FinalBanking (1)
FinalBanking (1)
____ are retailers who conduct business in the physical world, in traditional stores | Brick-and-mortar distributors
_____ includes retail transactions of products/services from businesses to individual shoppers. | B2C
______ is the electronic delivery of newspapers, magazines, books, videos, music, and other digitizable information over the Internet. | Online publishing
_______ are a popular online publishing technology for creating a Web page that can be edited by anyone with a standard Web browser. | Wikis
_______ is commonly used to broadcast public lectures and e-seminars, promote the work of new or unknown musicians, and broadcast international entertainment activities. | Webcasting
_______ is the direct purchasing from internal marketplaces without the approval of supervisors and without the intervention of a procurement department. | Desktop purchasing
__ are barriers between a trusted network or PC and the untrustworthy Internet. | Firewalls
__ are brick-and-mortar retailers that offer a transactional Web site from which to conduct business. | Click-and-mortar retailers
__ are data that occur inside the Web environment, and they provide a trail of the user's activities in the Web site. | Clickstream data
__ are electronic intermediaries that provide and/or control information flow in cyberspace, often aggregating information and selling it to others. | Infomediaries
__ are firms that sell directly to consumers over the Internet without maintaining a physical sales channel. | Virtual (pure-play) e-tailers
__ are tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server. | Web bugs
__ is a deep commitment to rebuy or repatronize a preferred product or service consistently in the future, thereby causing repetitive same-brand purchasing. | Customer loyalty
__ is a marketing arrangement by which an organization refers consumers to the selling company's Web site. | Affiliate marketing
__ is an umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage. | Digital rights management
__ is money invested in a business by an individual, a group of individuals, or a funding company in exchange for equity in the business. | Venture capital
__ is online advertising that focuses on social networking sites. | Social network advertising
__ is online marketing, facilitated by the Internet, by which marketers and advertisers can interact directly with customers, and consumers can interact with advertisers or vendors. | Interactive
marketing
__ is the assurance that online customers or trading partners cannot falsely deny their purchase or transaction. | Nonrepudiation
__ is the criminal, fraudulent process of attempting to acquire confidential information by masquerading as a trustworthy entity. | Phishing
__ is the online B2C business model where manufacturers customize their products and services via online orders. | Make (build)-to-order
__ is the popular term for advanced Internet technology and applications including blogs, wikis, RSS, and social bookmarking. | Web 2.0
__ is the process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform. | Authorization
__ is the process of scrambling a message in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble it. | Encryption
__ is the situation in which an online marketing channel upsets the traditional channels due to real or perceived damage from competition. | Channel conflict
__ matches services, products, and advertising content with individuals and their preferences. | Personalization
__ refers to an online market, usually B2B, in which buyers and sellers exchange goods or services. | E-marketplace
__ refers to social networking where members converse and connect with one another using cell phones or other mobile devices. | Mobile social networking
__ refers to technologies and business practices that free the workforce from the constraints of legacy communication and productivity tools such as email. | Enterprise 2.0
__ refers to the mapping and measuring of relationships and information flows among people, groups, organizations, computers, and other information- or knowledge-processing entities. | Social
network analysis
__ refers to the portion of an e-seller's business processes through which customers interact, including the seller's portal, electronic catalogs, a shopping cart, a search engine, and a payment
gateway. | Front end
__ refers to the second-generation of Internet-based services that let people collaborate and share information online in new ways, such as social networks and wikis. | Web 2.0
__ treats each customer in a unique way to fit marketing and advertising with the customer's profile and needs. | One-to-one marketing
____ are used by consumers to locate the best price for a desired product | a. Shopping bots
____ includes software and integration efforts intended to increase customer satisfaction and loyalty. | e. CRM
____ is commonly used to broadcast public lectures and e-seminars, promote the work of new or unknown musicians, and broadcast international entertainment activities | Webcasting
____ is the act ferreting out previously unknown patterns and relationships from a set of data. | b. Data mining
____ is the electronic transmission of business transaction documents directly between the computers of trading partners in a standard message format. | e. None of the above - EDI
____ is the process of planning, implementing, and controlling the flow of goods and services from point of origin to point of consumption. | d. Logistics
____ is/are used to pay for microtransactions | either e-cash or difital cash
____ work best with many buyers and many sellers. | b. Dynamic exchanges
____, the act of modifying a product or service to fit a given users requirements, is a possible e-commerce source of sustainable competitive advantage. | b. Customization
_____ are a popular online publishing technology for creating a Web page that | c. Wikis
_____ is a crimeware technique used to steal the identity of target companies to get the identities of their customers. | Phishing.
_____ is an advertising strategy that uses word-of-mouth marketing in which customers promote a product or service by telling others about it. | Viral marketing
_____ is commonly used to broadcast public lectures and e-seminars, promote the work of new or unknown musicians, and broadcast international entertainment activities. | Webcasting
______ can be supported more effectively and efficiently through direct buyer | a. Strategic purchases
______ can be supported more effectively and efficiently through direct buyerseller offline or online negotiations, which can be done in private exchanges or private trading rooms in public
exchanges. | Strategic purchases
______ is an EIPP many-to-many model with a third party acting as an intermediary, collecting or aggregating invoices from multiple sellers and payments from multiple buyers. | Consolidator
______ is the electronic delivery of newspapers, magazines, books, videos, | a. Online publishing
______ is the electronic delivery of newspapers, magazines, books, videos, music, and other digitizable information over the Internet | Online publishing
_______ are a popular online publishing technology for creating a Web page that can be edited by anyone with a standard Web browser | Wikis
_______ are extremely busy customers willing to shop online in order to free up time. | Leading edgers
_______ is the continuous evaluation of progress toward the organizations strategic goals, resulting in corrective action and, if necessary, strategy reformulation. | strategy assessment
_______ refers to the buying and selling of goods and services; servicing of customers; collaborating with business partners; and conducting electronic transactions within an organization. | E-
business
__ are sites that evaluate and verify the trustworthiness of e-tailers | c. Trust verification sites
__ is a business strategy that enables manufacturers to control and share | c. Product lifecycle management
__ is a business strategy that enables manufacturers to control and share product-related data as part of product design and development efforts. | Product lifecycle management
__ is the assurance that data are accurate or that a message has not been altered. | Integrity
__ offer Internet Merchant Accounts, which are special accounts for credit card authorization and payment processing. | Acquiring banks
__ provides customers with exactly what they want, when and where they want it. Effective communication between the supply chain and the factory floor is needed to make it happen |
Demand-driven manufacturing
__ refers to the tendency of customers to stay at Web sites longer and | d. Stickiness
__ refers to the tendency of customers to stay at Web sites longer and come back more often. | Stickiness
__ are online markets owned and operated by a single company and may be either sell-side or buy-side. | Private e-marketplaces
__ are systems where only routine transaction processing and information flow take place between two or more organizations using a standard protocol, such as electronic data interchange (EDI).
