, marketers learn about customers by observing their behavior using each of the following EXCEPT: | Data mining to
analyze clickstream data

To be effective, an acceptable use policy (AUP) needs | to inform all users of their responsibilities when using company networks, computer equipment, wireless devices, and customer
data

To be successful and useful, large e-catalogs need a(n): | search engine

To defend against unethical and illegal business tactics that exploit EC operations, Google, MSN Search, and Yahoo have turned to all of the following aggressive measures EXCEPT: |
Implemented honeypots

To evaluate, how many dimensions of E-Commerce we will use? | 3

To increase their financial viability, third-party exchanges try to partner with large sellers or buyers, financial institutions that provide payment schemes, or logistics companies to cut costs or
increase market liquidity. | True

To succeed, special e-payment methods, such as e-cash, have to maintain anonymity. | True

To the ____, physical location does not matter because the Internet allows anyone to link to any Web site no matter where in the world that site might be. | e-tailer

Today, many business experts agree with each of the following EXCEPT: | Supply chain integration has reduced the intensity of competition in most industries
Today, over 90 percent of EC volume is B2C. | False

Tom visits a Web interface that provides personalized access to information of interest to him. This is an example of a(n): | portal

Tools that scout the Web on behalf of consumers who specify search criteria are | shopbots

Total benefits of ownership (TBO) | Benefits of ownership that include both tangible and intangible benefits

Total cost of ownership (TCO) | A formula for calculating the cost of owning, operating, and controlling an IT system

Trademark | A symbol used by businesses to identify their goods and services; government registration of the trademark confers exclusive legal right to its use

Traditional and electronic markets have three main functions, which include each of the following EXCEPT: | transforming raw materials into finished products

Traditional methods for evaluating EC investments include all of the following EXCEPT: | Discount rate

Transaction costs include all of the following EXCEPT: | Production costs incurred for labor and overhead

Transaction fees for B2B financial services are higher than for most other methods. | False

Transaction log | A record of user activities at a company’s Web site

Transactional Web site | A Web site that sells products and services

Transport Layer Security (TLS) | As of 1996, another name for the SSL protocol

Travelers using airline Web sites to book their flights directly without the use of travel agents is resulting in the reintermediation of travel agents. | False

Trends that may slow EC and Web 2.0, and even cripple the Internet include: | all of the above

Trojan horse | A program that appears to have a useful function but that contains a hidden function that presents a security risk

Trust | The psychological status of willingness to depend on another person or organization

Trust is less important in B2B than in B2C. | False

Trust verification sites evaluate a business's trustworthiness. How comprehensive is this evaluation? | Moderate, generally verification indicates a trustworthy user

Turnkey approach | Ready to use without further assembly or testing; supplied in a state that is ready to turn on and operate

Tweets | Text-based posts up to 140 characters in length posted to Twitter

Twitter | A free microblogging service that allows its users to send and read other users’ updates

Two innovative e-strategies for order fulfillment are: | merge-in-transit and rolling warehouses

Two major models of third-party exchanges are supplier aggregation and buyer aggregation. | True

Two purposes of a type of auctions are liquidation and market efficiency | one seller, many potential buyers

Types of business activities in virtual worlds include each of the following EXCEPT: | assembling physical products

Types of costs and cost issues that need to be considered in justifying EC investments include all of the following EXCEPT: | opportunity costs

U
Unique visits | A count of the number of visitors entering a site, regardless of how many pages are viewed per visit.
Unit testing | Testing application software modules one at a time.

Unlike the brick-and-mortar marketplace, the failure rate for online companies is low. | False

Unlike the physical supply chain, __ characterize the financial supply chains of most companies. | inefficiencies

Updating knowledge as time progresses describes: | knowledge evolution.

Up-selling | Offering an upgraded version of the product in order to boost sales and profit.

USA PATRIOT Act | Uniting and Strengthening America by Providing Appropriate Tools to Intercept and Obstruct Terrorism Act passed in October 2001, in the aftermath of the
September 11 terrorist attacks. Its intent is to give law enforcement agencies broader range in their efforts to protect the public.

Usability (of Web site) | The quality and usefulness of the users experience when interacting with the Web site.

Usability testing | Testing the quality of the users experience when interacting with a Web site.

User profile | The requirements, preferences, behaviors, and demographic traits of a particular customer.

Using tunneling technology to improve security of communication over the Internet is called: | virtual private network (VPN).