| Interorganizational information systems
__ is the process of making the selected applications and projects a reality by hiring staff; purchasing equipment; licensing, purchasing, or writing software; and contracting vendors. | Project
management
__ means that the communication and collaboration are done in real time | *Synchronous
____ are customers who are willing to shop online because they dislike | d. Shopping avoiders
____ are customers who are willing to shop online because they dislike going to grocery stores. | Shopping avoiders
____ are financial institutions that provides a customer with a payment | b. Issuing banks
____ are financial institutions that provides a customer with a payment card. | Issuing banks
____ are those who are young and comfortable with technology. | c. New technologists
____ means that the communication and collaboration are done in real | a. Synchronous
____ means that the communication and collaboration are done in real time. | Synchronous
____ provide connectivity among merchants, customers, and financial networks enabling authorization and payments is called the: | Payment processing services
_____ recognizes that __ are the core of a business and that a companys success depends on effectively managing its relationships with them. | Customer relationship management; customers
______is the transfer of documents and computer files while video | b. Data conferencing
__is an advertising strategy that uses word-of-mouth marketing in which | a. Viral marketing
A
A __ is a collaborative online encyclopedia jointly written by volunteers. | wiki
A __ is a company's method of doing business to generate revenue to sustain itself. | business model
A __ is a data file that is placed on a user's hard drive by a remote Web server, frequently without disclosure or the user's consent that collects information about the user's activities at a site. |
cookie
A __ is a group of people who have some kind of commercial or business relationship. | business network
A __ is a group of people with a common interest who interact on the Internet. | virtual (Internet) community
A __ is a social network whose primary objective is to facilitate business connections and activities. | business social network
A __ is an auction in which a seller entertains bids from buyers, and bidders increase the price sequentially. | forward auction
A __ is someone whose advice or view carries some weight in making a final purchasing decision. | influencer
A ____ application is one that the company depends upon for its well-being. | e. Mission critical
A ____ is an existing, often relatively inefficient application developed for an old platform. | e. Legacy application
A ____ is operated by a trusted third party that offers bandwidth and other value added services to facilitate interconnectivity among multiple organizations. | b. Value added network (VAN)
A _____ is suitable for mobile users who need to make very short-range deviceto-device wireless connections within a small space, such as a single room, and most | a. Personal area network
A _____ is suitable for mobile users who need to make very short-range device-to-device wireless connections within a small space, such as a single room, and most commonly with Bluetooth. |
personal area network
A ______ has capabilities that can be used to perform routine tasks that require intelligence such as providing customers with assistance based on their movements on a Web site | software agent
A ______ has capabilities that can be used to perform routine tasks that require intelligence such as providing customers with assistance based on their movements on a Web site. | software
agent
A ______ is a companys method of doing business to generate revenue to sustain itself. | business model
A _____ is a wealthy individual who contributes personal funds and possibly expertise at the earliest stage of business development. | angel
A B2B consortium has the potential to reduce prices of individual products, thus enabling and encouraging consortium members to buy more. | T
A botnet is: | a coordinated network of computers that can scan for and compromise other computers and launch DOS attacks.
A botnet is: | a huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.
A botnet is: | d. A coordinated network of computers that can scan for and compromise other computers
A brick-and-mortar organization performs its primary business offline, selling physical products by means of physical agents. | True
A broader definition of EC that includes not just the buying and selling of goods and services, but also servicing customers, collaborating with business partners, and conducting electronic
transactions within an organization best defines: | e-business
A business model is a description of how an organization intends to generate revenue through its business operations. | TRUE
A business model is a method of doing business by which a company can generate revenue to sustain itself. | True
A business model is an analysis of the organizations customers and, from that, a discussion of how that organization will achieve profitability and sustainability by delivering goods and services
to those customers. | T
A business model outlines how the organization or the EC project will generate revenue through sales, transaction fees, advertising fees, affiliate fees, or other revenue sources. | False
A business model outlines how the organization, or the EC project, will generate revenue through sales, transaction fees, advertising fees, affiliate fees, or other revenue sources | False
A business such as Apple Computers making online transactions with its trading partners is an example of: | B2B
A business using B2C business model trades with other businesses. | False
A card that draws the payment amount directly from the users checking account is called a(n): | debit card
A category of Internet applications that helps connect friends, business partners, or individuals with specific interests by providing free services such as photo presentation, e-mail, blogging, and
so on using a variety of tools best describes: | social networking.
A click-and-mortar retailer is a combination of both the brick-and-mortar retailer and an online transactional Web site. | TRUE
A common inefficiency in procurement management is spending too much time on mros and not enough time on high value items. | True
A company allows peoples to watch a sports competition in real-time for a fee. So that companys revenue follows: | Subscription Model
A company submits its surplus to the exchange and receives points of credit, which the company can then use to buy items that it needs. | bartering exchange
A company that creates and manages many-to-many markets is called a: | market maker.
A company that manages application servers in a centrally controlled location rather than on a customer's site is called a(n) | application service provider (ASP)
A company that sells products directly to the end consumer is considered a B2C firm. | True
A company uses a third-party's Web site to help them find clients. When the sale is made, the third party helps broker and arrange shipment of the items. The third party is an online intermediary.
| True
A company-based acquisition site that uses e-procurement methods such as reverse auctions, negotiations, or group purchasing to overcome the manual searching of e-stores and e-malls, is
referred to as a(n) __ | buy-side e-marketplace.
A companys internal operations and its relationships with suppliers and other business partners are frequently: | as complex as customer-facing applications such as taking an order online.
A competitive advantage derived from ____ is generally considered the best approach for a company. | d.improved value chain and/or supply chain efficiency
A consortium trading exchange (CTE) or consortia is most appropriate for fragmented markets with large numbers of both buyers and sellers. | F
A consumer who purchases an item for a business can be described as an organizational buyer. | False
A cookie is a data file that is placed on a users hard drive by a remote Web server only when the users gives full consent to collect information about the users activities at a site. | F
A corporation uses the Internal Revenue Service's Web site to learn how to pay its estimated quarterly income taxes. This is an example of: | E2E
A criticism of Web 2.0 is the inability to create new business models. | FALSE
A decision by a judge that may be used as a standard in similar cases that follow is referred to as: | legal precedent
A duty is | a legal claim that others not interfere with a protected interest
A file containing customer status and customer information that is used when processing transactions to identify known problem customers is a: | negative list.
A file is encrypted, and then decrypted using the same key. What type of encryption is described? | Private key
A firewall is configured to examine not only the header of incoming messages but also their contents. What type of firewall is described? | Stateful packet inspection
A firm that operates both physical stores and an online e-tail site is said to be a click-and-mortar business selling in a _____. | multichannel business model
A focal point for all corporate training and learning activities, including online ones best describes: | learning center.
A free Internet news service that broadcasts personalized news and information, including seminars, in categories selected by the user is known as | Webcasting.
A good example of dynamic pricing occurs in where prices vary and final prices are determined by the forces of supply and demand. | auctions
A government agency uses an online reverse auction to satisfy the tendering system requirements specified by law. This is an example of: | e-Procurement
A group of bidders artificially inflate the price of an item to scare off other bidders. They then back out at the last minute, leaving one of them with a relatively low bid. What type of fraud is
this? | Bid shielding
A hacker uses special software to access a server on your network. What type of attack is this? | Technical
A has capabilities that can be used to perform routine tasks that require intelligence such as providing customers with assistance based on their movements on a Web site. | software agent
A host-based intrusion detection system (IDS): | Resides on the server that is being monitored where it can detect whether critical or security-related files have been tampered with or
whether a user has attempted to access files that he or she is not authorized to use.
A is a companys method of doing business to generate revenue to sustain itself. | business model
A is a form of business alliance composed of several business partners that share the costs and resources for the development or production of a product or service. | virtual corporation
A is suitable for mobile users who need to make very short-range device to-device wireless connections within a small space, such as a single room, and most commonly with Bluetooth. |
personal area network
A job opening in the Sales Department posted on the company's Intranet by the Human Resources Department is an example of: | B2E
A key feature of social media is that users control and use the media, often at little or no cost. | TRUE
A large e-tailer, such as Amazon.com, for example, uses all of these services and also employs auction services, payments services, logistics support, and more. This phenomenon is called |
hypermediation
A large number of EC companies, especially e-tailing and B2B ones, failed from 1999 to 2005 for each of the following reasons EXCEPT: | The companies failed to register with search
engines, such as Google.
A large organizations can develop an effective procurement system by creating an internal marketplace that combines the catalogs of all its approved suppliers into a single internal electronic
catalog, which is searched for product availability and delivery times. | T
A law that makes it a crime to send commercial e-mail messages with false or misleading message headers or misleading subject lines is: | CAN-SPAM.
A legally binding contract requires a few basic elements. Which of the following is not one of those elements? | agreement
A limitation of e-bartering for businesses is that excess capacity items such as office space, storage, factory space; idle facilities; and labor cannot be bartered. | F
A major block in the widespread implementation of collaborative commerce is: | the lack of universally accepted standards.