Using Web 2.0 tools, companies can: | do all of the above.

Ustomer-to-customer (C2C) e-commerce is conducted in various ways on the Internet, but the best-known C2C activities are: | C2C auctions

V
Value proposition | The benefit that a companys products or services provide to a company and its customers.

Value proposition refers to the benefits that a company can derive from using EC. | True

Various banking activities conducted from home or the road using an Internet connection describes __. | electronic banking

Vendor-managed inventory (VMI) | The practice of retailers making suppliers responsible for determining when to order and how much to order.

Venture capital (VC) | Money invested in a business by an individual, a group of individuals (venture capitalists), or a funding company in exchange for equity in the business.

Vertical marketplaces | Markets that deal with one industry or industry segment (e.g., steel, chemicals).

Viewing a system (such as an organization) as a set of individual processes leads to ____. | a. Sub-optimization

Viral blogging | Viral (word-of-mouth ) marketing done by bloggers.

Viral blogging is viral marketing done by bloggers. | TRUE

Viral marketing | Word-of-mouth method by which customers promote a product or service by telling others about it.

Virtual (Internet) community | A group of people with similar interests who interact with one another using the Internet.

Virtual (pure-play) e-tailers | Firms that sell directly to consumers over the Internet without maintaining a physical sales channel.

Virtual (pure-play) organizations | Organizations that conduct their business activities completely online

Virtual catalogs and links to external sources support the information search step in the purchase decision-making process. | True

Virtual credit cards are used to: | Use in place of actual CC numbers online for security

Virtual manufacturing involves pretending you are creating something. | False


Virtual or pure-play e-tailers are firms that sell directly to consumers over the Internet without maintaining a physical sales channel. | T

Virtual private network (VPN) | A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication
to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network.

Virtual travel agents offer only a small subset of the services provided by a traditional travel agent. | False

Virtual university | An online university from which students take classes from home or other offsite locations, usually via the Internet.

Virtual world | A user-defined world in which people can interact, play, and do business. The most publicized virtual world is Second Life.

Virus | A piece of software code that inserts itself into a host, including the operating systems, in order to propagate; it requires that its host program be run to activate it.

Visibility | The knowledge about where materials and parts are at any given time, which helps solve problems such as delay, combining shipments, and more.

Visit | A series of requests during one navigation of a Web site; a pause of a certain length of time ends a visit.

Vlog (or video blog) | A blog with video content.

Voice commerce (v-commerce) | An umbrella term for the use of speech recognition to allow voice-activated services including Internet browsing and e-mail retrieval.

Voice portal | A Web site with an audio interface that can be accessed through a telephone call.

Vortals | B2B portals that focus on a single industry or industry segment; vertical portals.

Vulnerability | Weakness in software or other mechanism that threatens the confidentiality, integrity, or availability of an asset (recall the CIA model). It can be directly used by a
hacker to gain access to a system or network.

W
Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of materials along the supply chain. This is an example of | Collaborative Planning, Forecasting
and Replenishment (CPFR)

Walmart's corporate social network is a major success. | False

Was coined by O’Reilly Media in 2004 to refer to a supposed second generation of Internet-based services that let people collaborate and share information online in new ways, such as social
networking and wikis. | Web 2.0

We can directly connect information systems with increased firm performance. | False

Web 2.0 | The second generation of Internet-based services that lets people collaborate and share information online in new ways, such as social networking sites, wikis,
communication tools, and folksonomies

Web 2.0 applications enable segmented advertising. | True

Web 3.0 | A term used to describe the future of the World Wide Web. It consists of the creation of high-quality content and services produced by gifted individuals using Web 2.0
technology as an enabling platform

Web 4.0 | The Web generation after Web 3.0. It is still mostly an unknown entity. However, it is envisioned as being based on islands of intelligence and as being ubiquitous

Web analytics and mining tools and services | Offer advanced functions that help marketers decide which products to promote, and merchandisers achieve a better understanding of the
nature of demand

Web bugs | Tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server

Web hosting service | A dedicated Web site hosting company that offers a wide range of hosting services and functionality to businesses of all sizes

Web mining | The application of data mining techniques to discover meaningful patterns, profiles, and trends from both the content and usage of Web sites. Also extracting
information from Web documents and Web usage
Web mining hopes to accomplish all of the following EXCEPT: | Determine characteristics of specific users