A major entertainment company has four studios that have been in the same location for more than ten years. The company includes a page on its Web site with addresses, phone numbers, and
general e-mail addresses for each of these studios. None of this information has changed since the Web site was developed. This is an example of __ content. | static
A major limitation of RFID currently is the restriction of the environments in which RFID tags are easily read. | T
A major objective of Web 2.0 is to enhance creativity, information sharing, and collaboration. | TRUE
A major purpose of an organizational knowledge base is to support and allow . | knowledge sharing
A major requirement for any medium- to large-scale company that is moving to EC implies an integration between all the activities conducted on the Web and the ERP/MRP/SCM solutionsin
other words, creating an e-supply chain and managing it. | T
A major shortcoming with authentication services is: | two different authenticators may come up with different opinions regarding the authenticity and description of a given item.
A management tool that assesses organizational progress toward strategic goals by measuring performance in a number of different area is | balanced scorecard
A market maker bills a buyer for reviewing several seller contracts and making a recommendation on what to buy and from whom. The revenue model being used in this example is the: | fee for
service model.
A market maker charges a percentage on every buy and sell made in the exchange. The revenue model in place in this exchange is the: | transaction fee model.
A market maker evaluates an exchange between a buyer in the United States and a seller in Spain to ensure that import laws for the U.S. are followed. This is an example of the market maker: |
maintaining exchange infrastructure.
A market mechanism that uses a competitive process in which a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers best defines: | auction.
A marketer that uses e-mail to advertise to potential customers is called a: | viral marketer.
A marketplace in which sellers and buyers exchange goods and services for money (or other goods and services), but do so electronically defines __. | marketspace
A method of doing business by which a company can generate revenue to sustain itself is called: | Business model
A method of encryption that uses a pair of matched keys, including a public key to encrypt a message and a private key to decrypt it, describes: | public asymmetric key encryption.
A mode is purchasing where prices are negotiated or discounted is _____, which refers to nonfixed prices, such as those in auctions or stock markets. | dynamic pricing
A music company can file a __ against youtube and myspace for any interference with the ability to profit from its IP or for profiting from the recording industrys property without authorization
and compensation | lawsuit or civil charge
A network that uses the Internet to link ent intranets best defines: | extranet.
A new type of e-commerce refers to the localization of products and services through mobile device and context aware computing technologies is called _____ | L-Commerce
A niche e-tailer may be able to support an online effort that may not have enough customers in any particular local market. | True
A payment card that provides the holder with credit to make purchases up to a limit fixed by the card company and charges relatively high interest rates on unpaid balances is the: | credit card.
A piece of software that integrates departments and functions across a company to serve all of the company's needs is what type of system? | ERP
A plan for organizing the underlying infrastructure and applications of a site best describes: | EC architecture.
A podcast is distinguished from other digital audio formats by: | its ability to be downloaded automatically, using software capable of reading feed formats such as RSS
A portal is an information gateway that attempts to address information overload by enabling people to search and access relevant information from disparate IT systems and the Internet, using
advanced search and indexing techniques, such as Googles desktop. | T
A portal that acts as a gateway to other portals and Web sites operated by an organization is called a(n) | corporate intranet portal.
A private e-marketplace in which one company sells either standard and/or customized products to qualified companies defines __. | buy-side e-marketplace
A pure-play e-tailer dedicates the majority of their capital to online sales, with offline sales lagging behind. | False
A retail company that sell directly to consumers over the Internet without maintaining a physical sales channel. That is a example of __ | Pure-play e-tailers
A retailer is a sales intermediary, a seller that operates between manufacturers and customers. | T
A scheme for securing e-payments using public key encryption and various technical components best describes: | public key infrastructure.
A searchable database of computer hardware that meets a strict set of environmental criteria best describes: | Electronic Product Environmental Assessment Tool.
A seller has his friend bid on his auction to help drive up the price. What type of fraud is this? | Shilling
A sell-side marketplace deals with one seller and many potential buyers. | True
A single company that deploy an E-Commerce system by build up a website where their services are sold. What kind of EC system they have? | storefront
A smart card containing a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip is a: | contact card.
A software agent that surveys user's reading interests, then uses machine learning to find new Web pages and news articles using neural-network-based collaborative filtering technology is
called: | a learning agent.
A special network model that enables transindustry collaboration is the which connects all Internet business services. | business-to-exchange (or B2X)
A special type of intermediary in e-commerce is the B2B _____ which connect manufacturers with business buyers, such as retailers or resellers in the computer industry. | e-distributor
A specific outcome of the strategy initiation phase is a clear statement of the companys ____, which summarizes the customer segment, competitor target, and the core differentiation of ones
product from the offerings of competitors. | value proposition
A specific outcome of the strategy initiation phase is the ____, which includes the vision, mission, value proposition, goals, capabilities, constraints, strengths, and weaknesses of the company. |
company analysis
A suite of network protocols designed to enable different kinds of wireless devices is called: | Wireless Application Protocol.
A summary of a message, converted into a string of digits after the hash has been applied, best describes: | message digest.
A supply chain can be broken into three major parts. The part of the supply chain includes the activities of a company with its suppliers and their connections with their suppliers. | upstream
A supply chain can be broken into three major parts. The part of the supply chain includes all of the in-house processes used in transforming the inputs received from the suppliers into the
organizations outputs. | internal
A supply chain can be broken into three major parts. The part of the supply chain includes all the activities involved in delivering the products to the final customers. | downstream
A supply chain can be broken into three major parts: upstream, internal, and downstream. | T
A supply chain involves activities that take place during the entire product life cycle, from dirt to dust. | T
A supply chain involves activities that take place during the entire from dirt to dust. | product life cycle
A system that locates, extracts, and provides specific answers to user questions expressed in natural language best describes: | automated question-answer.
A technique known as web page hijacking | enables a malicious Web master to displace the pages of an EC Web site in the Search Engine Results Pages (SERPS) to redirect customers to
another site.
A technology that is used to electronically transfer routine documents, such as invoices and purchase orders, and for financial transactions is _____. | electronic data interchange
A third party that operates an exchange and in many cases, also owns the exchange is known as a(n): | market maker
A traditional brick-and-mortar store with a mature Web site uses a click-and-mortar strategy to do all of the following EXCEPT: | reduce refunds and exchanges.
A transaction completed electronically between two businesses over the Internet, extranets, intranets or private networks is a B2B transaction. | True
A type of broker that helps consumers compare different stores is a: | shopping facilitator.
A type of e-book referred to as the ______ is a truly multimedia, online-only book that has hyperlinks, three-dimensional text and display, graphics, audio, and video. It supports nonlinear
exploration of topics. | rubics-cube hyperlink book
A type of mobile social networking where the company does not have a relationship with a wireless carrier is: | off-deck.
A type of online mall that is basically a directory organized by product type best describes | referring directory.
A typical EC fulfillment process involves all of the following activities EXCEPT: | b. Just-in-time inventory management.
A user profile defines customer preferences, behaviors, and demographics and can be generated by observing what the user does online. | TRUE
A vulnerability | is a weakness in software or other mechanisms that a hacker can use directly to gain access to a system or network.
A Web site asks users to fill out a questionnaire about themselves. The Web site then personalizes to the user and makes recommendations. What type of personalization is being used? | Rule-
based filtering
A Web site offering content created by a third party transparently to customers is an example of: | Syndication.
A Web-based seller of cds carefully monitors the prices charged by its competitors for identical products. This company has the ability to change a given price within three minutes in response to
changes by competitors. This is an example of EC: | agility.
A(n) __ is a type of pop-up ad that appears after a user clicks a link and remains | c. Interstitial
A(n) __ is an HTML coding statement that describes the content of a Web page | c. Meta-tag
A(n) __ is defined as a group of people that have some kind of commercial or business relationship such as the relationships between sellers and buyers, buyers among themselves, buyers and
suppliers, and colleagues and other colleagues. | business network
A(n) ___ is a document retrieval system designed to help find information stored on a computer system, such as on the Web, inside corporate or proprietary files, or in a personal computer |
search engine
A(n) ____ is a private corporate network that uses standard Internet protocols and interfaces. | e. Intranet
A(n) ____ is a pseudo private data network that uses public bandwidth in combination with a tunneling protocol and security procedures. | c.virtual private network (VPN)
A(n) ______ is an HTML coding statement that describes the content of a Web page and is used by search engines to index the sites content so that it can be found. | meta-tag
A(n) ______ is an order-processing technology that allows customers to accumulate items they wish to buy while they continue to shop. | Electronic shopping cart
A(n) _______ is a single point of access through a Web browser to help users find relevant and accurate business information and reduce information overload. | information portal
A(n) _______ is an online third party that brokers B2B transactions between a buyer and seller. | intermediary
A(n) _______ takes place between sellers and buyers in one industry or for one | b. Vertical auction
A(n) _______ takes place between sellers and buyers in one industry or for one commodity, such as flowers, cars, or cattle | vertical auction
A(n) __ is a company, university, or nonprofit organization that supports promising businesses in their initial stages of development | incubator
A(n) __ is a type of pop-up ad that appears after a user clicks a link and remains while content is loading to capture the users attention for a short time, either as a promotion or a lead-in to the
sites homepage or to advertise a product or a service. | interstitial
A(n) __ is defined as a group of people that have some kind of commercial or business relationship such as the relationships between sellers and buyers, buyers among themselves, buyers and
suppliers, and colleagues and other colleagues. | business network
A(n) ____ is an exact duplicate of the original Web site physically located on a Web server on another continent | mirror site
A(n) _____ is a computer system capable of integrating, storing, editing, | a. Geographical information system
A(n) _____ is a computer system capable of integrating, storing, editing, analyzing, sharing, and displaying spatial information. | geographical information system
A(n) _____ is a wealthy individual who contributes personal funds and possibly expertise at the earliest stage of business development | angel
A(n) ______ Web site does little more than provide information about the business and its products | informational
A(n) is a computer system capable of integrating, storing, editing, analyzing, sharing, and displaying spatial information. | geographical information system
A(n) is a single point of access through a Web browser to help users find relevant and accurate business information and reduce information overload. | information portal
A(n) is a type of pop-up ad that appears after a user clicks a link and remains while content is loading to capture the user's attention for a short time, either as a promotion or a lead-in to the site's
homepage or to advertise a product or a service. | interstitial
A(n) is an HTML coding statement that describes the content of a Web page and is used by search engines to index the site's content so that it can be found. | meta-tag
A(n) is an online third party that brokers B2B transactions between a buyer and seller. | intermediary
A(n) takes place between sellers and buyers in one industry or for one commodity, such as flowers, cars, or cattle. | vertical auction
A__ is a company, university, or nonprofit organization that supports promising businesses in their initial stages of development. | incubator
A__ is a form of business alliance composed of several business partners that share the costs and resources for the development or production of a product or service. | virtual corporation
A______ Web site does little more than provide information about the business and its products. | informational
Acceptable use policy (AUP) | Policy that informs users of their responsibilities when using company networks, wireless devices, customer data, and so forth.
Acceptance testing | Determining whether a Web site meets the original business objectives and vision.
Access control | Mechanism that determines who can legitimately use a network resource.
Access to a network ought to be based on: | the policy of least privilege where access to network resources are blocked and permitted only when needed to conduct business.
According to a survey by Credit Research Foundation, the major reasons companies turn to EIPP solutions are all of the following EXCEPT: | elimination of billing disputes
According to an Australian Government 2.0 task force report, by embracing Government 2.0 governments can: | do all of the above.
According to an informationweek survey of business technology experts, wikis are the most useful Web 2.0 tools in Enterprise 2.0. | FALSE
According to data from emarketer, approximately __ shop online and/or research offline-sales online. | three in four Internet users age 14 and over
According to Inmon, B2C clickstream data can reveal information each of the following EXCEPT: | What goods the customer wanted to but could not find.
According to Internet statistics, 67 percent of consumers abandoned their shopping carts because of the lack of satisfactory product information. | T
According to O'Reilly (2005), Web 2.0 Level 1 applications operate offline but gain features from going online. | True
According to Peter Drucker, e-commerce is profoundly changing markets, industry structures, products and services, consumer segmentation, consumer values and consumer behavior; jobs, and
labor markets. | True
According to research, customer satisfaction with an Internet store: | drops dramatically when certain Web site features fail to perform properly, such as the contents reliability, loading
speed, or usefulness.
According to the __ revenue model, customers pay a fixed amount, usually monthly, to receive some type of service. | subscription fees
According to the _______ model, an organization can increase brand awareness or even generate sales by Web-based word-of-mouth marketing or promoting a product or service to other people.
| viral marketing
According to the ______ revenue model, companies receive commissions for referring customers to others EC Web sites. | affiliate fees
According to the ______ revenue model, customers page a fixed amount, usually monthly, to receive some type of service. | subscription fees
According to the Business Environment Impact Model, _____ provide support to organizations activities and to actual performance, countering business pressures. | EC and IT
According to the CSI Computer Crime and Security Survey, firewalls were the most commonly used defense technologies in 2008. | FALSE
According to the CSI Computer Crime Security Survey, the most frequently occurring computer attacks were from viruses in 2008. | TRUE
According to the EC consumer behavior model, personal characteristics and environmental characteristics are classified as: | independent variables
According to the model, an organization can increase brand awareness or even generate sales by Web-based word-of-mouth marketing or promoting a product or service to other people. | viral
marketing
Ad management | Methodology and software that enable organizations to perform a variety of activities involved in Web advertising (e.g., tracking viewers, rotating ads).
Ad views | The number of times users call up a page that has a banner on it during a specific period; known as impressions or page views.
Address Verification System (AVS) | Detects fraud by comparing the address entered on a Web page with the address information on file with the cardholders issuing bank.
Addressing mission-critical, high-volume transaction processes is the goal of: | production workflow applications.
Advantages of the electronic job market for employers include each of the following except | learning how to use their voice effectively in an interview.
Advertising in chat rooms, blogs, or social networks can achieve each of the following EXCEPT: | they can be used as one-to-one connections between a company and its customers
Affiliate marketing | A marketing arrangement by which an organization refers consumers to the selling companys Web site.
Affiliate marketing refers to using banner advertisements to bring customers to your site. | False
After an EC project has been implemented, the testing of the quality of user's experience when interacting with the site is called: | usability testing.
After an EC project has been implemented, the testing that is done to assure various modules in the project work together is called: | integration testing
After four years in business, a magazine publisher decides to add the online distribution of its magazine to its existing traditional publishing business. The company would need to develop a: |
business case.
Agentrics is the worlds largest B2C exchange for retailers, such as Sears and Best Buy, whose objective is to simplify and automate supply chain processes. | F
Alibaba China is Chinas largest online marketplace for both domestic and international trade among businesspeople and a trusted community of members who regularly meet, chat, search for
products, and do business online. | F
All click-and-mortar retailers started life as a traditional storefront with a physical retail presence only and over time adopted an online transactional capability as well (brick only to brick-and-
click). | F
All of the following about RFID are true EXCEPT: | an RFID tag can hold 20 times the amount of information a bar code can hold, and the tag can be read through cardboard, wood, and plastic
at a range of up to 100 feet
All of the following about the strategic planning process are true EXCEPT: | d. The strategic planning process begins with strategy formulation.
All of the following about wireless wide area networks (WWAN) are true EXCEPT: | The single WWAN network standard insures compatibility of handsets within and between countries.
All of the following apply to EC in developing economies EXCEPT: | Developing economies struggle with various issues that create too many business and technology risks to justify
investment in those economies at this time.
All of the following apply to instant video EXCEPT: | The highest quality approach is to add video cameras to the participants computers
All of the following apply to social network theory EXCEPT | Between a set of nodes, there is one kind on tie.