Web portal | A single point of access, through a Web browser, to critical business information located inside and outside (via Internet) an organization

Web self-service | Activities conducted by users on the Web to find answers to their questions (e.g., tracking) or for product configuration

Web site content is especially important to increase stickiness because | customers are expensive to acquire

Web site usability means that people who use the Web site can do so quickly and easily to accomplish their tasks and may also consider such factors as cost-effectiveness and usefulness. | True

Web sites use ____ to compile personal information on their visitors and then use the information to create customer profiles. | cookies & registration forms

Web sites with audio interfaces that can be accessed by a cell phone best describes | voice portals

Web video analytics | A way of measuring what viewers do when they watch an online video

Webcasting | A free Internet news service that broadcasts personalized news and information, including seminars, in categories selected by the user

WebMD, which is the largest U.S. medical services company, is known mainly for its WebMD.com consumer portal, but its core business is being an e-intermediary. | True

Webstore (storefront) | A single company’s Web site where products or services are sold and usually has an online shopping cart associated with it. Many Webstores target a specific
industry and find their own unique corner of the market

What are the basic elements of e-commerce | Web-based storefronts, secure Web sites

What are the four major categories of e-government services? | The four categories are: government-to-citizens, government-to-business, government-to-government and government-to-
employees

What are the four types of consortium trading exchanges? | Vertical-purchasing oriented, horizontal-purchasing oriented, horizontal-selling oriented and vertical-selling oriented

What are the functions of application programs? | Create and process forms, process end users, queries, create and process reports, execute application logic, control the application

What are the key elements of PKI? | A pair of matched keys: a public key to encrypt a message and a private key to decrypt it, or vice versa

What are the stages of implementation of e-government? | Information publishing, official two-way transactions, multipurpose portals, portal personalization, clustering of common
services and full integration

What are the steps and their order in EC order fulfillment? | Ensuring payment, checking availability, arranging shipment, insurance, production, plant services, purchasing and
warehousing, contacts with customers and returns

What are the steps in a Web-based reverse auction? | Prepare and post project information, identify and approach suppliers, bids are created and submitted, bids evaluated and awarded

What are the steps in bargaining online? | Search, selection, negotiation, continuing selection and negotiation, and transaction completion

What are the steps in creating a vertical e-marketplace? | Thinking ahead, planning, system analysis and design, building the exchange, testing/installation/operation, and system
evaluation

What are the two most cited reasons for not purchasing online? | Security and quality assessment

What are the two types of materials and supplies that are traded in B2B? | Direct and indirect

What are virtual (pure-play) e-tailers? Give an example. List one advantage and one disadvantage of this model. | Virtual (pure-play) e-tailers are firms that sell directly to consumers over
the Internet without maintaining a physical sales channel. Amazon.com is a prime example. Advantage: low overhead costs. Disadvantage: lack of physical infrastructure to support
operations

What does C2B stand for? | Consumer-to-business

What does database migration mean? | Used to describe the process of redesigning an existing database to meet new or changing database requirements
What does DBMS stand for? | Database management system

What does DDL stand for? | Data definition language, used for creating tables, relationships, and other database querying and modifying data

What does DML stand for | Data manipulation language, used for querying and modifying data

What has been the impact of the introduction of EC on customer loyalty in general? | Loyalty has decreased because of customers' ability to shop, compare, and shift vendors

What is a benefit of e-auctions to sellers? | The optimal price is determined by the market

What is a closed-loop stored-value card? | A card that can only be spent for its initial value

What is a normal form? | One category in a set of categories used to describe relations according to the type of anomalies that can occur in the relations

What is a virtual community? Identify six common classifications. | A virtual community is a group of people with similar interests who interact with one another using the Internet. Six
common classifications are transaction, purpose or interest, relations or practices, fantasy, social networks, and virtual worlds

What is cybercrime? | Intentional crimes carried out on the Internet

What is cybercriminal? | A person who intentionally carries out crimes over the Internet

What is metadata? How does this term pertain to a database? | Metadata is data about data. Metadata in databases allow them to be self-describing

What is not a benefit of an FAQ? | The answers can change dynamically based on the questions

What is NOT a major benefit of m-commerce? Hint: choose two answers | Reduces time utilization and productivity of mobile employees, Increases time to order

What is NOT one of Porter's Five Forces? | Effects of EC Systems

What is the function of DBMS? | Creates, processes, and administers databases under the control of the DBMS

What is the function of the application generator in Access? | To create and manage forms, reports, and queries

What is the likely effect on intermediation of the following market events: aggregation, complex search requirements, and new markets? | Cybermediation

What is the most commonly used type of database? | Relational database

What is the name of TCU's football team? | Horned Frogs

What is the primary advantage of catalog sales? | Catalogs eliminate the constraints of physical location and time

What is the primary responsibility of the Chief Information Officer? | Set and guide the information systems strategy

What is the proper order for the steps in market research? | Problem Definition, Research Methodology, Data Collection and Analysis, Results and Recommendation

What is the purpose of a database? | To help people keep track of things

What is the relationship between a primary key and a candidate key? | A primary key is a candidate key

What is the role of data mining? | It allows the firm to anticipate customer needs

What is the SQL SELECT/FROM/WHERE framework? | SELECT specifies which columns to list, FROM specifies tables, WHERE filters rows in the result

What is the three models of EIPP? | Buyer, Seller, and Consolidator

What is the typical order of the phases of the auction process? | Searching and comparing, getting started at an auction, the actual bidding, and post-auction follow-up

What is true regarding competitive advantage? | It is difficult to sustain


What job functions does a database administrator perform? | Designs, constructs, and manages databases

What relations are in 1NF? | Any relation is, by definition, in 1NF

What strategic benefits are associated with using social networks? | They allow a business to better access customers for sales, feedback, and research

What term refers to a primary key made up of more than one field | Composite key

What three factors facilitate online negotiations? | Voice over IP systems

What type of key might Name be in problem above? | Candidate Key

What type of mechanism determines who can legitimately use a network resource? | Access Control

When a car manufacturer sells trucks, cars, and car parts to the government or military, this is an example of B2C marketing. | False

When a good or service is promoted, the purpose of the promotion is to inform, persuade, or remind customers. | True

When a supply chain is managed electronically, usually with Web technologies, it is referred to as a(n) | e-supply chain

When a tee shirt manufacturer states, "We only sell it in black because that way we can buy plenty of black fabric and run our plant efficiently," their statement reflects the views that were
popular in which era of the evolution of marketing? | Production-oriented

When Chaplin's auto lease is about to expire, he decides it is time to buy a new car. This imbalance between a desired state and an actual state is called need identification. | True

When choosing between two identical goods, customers will always choose the lowest price. | False

When compared to the traditional job market, an advantage of the online job market is its long life cycle. | True

When comparing retailing to e-tailing, e-tailing has a lower cognitive shopping overhead due to easy-to-establish mutual trust. | False

When computing agency cost, companies should consider | only production-related costs and ignore transaction costs

When creating a new business, the first step is to: | Identify a consumer or business need that is not presently being met

When Dell purchases Godiva chocolates as gifts for its employees and has Godiva mail them directly to the recipient, Dell is engaged in B2B2C. | True

When large suppliers or buyers are involved, a workflow system: | Is needed for both the collaborative efforts and for supply chain and production improvements

When making a purchasing decision, deciding what product to buy is referred to as product brokering. | True

When measuring the effectiveness on an online advertisement, the ____ is the percentage of visitors to a page who click on an advertisement. | Click-through rate

When membership fees are the basis for revenue generation in an e-exchange, it has been shown that: | Low membership fees often result in losses to the exchange; however, high fees
discourage participation

When planning an EC project, planners must first consider: | How the EC project aligns with the organization's overall business plans and processes

When planning, designing and implementing integrated supply chain operations, management requires a holistic focus that takes account all of the following primary factors EXCEPT: | Location
and revenues

When the supermarket scans your premier customer card it links you to your purchases and then uses that information to establish a personal shopping pattern for you. Subsequently, the
supermarket uses that information to target advertising (like coupons and mailers) directly to you based on your established shopping patterns, a form of one-to-one, ____ marketing. | E-
relationship

When the works of sale employees are recorded in real time, the organization benefits through each of the following EXCEPT: | More extensive collaboration and sharing of customer leads

When would you use a surrogate key? | When the non-surrogate primary key would be too large and unwieldy
Where do a huge majority, possibly as high as 95 percent, of hackers reside? | Turkey, China, Romania, or Brazil

Where does the value of a surrogate key come from? | A surrogate key value is normally assigned by the BDMS when a new row is created