All of the following are advantages of building Web sites internally EXCEPT | it provides the fastest speed to market
All of the following are advantages of e-learning EXCEPT: | college professors are anxious to develop new online courses.
All of the following are advantages of e-learning EXCEPT:: All of the following are advantages of e-learning
All of the following are advantages of using purchase cards EXCEPT: | they are widely accepted in international trade.
All of the following are barriers to location-based m-commerce EXCEPT: | There are presently not enough location-based systems to make this a viable technology.
All of the following are benefits of e-auctions to buyers except: | can liquidate large quantities quickly.
All of the following are benefits of letters of credit (lcs) EXCEPT: | lcs are cheap and easy to establish.
All of the following are correct about market research methods EXCEPT: | Direct mail marketing methods are usually cost-effective.
All of the following are critical success factors (csfs) of the Old Economy EXCEPT: | Create new partnerships, stay with core competency.
All of the following are elements of a companys strategy EXCEPT: | c. Day-to-day operations.
All of the following are examples of e-government EXCEPT: | a company sells army and navy surplus supplies at auction over the Internet.
All of the following are examples of interactive entertainment EXCEPT: | purchasing theatre tickets online.
All of the following are important security functions of proxy servers except: | d. They improve network performance.
All of the following are potential benefits from auctions to sellers EXCEPT: | c. Sellers are always anonymous.
All of the following are potential drawbacks of e-learning EXCEPT: | b. Knowledge retention is lower than in traditional classrooms.
All of the following are potential sources of revenue for an exchange EXCEPT: | shipping and handling fees.
All of the following are potential sources of revenue for online independent travel agents EXCEPT: | direct marketing revenues.
All of the following are problems in implementing e-Government EXCEPT: | the technology needed to implement stage 6 of the Deloitte transformation process does not exist yet
All of the following are situations when a business plan should be done EXCEPT: | a. When an existing business is deploying a CRM system.
All of the following are true about product lifecycle management (PLM) EXCEPT: | The demand for PLM in limited because it does not apply to products that have short life cycles or are
complex.
All of the following are true about youtube EXCEPT: | Yahoo! Purchased youtube for US$1.65 billion in stock in 2006
All of the following are types of communication and collaboration done in real time EXCEPT: | blogging
All of the following are ways to use the Internet to find information about an individual EXCEPT: | Stealing the individuals computer.
All of the following categories have already been selling well online EXCEPT: | new cars
All of the following describe system scalability EXCEPT | Scalability dimensions are independent because scaling up the size of the system in one dimension does not affect the other
dimensions.
All of the following determine the degree of collaboration between off-line and online activities in a business EXCEPT: | the pricing strategy
All of the following statements apply to hate Web sites EXCEPT: | The intent of most hate Web sites is to commit fraud
All of the following would be considered c-commerce EXCEPT: | aggregating catalogs on a central server.
All the activities that are related to order aggregation and fulfillment, inventory management, purchasing from suppliers, accounting and finance, insurance, payment processing, packaging, and
delivery are done in what is termed the_______ of the business. | back end
Also known as private industrial networks are Web-based networks owned by one large seller or buyer for inter-organizational communications. | company-centered networks
Although a companys success is clearly dependent on finding and retaining customers, its success may be far more dependent on what is behind the Web page than on what is on the Web page. |
T
Although both marketplaces and marketspaces can sell physical products, the marketspace also can sell digital products, which are goods that can be transformed to digital format and delivered
instantly over the Internet. | T
Although there are practical advantages to being an e-tailer, such as lower overhead costs, it has many drawbacks and barriers so the winners in many market segments will be companies that use
the click-and-mortar approach. | T
Although used occasionally in B2C commerce, customized catalogs are especially useful in B2B e-commerce for each of the following reasons EXCEPT: | Intranets, in particular, can deliver
customized catalogs to different business customers.
Amazon.com experienced all of the following EXCEPT: | The companys financial success has been assured.
Amazon.com experienced each of the following except | establishing a grocery delivery service called amazonconnect.
Among the forms of online B2B payments, _______ is second only to ACH in terms of frequency of use. | Fedwire, or wire transfe
An ______ is a virtual marketplace in which sellers and buyers meet and conduct different types of transactions. | e-store
An ad that appears underneath the current browser window, so when the user closes the active window the ad is still on the screen describes | pop-under ad.
An advantage of e-checks is that they: | fit current business practices, and so require little process reengineering.
An advantage of the electronic job market for job seekers is that they can assess their market value. | TRUE
An agreement that requires computer users to take specific steps to allow the collection of personal information is called: | opt-in.
An analytical tool in which a company looks for points of differentiation between competitors and itself is called: | competitor analysis grid
An attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources best describes: | denial-of-
service attack.
An attack using a previously unknown vulnerability compromises a system. What type of attack is described? | Zero-day incident
An auction in which there is one buyer and many potential sellers; or in which a buyer places an item for bid on an RFQ system and the lowest bid wins is referred to as all of the following
EXCEPT: | Reverse auctions.
An auction in which there is one buyer and many potential sellers; or in which a buyer | b. Forward auctions.
An auction is a competitive process and market mechanism that uses a competitive process by which a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers. | T
An auction is a market mechanism that uses a competitive process by which a seller solicits consecutive bids from buyers or a buyer solicits bids from sellers. | True
An auction is characterized by the competitive nature by which the final price is reached. | True
An EC model in which all of the participants are either businesses or other organizations is | business-to-business (B2B) e-commerce.
An EC security strategy requires multiple layers of defense against risks from malware, fraudsters, customers, and employees. | TRUE
An electronic card that contains information that can be used for payment purposes best describes: | payment card
An electronic shopping cart is an order-processing technology that allows customers to accumulate items they wish to buy while they continue to shop. | TRUE
An electronic storefront includes several mechanisms that are necessary for conducting the sale. The most common mechanisms include each of the following EXCEPT: | a supply chain
An e-tailer can use cookie files and other technologies to track the specific browsing and buying behavior of each consumer. With that information, the e-tailer can create a marketing plan
tailored to that consumers pattern by showing items of interest or offering incentives that appeal to that consumers sense of value, which is referred to as | personalization.
An e-tailer uses cookies to identify returning customers and to provide suggested products for purchase based on prior shopping behavior. This is an example of ___ | personalization
An example of a successful aggregation of suppliers' catalogs is that of __, which aggregates more than 10,000 items from the catalogs of approved suppliers into an internal electronic catalog. |
mastercard International
An example of business-to-consumer (B2C) is when Dell provides customer service online by collaborating electronically with its partners. | False
An example of G2C is a: | driver paying for the renewal of his auto tag online.
An exchange charges an annual fee of $25,000 for all parties who want to trade in the exchange. The revenue model in use by this exchange is the: | membership fee model.
An exchange that handles materials used by companies in different industries is referred to as a(n): | horizontal exchange
An exchange whose members are in one industry or industry segment and that trades only in materials/services unique for that industry is referred to as a(n): | vertical exchange
An extranet is a network that uses private corporate networks to link together multiple intranets. | False
An extranet is a network that uses the Internet to link together multiple intranets. | True
An important category of intangible benefits is ______ factors that include comfort to employees, impact on the physical environment, changes to the power distribution in an organization, and
preventing invasion of the privacy of employees and customers. | social subsystem
An intermediary is a third party that operates between sellers and buyers. | TRUE
An internal corporate network that uses Internet tools, such as Web browsers, is known as an intranet. | True
An Internet acceptable use policy (AUP) is an important safeguard because | without a formal AUP, it is much more difficult to enforce acceptable behaviors and eliminate unacceptable
behaviors, and punish violators
An intranet is an internal network for companies that uses Internet standards. | True
An item is offered with a minimum bid. The winner pays the exact price of his bid. What type of auction is being described? | Forward auction
An objective of conducting market research is to understand the relationships between dependent and intervening variables so that vendors can make informed decisions on the intervening
variables. | T
An online community that harnesses the power of one's social networks for the introduction, buying, and selling of products, services, and resources, including one's own creations describes: |
social marketplace.
An online intermediary that offers businesses access to hundreds of parts and services provided by multiple suppliers is called | e-procurement
An online seller of travel services that generates revenue by charging fees for its services is an example of a(n): | transaction broker.
An online university from which students take classes from home or other offsite locations, usually via the Internet best describes: | virtual university.
An order-processing technology that allows customers to accumulate items they wish to buy while they continue to shop best defines. | electronic shopping cart.
Angel investor | A wealthy individual who contributes personal funds and possibly expertise at the earliest stage of business development.
Anna's company sells a variety of products to her business clients. What type of model is she using? | Sell-side marketplace
Apple and Google undertook a formal merger to offer iphone capabilities, such as delivering Google services through Apple hardware. | FALSE
Applying business analytics techniques and business intelligence such as data mining and online analytic processing to CRM applications describes what? | Analytic CRM
Approximately what percent of Internet shoppers use search engines to find products and services? | 75%
Are becoming a necessity in many industries due to the information glut. | Specialized search engines
Are computer-based whiteboards that work like real-world whiteboards with markers and erasers, except all participants can join in. | Interactive whiteboards
Are customers who are willing to shop online because they dislike going to grocery stores. | Shopping avoiders
Are extremely busy customers willing to shop online in order to free up time. | Time-starved customers
Are financial institutions that provides a customer with a payment card. | Issuing banks
Are formal agreements regarding the division of work between a company and its vendors. | Service level agreements
Are gateways to storefronts and e-malls that may be comprehensive or niche oriented. | Shopping portals
Are many-to-many e-marketplaces in which many buyers and many sellers meet electronically to trade with each other. | Exchanges
Are markets in which companies can trade or exchange placement of banner ads on each others Web sites. | Banner exchanges
Are markets in which the individual sell-side or buy-side company has complete control over participation in the selling or buying transaction. | Private e-marketplaces
Are markets that concentrate on a service, product, or materials that are used in various types of industries such as office supplies or pcs. | Horizontal marketplaces
Are markets that deal with one industry or industry segment such as steel or chemicals. | Vertical marketplaces
Are meta-search engines that search a range of related sites or search engines, seeking the best product or service for a particular consume. | Travel bots
Are online markets owned and operated by a single company. | Private e-marketplaces
Are online meetings whose members are in different locations, even in different countries. | Virtual meetings
Are organizations that conduct their business activities solely online. | Virtual (pure-play) organizations
Are portals that offer fairly routine content for broad audiences and are the most popular portals on the Internet; e.g., yahoo.com, aol.com, and msn.com. | Commercial (public) portals
Are private, third-party-managed common carriers that provide communications services and security and which are used to implement traditional EDI systems. | Value-added networks (or
vans)
Are retailers who conduct business in the physical world, in traditional stores. | Brick-and-mortar retailers
Are sites that evaluate and verify the trustworthiness of e-tailers | Trust verification sites
Are third-party vendors that conduct promotions, especially large-scale ones. | Admediaries
Are those that conduct some EC activities, usually as an additional marketing channel. | Click-and-mortar (or click-and-brick) organizations
Are those who are young and comfortable with technology. | New technologists
Are tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server. | Web bugs
Are tools that combine data from two or more Web sites to create new applications | Mashups
Are trading venues open to all interested parties (many sellers and many buyers) that use a common technology platform and that are usually run by third parties or industry consortia. | Public e-
marketplaces (or public exchanges or exchanges)
Are virtual communities organized by an interest, such as political parties, or by product, company, or health topic | Affinity portals
Arrange the following items in the correct order of Knowledge Management (start at the top, end at the bottom) | ,Create and capture,Refine,Store,Manage,Disseminate,Assess and evaluate
Arrange the following items in the correct order of the EC order fulfillment process (beginning step at top, and ending step at the bottom) | ,Making sure the customer will pay,Checking for
in-stock availability,Arranging shipments,Replenishment,Contacts with customers
As a company moves to incorporate an online presence with its traditional brick-and-mortar operation, it adds the costs related to training for all personnel in the capabilities of the EC system and
a new advertising campaign to announce its new site to the costs directly associated with building the new Web presence. In this case, training and advertising are examples of: | complementary
investments.
As in e-commerce, m-commerce B2C applications are concentrated in each of the following areas EXCEPT: | c. Telecommunications
As the volume of customers, products, vendors, and information increases, it becomes uneconomical, or even impossible, for customers to consider all relevant information and available
products and services. The practical solution to handling such information overload is to | use software or intelligent agents.
As with any IT project, management needs to be able to justify the development and use of a corporate portal by comparing its cost with its benefits. The challenge is that despite the tangible
benefits from investment in portal technology, such as include increased revenues and customer loyalty, most of the benefits of portals are intangible. | T
Association ABC helps its members get discounts on the purchases by buying in bulk. What type of business model are they using? | Group purchasing
Assurance that stored data has not been modified without authorization and a message that was sent is the same message that was received is referred to as: | integrity.
At hospitals and supermarkets, inventory reorder points have been automated so that when inventory gets down to a certain point the system will automatically notify a human of the exact
amount to reorder. | F
At the center of every exchange is a the third party that operates the exchange and, in many cases, may also own it. | market maker
Attracting and retaining loyal customers is the most important issue for e-tailers because customer loyalty can lower marketing and advertising costs, transaction costs, customer turnover
expenses, and failure costs such as warranty claims. | TRUE
Attracting large business sellers to public exchanges is often difficult for all of the following reasons EXCEPT: | advertising costs in public exchanges are very expensive
Attractors | Web site features that attract and interact with visitors in the target stakeholder group.
Auction | A competitive process in which a seller solicits consecutive bids from buyers (forward auctions) or a buyer solicits bids from sellers (backward auctions). Prices are
determined dynamically by the bids.
Auction sites like ebay have increased opportunities for ____ marketing. | C2C
Auctions are all of the following EXCEPT: | a. They are suitable for most consumer goods.
Auctions are based on dynamic pricing. | TRUE
Auctions done in exchanges or double auctions are ______ auctions. | d. Many buyers, many sellers
Audit | An important part of any control system. Auditing can be viewed as an additional layer of controls or safeguards. It is considered as a deterrent to criminal actions especially
for insiders.
Authentication | Process to verify (assure) the real identity of an individual, computer, computer program, or EC Web site.
Authentication provides the means to reconstruct what specific actions have occurred and may help EC security investigators identify the person or program that performed unauthorized actions.
| True
Authorization | Determines whether a buyers card is active and the customer has sufficient funds.
Automated Clearing House (ACH) Network | A nationwide batch-oriented electronic funds transfer system that provides for the interbank clearing of electronic payments for
participating financial institutions.
Automated warehouses for B2C companies are designed: | to facilitate the delivery of small quantities of product to a very large number of customers.
Autoresponders | Automated e-mail reply systems (text files returned via e-mail) that provide answers to commonly asked questions.
Availability | Assurance that access to data, the Web site, or other EC data service is timely, available, reliable, and restricted to authorized users.
Avatars | Animated computer characters that exhibit humanlike movements and behaviors.
B
B2B can increase the efficiency and effectiveness of supply chains or dramatically change the supply chain by eliminating one or more intermediaries. | F
B2B consortia may face antitrust challenges. Which of the following would probably not signal suspicion in a B2B consortium exchange? | Rapidly falling prices for end users
B2B EC can increase the efficiency and effectiveness of supply chains or dramatically change the supply chain by eliminating one or more intermediaries. | True
B2B EC transactions that involve one seller selling to many buyers is called an exchange. | F
B2B only includes electronic transactions between businesses conducted over the public Internet. | False
B2B payments are part of a much larger financial supply chain that includes all of the following EXCEPT: | financial reporting.
B2B systems which are used for communication, design, planning, information sharing, and information discovery are called: | collaborative commerce.