Where is Web 2.0 software going? | Large companies are adding Web 2.0 tools to their existing collaboration products and IBM Lotus and Intel are adding social networking software
to their software suites

Whether the delivery is made by company-owned vehicles or is outsourced to a carrier, an express delivery model is referred to as an | On-demand delivery service

Which are the most popular type of B2B consortium, consist of a group of companies that join together to streamline purchasing processes. | Purchasing-oriented consortia

Which factor is responsible for most information security breaches? | Human error

Which involve bundling some goods and services together to provide more value than from offering them separately. | Complementarities

Which is a data file that is stored on the users hard drive, frequently without disclosure or the users consent. | Cookie

Which is an example of reintermediation? | Using a salesperson to negotiate a large, complex agreement

Which is INCORRECT about company-centric marketplaces term? | It is a public marketplace entities owned by that company.

Which is not a characteristic of permission marketing? | Spamming

Which is not a characteristic of strategic sourcing? | Supported through third-party exchanges

Which is true when talk about "e-check"? | All of the above

Which normal forms are concerned with functional dependencies? | 2NF to Boyce-Codd NF

Which of the following about business plans and business cases is NOT correct? | The audiences are the same: senior management and the board of directors.

Which of the following advertising methods involves the use of games? | Advergaming

Which of the following are benefits of social commerce to the consumer and to vendors? | Customers' expectations can be met fully and quickly, increase trust via direct conversations,
target advertisements more accurately

Which of the following are EC activities supported by Web 2.0 tools and social network services? | Entertainment

Which of the following are main major characteristics of Web 2.0? | Rich User Experience, User Participation, Collaborative

Which of the following businesses is an information portal? | Company D provides news, bulletin boards and classified ads for a particular vertical market

Which of the following case-study is opening case of chapter 8 - "Marketing and Advertising in E-Commerce"? | Netflix Increases Sales Using Movie Recommendations and Advertisements

Which of the following categories of e-government increases the number of grant programs available for electronic application? | G2G

Which of the following categories of e-government reduces the average time for citizens to find benefits? | G2C

Which of the following categories of e-government reduces the average time for businesses to comply with regulations? | G2B

Which of the following categories of e-government reduces the average time to process clearance forms? | IEE

Which of the following companies does not trade stocks online? | Priceline.com

Which of the following connects a circle of Weblogs with a common focus or theme? | Blogring

Which of the following content are benefits of E-Learning? | Reduces travel time and travel costs for off-campus students, self-paced learning modules allow students to work at their own
pace
Which of the following content is NOT the benefit of E-Government? | Reduced access to information. It reduces a greater amount of information to businesses and provides it in a more
organized and accessible manner.

Which of the following do businesses consider the least important when creating portal services? | News services

Which of the following does not correctly describe what firewalls protect against? | Macros are the electronic equivalent of junk mail.

Which of the following does not create dynamic pricing? | Long-term contracts

Which of the following does not describe intrabusiness workflows after the addition of m-commerce? | Work orders assigned by multiple dispatchers

Which of the following E-Commerce models is conducted almost entirely through wireless networks or portable devices? | M-Commerce

Which of the following factors would not affect a demand forecast? | Production schedule

Which of the following forms of connectivity is the least scalable? | Private leased network

Which of the following groups is the least likely to own a B2B exchange? | Mid-sized industry player

Which of the following is a benefit of EC? | Individuals can telecommute more easily

Which of the following is a free method used to help deter fraud in online auctions? | Grading services

Which of the following is a limitation of auctions? | Potential for fraud

Which of the following is a limitation of EC? | Special network and hardware requirements

Which of the following is a major characteristic of m-commerce? | Reachability

Which of the following is a private B2B e-marketplace? | Company ABC sells machine parts to their 20 customers on their Web site

Which of the following is a technological limitation of EC? | Order fulfillment requirements of large-scale B2C

Which of the following is a virtual organization? | Two companies combine resources to market a new product. They know this product can only be sold for the next 3 months.

Which of the following is an area where supply chains can be improved? | Manufacturing processes

Which of the following is an electronic magazine delivered over the internet? | E-Zine

Which of the following is an example of a general purpose pure-play e-tailer? | Store A does not have a physical location and sells a variety of products.

Which of the following is an example of disintermediation? | In addition to selling through department stores, a firm begins to sell online

Which of the following is an example of edutainment? | An online game that uses colorful characters to teach young children about numbers

Which of the following is an example of government-to-citizen (G2C) EC? | Electronic benefits transfer (EBT)

Which of the following is an example of G2C? | A driver applies for and pays for the renewal of his auto tag online.