B2B transactions that involve communication, design, planning, information sharing, and activities beyond financial transactions among business partners is referred to as ______ | collaborative
commerce
B2bbusiness.com offers classified ads, a fixed price catalog, auctions and community services. What type of B2B many-to-many model are they using? | B2B portal
B2C and B2B orders have similar order-fulfillment processes and pricing models. | False
Back end | The activities that support online order fulfillment, inventory management, purchasing from suppliers, payment processing, packaging, and delivery.
Balanced scorecard | A management tool that assesses organizational progress toward strategic goals by measuring performance in a number of different areas.
Banking Trojan | A Trojan that comes to life when computer owners visit one of a number of online banking or e-commerce sites.
Banks are more selective about who gets an account for accepting credit cards online because | CNP transactions are less secure and riskier
Banner | On a Web page, a graphic advertising display linked to the advertisers Web page.
Banner ads that appear when a predetermined word is queried from a search engine are | keyword banners.
Banner advertising on Web sites helps trigger a realization that there is a gap between reality and a desired state, which occurs in the ____ stage of the EC purchase decision-making process. See
figure | need identification
Barriers inhibiting B2B electronic payment include all of the following EXCEPT: | strict standard formats for remittance information.
Bartering exchange | An intermediary that links parties in a barter; a company submits its surplus to the exchange and receives points of credit, which can be used to buy the items that
the company needs from other exchange participants.
Basic marketing model is based on 4P factor. There are Product, Price, Promotion, and ____ | Place
Basic options for developing an EC Web site include each of the following except: | clone a competitor's Web site.
Because conducting reverse auctions in B2B can be a fairly complex process, a(n) __ may be essential. | third-party intermediary
Because exchanges are providing a service, they do not require a revenue model. | False
Because of the complexity in building large e-marketplaces and exchanges, it is usually performed by a major B2B software company, such as Ariba or IBM, and a management consulting
company, such as pricewaterhousecoopers, usually participates. | T
Because of their large number of buyers and sellers, B2B exchanges and other e-marketplaces do not face anti-trust or other competition laws. | F
Because of their visibility and large sales volumes, larger firms are more susceptible to fraud than medium-sized firms. | False
Because of these interrelationships, the business model of the Internet economy has been called the | Internet ecosystem
Because online buyers decisions depend on numerous independent and intervening variables, decisions made by customers are classified as: | dependent variables
Because the rate of change and the level of uncertainty are expected to accelerate, organizations are | operating under increasing pressures to produce more products, faster, and with fewer
resources.
C
Can be supported more effectively and efficiently through direct buyerseller offline or online negotiations, which can be done in private exchanges or private trading rooms in public exchanges. |
Strategic purchases
Candidate Key | an attribute that uniquely determine the values of all the other attributes for a row in a relation
Capabilities of the Internet that have made it more difficult for companies to capture profits include all of the following EXCEPT: | The Internet makes it easier to make secure payments.
Captcha tool | Completely Automated Public Turing test to tell Computers and Humans Apart, which uses a verification test on comment pages to stop scripts from posting
automatically.
Card verification number (CVN) | Detects fraud by comparing the verification number printed on the signature strip on the back of the card with the information on file with the
cardholders issuing bank.
Caterpillar Inc. Created CAT U to meet its training and learning needs. | True
Challenges that Boeing faced with its global collaboration for the design and assembly process of its new Dreamliner passenger plane included each of the following EXCEPT: | Lag time
Channel conflict | Situation in which an online marketing channel upsets the traditional channels due to real or perceived damage from competition.
Channel conflict occurs when adding an online distribution channel causes problems with existing distribution channels. | T
Chaplin reports quarterly sales revenue from his business to city hall over the Internet. He pays his local business tax with a credit card. This is an example of: | G2B e-commerce
Chaplin's Pet Store has been in business for many years. Chaplin, the present owner, decides to open an online sales channel where he can advertise and sell the same gourmet pet food. This is an
example of adding: | a Webstore.
Characteristics of B2B payments include all of the following EXCEPT: | c. They require less rigor and security than B2C payments.
Characteristics of mobile devices that create special requirements that hardware and software designers need to anticipate when designing mobile computing systems include all of the following
EXCEPT: | broad bandwidth
Characteristics of the next generation Internet, Web 3.0, are expected to be all of the following EXCEPT | Decreased use of the Semantic Web
Charles wants to buy a John Lennon lithograph over the Internet, but he is unwilling to pay for it until he inspects it to ascertain authenticity. The auction site through which he purchases the
painting agrees to hold his money until he tells them to release it to the seller. This is an example of: | an escrow service.
Chemconnect is an example of a successful e-exchange with: | many buyers and many sellers.
Childrens Internet Protection Act (CIPA) | U.S. law that mandates the use of filtering technologies in schools and libraries that receive certain types of federal funding.
Chips are tiny tags can be implanted into humans or attached to products for tracking and identification purposes. | Radio frequency identification (RFID)
Choose the best type from the following option: Uber, or grabtaxi are example of _______ | L-Commerce
Choose the right term corresponding with the following statement: "It is a method of e-commerce where shoppers friends become involved in the shopping experience; social shopping attempts
to use technology to mimic the social interactions found in physical malls and stores" | Social shopping
Choose the right term with the following description: The use of digital technologies that enable companies to collaboratively plan, design, develop, manage, and research products, services, and
innovative EC applications | collaborative commerce (c-commerce)
Choose the right type of E-Commerce based on the following statement: "The e-commerce activities conducted in social networks and/or by using social software (i.e., Web 2.0 tools)" | s-
commerce
Choose the right types and activities in knowledge management (KM) Hint: choose multiple answers (6) |Create, Capture, Refine, Store, Manage, Disseminate
Choppy connectivity is one of four trends that may slow EC and Web 3.0 and even cripple the Internet. | TRUE
CIA security triad (CIA triad) | Three security concepts important to information on the Internet: confidentiality, integrity, and availability.
Cios need to effectively communicate the value of proposed EC projects in order to gain approval for all of the following reasons EXCEPT: | Demand for expanding or initiating e-business
projects is no longer strong so there are fewer requests for funding.
Ciphertext | A plaintext message after it has been encrypted into a machine-readable form.
Civil litigation | An adversarial proceeding in which a party (the plaintiff ) sues another party (the defendant) to get compensation for a wrong committed by the defendant.
Click (click-through or ad click) | A count made each time a visitor clicks on an advertising banner to access the advertisers Web site.
Click-and-mortar (click-and-brick) organizations | Organizations that conduct some e-commerce activities, usually as an additional marketing channel.
Click-and-mortar retailers | Brick-and-mortar retailers that offer a transactional Web site from which to conduct business.
Clickstream data provide a trail of a users activities in a Web site including a record of the users browsing patterns of every page of every Web site the user visits, how long the user remained on
a page, and even the e-mail addresses of mail that the user sends and receives. | T
Click-through rate | The percentage of visitors who are exposed to a banner ad and click on it.
Click-through ratio | The ratio between the number of clicks on a banner ad and the number of times it is seen by viewers; measures the success of a banner in attracting visitors to click
on the ad.
Collaboration hub | The central point of control for an emarket. A single c-hub, representing one e-market owner, can host multiple collaboration spaces (c-spaces) in which trading
partners use c-enablers to exchange data with the c-hub.
Collaborative commerce (c-commerce) | The use of digital technologies that enable companies to collaboratively plan, design, develop, manage, and research products, services, and
innovative EC applications.
Collaborative computing is an approach aimed at making the human-computer interface more natural. | False
Collaborative filtering | A market research and personalization method that uses customer data to predict, based on formulas derived from behavioral sciences, what other products or
services a customer may enjoy; predictions can be extended to other customers with similar profiles.
Collaborative planning | A business practice that combines the business knowledge and forecasts of multiple players along a supply chain to improve the planning and fulfillment of
customer demand.