Which of the following is an example of matching? | A B2C EC site

Which of the following is an example of peer-to-peer EC? | File sharing

Which of the following is an intermediary? | Computer system that matches buyers with "Goods Wanted" to sellers with "Goods for Sale"

Which of the following is generally the "best" way for customers to deal with returns? | Establish drop off locations for returns

Which of the following is generally the lowest ranked attack type? | DOS attacks
Which of the following is INCORRECT about edutainment? | Some adult games like Doom, Grand Theft Auto, are example of edutainment.

Which of the following is likely to have the lowest cost of entry? | An e-retailer

Which of the following is not a benefit of auctions to buyers? | Disintermediation

Which of the following is not a benefit of auctions to sellers? | Entertainment

Which of the following is not a benefit of forward auctions? | Increased product quality

Which of the following is not a benefit of Internet-based XML over traditional EDI? | Guarantees universal compatibility

Which of the following is not a benefit of using the Internet to aid real estate transactions? | Online services eliminate the need to visit houses

Which of the following is not a benefit of using wireless phones in auctions? | Security

Which of the following is not a benefit to working with an intermediary? | Increased control over auction sales

Which of the following is not a capability of home banking? | Print new checks online

Which of the following is not a challenge in e-learning? | Student interest

Which of the following is not a change in the travel industry created by online travel agents? | Higher total trip cost due to lost services

Which of the following is not a characteristic of sell-side merchants? | They slightly increase prices for online sales

Which of the following is not a characteristic of the Digital Revolution? | Many business processes are expedited by up to 50 percent.

Which of the following is not a characteristic on an intranet? | Uses proprietary stands

Which of the following is not a classification of exchange? | Tangential E-Exchange

Which of the following is not a common use of smart cards? | PC replacement

Which of the following is not a customer service metric? | Product quality

Which of the following is not a disadvantage of paper catalogs? | Portability

Which of the following is not a driver in the electronic job market? | Size of labor market

Which of the following is not a future direction of CRM? | Reduced impact of open source products

Which of the following is not a goal of procurement management? | Increase maverick buying

Which of the following is not a limitation of EC? | Customers now have nearly unlimited bandwidth.

Which of the following is not a limitation of e-cash? | Lack of potential uses

Which of the following is not a limitation of m-commerce? | Potential user base

Which of the following is not a limitation of traditional auctions? | Technical ability of buyers

Which of the following is not a part of the EC Consumer Behavior Model? | Decider variables

Which of the following is not a reason to outsource? | The function is a core competence

Which of the following is NOT a standard used in E-Commerce? | IFI


Which of the following is not a type of Internet security tactic? | PPT

Which of the following is not a typical service provided by online travel agents? | True bargains on airfare cost

Which of the following is not an advantage of online banking? | Personal interaction with staff

Which of the following is not an advantage of virtual private networks (VPN) for data communications? | They ensure the confidentiality and integrity of the data transmitted over the
Internet without requiring encryption.

Which of the following is not an area where supply chains can be improved? | Customer research

Which of the following is not an attribute of a corporate portal? | The public uses this portal to access the Internet

Which of the following is not an environmental variable in EC purchasing? | Climate variables

Which of the following is not an established application of e-government? | G2P

Which of the following is not an example of a P2P system? | User interfaces are based inside a Web browser

Which of the following is not an example of an e-payment? | Cash

Which of the following is not an example of B2E? | A business advertises for new employees on their Web site

Which of the following is not an example of company-centric EC? | A group of companies purchase office supplies from a consolidated online catalog

Which of the following is not an example of post auction follow-up? | Snipping

Which of the following is not an example of web self-service? | Call center support

Which of the following is not an identified benefit of electronic benefits transfer (EBT)? | Ease in assigning taxes

Which of the following is not an interaction element in a virtual community? | e-book

Which of the following is not an online banking application category? | delivery

Which of the following is not an organizational buyer? | Student purchasing school supplies

Which of the following is not an synchronous collaboration tool? | Voice mail

Which of the following is not characteristic of an e-check? | Work under a new, enhanced legal framework

Which of the following is not characteristic of an m-wallet. | Is currently only experimental and not used by the public

Which of the following is not currently a factor in the development of m-commerce? | Reluctance of vendors

Which of the following is not decreasing? | Web site defacements

Which of the following is not one of the advantages of the electronic job market for employees? | Lack of Internet users

Which of the following is not one of the four phases of risk management? | Reporting

Which of the following is not one of the major benefits of B2B? | Enables customized online catalogs with the same prices for different customers.

Which of the following is not one of the major types of payment cards? | Flip cards

Which of the following is not one of the parties usually associated with electronic payments? | Enforcer

Which of the following is not part of the CIA triad? | Pricing


Which of the following is not part of the required infrastructure for a B2B marketplace? | Proprietary, private networks

Which of the following is not required for an intranet? | Access to the Internet

Which of the following is not the function of a market? | Ensuring profits of brokers

Which of the following is not true about the anatomy of cyber attacks? | Reporting serious attacks has increased

Which of the following is not true of targeted advertising? | Customers inform vendors of their locations

Which of the following is the central point of control for an e-market? | collaboration hub

Which of the following is the e-government category that includes interactions between governments and businesses? | government-to-business

Which of the following is the e-government category that includes activities and services between government units and their employees? | government-to-employees

Which of the following is the e-government category that includes all the interactions between a government and its citizens? | government-to-citizens

Which of the following is the e-government category that includes activities within government units and those between governments? | government-to-government

Which of the following is the flow of materials, information, money and services from raw materials suppliers to end customers? | Supply chain

Which of the following is the most popular online customer service tool? | E-mail

Which of the following is the most serious strategic threat to traditional travel agents? | Intelligent software agents

Which of the following is the underlying reason why comprehensive EC security is necessary? | Security costs and efforts from reacting to online attacks and paying for damages are
greater than if an EC security strategy is in place

Which of the following is true about copyrights? | The entertainment industry, led primarily by the Motion Picture Association of America (MPAA) and RIAA, is trying technical
solutions via the legal system to protect its interests

Which of the following is true about the scope of business ethics? | The scope of business ethics has expanded to encompass the nature and quality of the relationships with shareholders,
customers, business partners, suppliers, the community, environment, and future generations

Which of the following is true of virtual banks? | Virtual banks have no physical location

Which of the following is true regarding a second round of financing? | IPO investors will pay the highest price per share

Which of the following item is NOT included in the four major categories of e-government services? | government-to-customers

Which of the following items drivers of m-commerce? | The handset culture, Improving bandwidth, Improved price/performance

Which of the following major factors is the most important predictor of online buying behavior? | product information requested

Which of the following network type has the largest range of geography implement? | WAN

Which of the following parties use the Internet job market? | all of the above

Which of the following provides learning to an employee while the work is being done? | learning on-demand

Which of the following refers to the mapping and measuring of relationships and flows between people, groups, organizations, animals, computers or other information- or knowledge-processing
entities? | social network analysis

Which of the following services does an automated search service provide? | Searches several auction sites for a particular product selected by the user

Which of the following spurred the use of debit cards by eliminating the requirement for merchants to issue receipts for debit purchases of $15 or less? | U.S. Electronic Funds Transfer Act

Which of the following statements about bartering is false? | It is primarily done between individuals and private parties
Which of the following statements about blogs is not true? | Blogs are limited to one-way communication

Which of the following statements about differentiation and personalization is not correct? | Products must be differentiated for perfect competition

Which of the following statements about hardware and software security defenses is false? | Hardware and software security defenses protect against irresponsible business practices or
corrupt management.

Which of the following statements about the rights to privacy and free speech is not correct? | The Internet has destroyed the right to privacy.

Which of the following systems have suppliers and retailers collaborating in their planning and demand forecasting to optimize the flow of materials along the supply chain? | CPFR

Which of the following systems make suppliers responsible for retailers inventory levels? | VMI

Which of the following systems use algorithms to identify optimal solutions to complex planning problems that are bound by constraints? | APS

Which of the following technologies is safe to use in tissue? | RUBEE

Which of the following technologies use item level tracking of items? | RUBEE

Which of the following technologies use magnetic waves to track items? | RFID

Which of the following term is CORRECT with the description paragraph: "A term coined by Mark Zuckerberg of Facebook, which originally referred to the social network of relationships
between users of the social networking service provided by Facebook. The idea was for Facebook to benefit from the social graph by taking advantage of the relationships between individuals
that Facebook provides, to offer a richer online experience. This definition was expanded to refer to a social graph of all Internet users." | Social graph

Which of the following term is correct with the following statement: "Develops knowledge of the Internet and computers skills that will help learners throughout their lives, careers and they can
study anywhere they have access to a computer and Internet connection". | E-Learning

Which of the following term is the best description for the figure? | E-Government

Which of the following types of products is not typically offered on priceline.com? | Antiques

Which of the following types of virtual communities just facilitates the exchange of information on a topic of mutual interest and does not support trading? | purpose or interest

Which of the following wireless technology has the lowest coverage of signal? | wifi

Which of the following would not create a "bullwhip" in the supply chain? | Accurate demand forecasts

Which of these following items are benefits of E-Learning? | lower cost, greater flexibility, more effective learning

Which technologies are designed and used to secure EC communications across a network? | Access control lists, tokens, passwords, and biometric systems

Which type of shopping software agent learns a user's preferences over time? | Learning agent

Which types of services are outsourced the most? | IT services are most often outsourced.

Which U.S. law mandates the use of filtering technologies in schools and libraries that receive certain types of federal funding? | Children's Internet Protection Act

Why does MS Access hide important database technology? | to make it easier for beginning users to create and work with small database applications

Why is a database considered to be self-describing? | because it contains a description of itself—such as what tables are in the database, which columns are in each table and what kind of
data is stored in each column

Why is B2C generally less attractive than B2B? | Channel conflict

Why is being number one in operation efficiency not enough to keep 1-800-Flowers.com at the top of its industry? | More is needed because all other competitors offer similar efficiencies.

Why is SQL described as a data sublanguage? | consists only of language statements for defining and processing a database
Why must the online presence and the telephone system be integrated? | So that all data constantly and consistently enters the system.

Why would a merchant want to customize products? | To charge a higher price

Wi-Fi (wireless fidelity) | The common name used to describe the IEEE 802.11 standard used on most WLANs.

Wiki (wikilog) | A blog that allows everyone to participate as a peer; anyone may add, delete, or change content.

Wikipedia.com, a Web site that allows people to work together online and share information, is an example of Web 2.0. | True

Wikis, blogs and RSS are replacing e-mail for all of the following EXCEPT | Wikis, blogs and RSS are more secure than e-mail.

Will play a major role in facilitating B2B because it makes it easier to meet the demands of business customers and channel partners. | Web Services

Wimax | A wireless standard (IEEE 802.16) for making broadband network connections over a medium-size area such as a city.

Wimax and 3G wireless mobile technologies offer telemedicine application opportunities that include all of the following EXCEPT | Reduced threat of malpractice suits because there is no
hands-on interaction between the remote physician and the patient.

Windows Live Expo is an online _______ similar to Craigslist in that it provides online classifieds and lets users choose listings they want to search sorted either by friends and contacts or by
geographic proximity | social marketplace

Wireless local area network (WLAN) | A telecommunications network that enables users to make short-range wireless connections to the Internet or another network.

Wireless mobile computing (mobile computing) | Computing that connects a mobile device to a network or another computing device, anytime, anywhere.

Wireless wide area network (WWAN) | A telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network.

With , a business sells to a business but delivers small quantities to customers of the buying business. | B2B2C

With ____, a business sells to a business but delivers small quantities to customers of the buying business. | B2B2C

With a bartering exchange, a company submits its surplus to the exchange and receives: | points of credit, which the company can then use to buy items that it needs.

With all else being equal in the online environment, goods with any of the following product characteristics are expected to facilitate greater online sales EXCEPT: | Relatively expensive items.

With vendor-managed inventory, retailers make their suppliers responsible for determining when to order and how much to order. The retailer provides the supplier with real-time information
such as point-of-sale data, inventory levels, and a threshold below which orders are replenished. | T

Word-of-mouth marketing by which customers promote a product or service by telling others about it is referred to as | viral marketing.

Work on the principle that once Web surfers arrive at their site, a few of them will click on one of the linked advertisements and earn them a few cents for each click. | Sploggers

Worldwide purchases of EPEAT-registered products result in each of the following except: | reduced staffing requirements.

Worm | A software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself
onto another machine.

Y-Z
You are walking near a coffee shop and suddenly your cell phone beeps with a message: Come inside and get a free biscotti with any purchase. This is an example of: | location-based
advertising

Zombies | Computers infected with malware that are under the control of a spammer, hacker, or other criminal.

You might also like