Collaborative planning, forecasting, and replenishment (CPFR) | Project in which suppliers and retailers collaborate in their planning and demand forecasting to optimize flow of
materials along the supply chain.
Combined with leadership, the ____ is an indispensable kind of social network for properly running the business or project and to differentiate the business from similar ones. | entrepreneurial
network
Commodities with standard specifications (e.g., books, cds, airline tickets) are expected to facilitate higher sales volumes. | TRUE
Companies are finding that __ outlets, such as blogs and wikis, not only generate faster and cheaper results than traditional focus groups, but also foster closer relationships with customers. |
conversational marketing
Companies can improve their responsibility as custodians of customers personal data by implementing | Opt in and opt out information practices.
Companies can interface with social networking in each of the following ways except: | sending flyers to customer mailboxes.
Companies can use replenishment information to reduce inventories and eliminate stocking points. | T
Companies exchange surpluses they do not need for things that they do need. So, they are using: | Membership EC Business Model
Companies that choose an intermediary to do their buying and selling will have high supply chain power and buying/selling capabilities. | T
Companies that introduce a significant change in their industries, thus causing disruption in business operations, are referred to as disruptors. | TRUE
Companies that introduce innovations that significantly change markets or entire industries due to their activities are referred to as __. | disruptors
Companies that sell to intermediaries do not care about the final customer's satisfaction. | False
Companies that use an intermediary to do their buying and selling tend to be: | low on supply chain power and low on buying/selling capabilities
Companies use ______ to sell their unneeded assets for quick disposal or to easily dispose of excess, obsolete, and returned products. | forward auctions
Companies will often separate B2C orders from B2B orders because those types of orders have different order-fulfillment processes and different pricing models. | T
Companies will usually separate B2C orders from B2B orders because B2C and B2B orders have different _______. | order-fulfillment processes and different pricing models
Company A is a retailer that sells only pre produced products. What are the steps and their order in EC order fulfillment? | Ensuring payment, checking availability, arranging shipment,
insurance, production, purchasing and warehousing, contacts with customers and returns
Company ABC has several divisions that have created private resources that can be accessed using Internet protocols. The company is now going to link these resources together. What type of
network is being described? | Extranet
Company ABC sells a variety of products on its Web site to the highest bidder. What type of business model are they using? | Online auction
Company XYZ helps individuals exchange digital products. What EC classification do they fit? | p2p
Company XYZ helps individuals sell products to other individuals and takes a small commission on each sale. What EC classification do they fit? | c2c
Company XYZ sells a variety of products on its Web site. What type of business model are they using? | E-tailing
Company XYZ sells products to individuals. What EC classification do they fit? | b2c
Company-centric EC | E-commerce that focuses on a single companys buying needs (many-to-one, or buy-side) or selling needs (one-to-many, or sell-side).
Compare current motives of hackers to those of the past. | In the early days of EC, many hackers simply wanted to gain fame or notoriety by defacing Web sites or gaining root, which
means gaining unrestricted access to a network. Criminals and criminal gangs are now profit oriented, and their tactics are not limited to the online world.
Compared to competitive markets, auction prices are often ____ when there are multiple bidders | higher
Compared to competitive markets, auction prices are often ____ when there are very few bidders | lower
Compared to the traditional job market, the online job market | tends to be much less expensive.
Competition among online travel e-tailers is fierce, with low margins, little customer loyalty, and increasing commoditization of products and services. | TRUE
Competitive advantages of a "pull" vehicle distribution process include | all of the above.
Competitor analysis grid | A strategic planning tool that highlights points of differentiation between competitors and the target firm.
Compliance data | All data belonging or pertaining to an enterprise included in the law, which can be used for the purpose of implementing or validating compliance.
Components of a wireless infrastructure that support delivery of services over a wireless connection are: | WAP gateways, GPS locators, and GPS satellites.
Computer Fraud and Abuse Act (CFAA) | Major computer crime law to protect government computers and other Internet-connected computers.
Computer viruses are not a potential risk to mobile devices because they are wireless. | False
Computing Technology Industry Association (comptia) | Nonprofit trade group providing information security research and best practices.
Conducting e-commerce where the online channel of a business is integrated with the physical retail business as opposed to being a separate channel best defines | considered commerce.
Conducting research online is not always ideal, because the demographics of Internet users are not the same as the general population. | True
Confidentiality | Assurance of data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes.
Confidentiality, integrity, and awareness are the three components of the CIA security triad. | FALSE
Considered commerce | Conducting e-commerce where the online channel of a business is integrated with the physical retail business as opposed to being a separate channel.
Consortium trading exchange (CTE) | An exchange formed and operated by a group of major companies in an industry to provide industry-wide transaction services.
Consumer electronics, including cell phone sales, are the largest category of online retail. | F
Consumer interaction, the essence of consumer focused (B2C) e-commerce, is the front end to ____. | d. Both
Consumer-to-business (C2B) | E-commerce model in which individuals use the Internet to sell products or services to organizations or individuals who seek sellers to bid on products or
services they need.
Consumer-to-consumer (C2C) | E-commerce model in which consumers sell directly to other consumers.
Contact card | A smart card containing a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip.
Contactless (proximity) card | A smart card with an embedded antenna, by means of which data and applications are passed to and from a card reader unit or other device without
contact between the card and the card reader.
Content | The text, images, sound, and video that make up a Web page.
Content created by a publisher that must be read using a computer or similar handheld device is an example of what type of digital publishing? | E-book
Content creation and management for a large EC site can be slow and expensive. | True
Content management | The process of adding, revising, and removing content from a Web site to keep content fresh, accurate, compelling, and credible.
Content not available anywhere else on the Web is called | premium content
Content owners are targeting youtube and third-party video-sharing Web sites for | copyright infringements
Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act | Law that makes it a crime to send commercial e-mail messages with false or misleading message
headers or misleading subject lines.
Cookie | A data file that is placed on a users hard drive by a remote Web server, frequently without disclosure or the users consent, that collects information about the users activities
at a site.
Copyright | An exclusive right of the author or creator of a book, movie, musical composition, or other artistic property to print, copy, sell, license, distribute, transform to another
medium, translate, record, perform, or otherwise use.
Corporate portal | A major gateway through which employees, business partners, and the public can enter a corporate Web site.
Corporations are moving their phone systems to ____ to cut costs and boost efficiency. | voip
CPM (cost per thousand impressions) | The fee an advertiser pays for each 1,000 times a page with a banner ad is shown.
Cracker | A malicious hacker who may represent a serious problem for a corporation.
Creating content that offers upgraded or more expensive versions of the product is called | up selling
Credit cards, charge cards, and debit cards are three forms of online payment cards. | True
Critics of political spam are against its use because they believe that | all spam is a nuisance, clogs mail servers, and creates security risks
CRM analytics | Applying business analytic techniques and business intelligence such as data mining and online analytic processing to CRM applications.
CSI Computer Crime and Security Survey | Annual security survey of U.S. corporations, government agencies, financial and medical institutions, and universities conducted by the
Computer Security Institute.
Customer interaction center (CIC) | A comprehensive service entity in which EC vendors address customer service issues communicated through various contact channels.
Customer loyalty is a deep commitment to rebuy or repatronize a preferred product or service consistently in the future, thereby causing repetitive same-brand purchasing. | TRUE
Customer loyalty leads to enhanced resistance to competitors, a decrease in price sensitivity, and an increase in favorable word-of-mouth. | TRUE
Customer relationship management (CRM) | A customer service approach that focuses on building long-term and sustainable customer relationships that add value both for the
customer and the selling company.
Customer-facing activities or ___ are activities, such as advertising and order taking, that are visible to customers. | front-office operations.
Customers must pay a fixed amount, usually monthly, to get some type of services from AOL. So, AOL is using: | Transaction Fees Revenue Model
Customer-to-customer (C2C) e-commerce is conducted in various ways on the Internet, but the best-known C2C activities are: | C2C auctions
Customink is a Virginia-based online retail company that enables customers to design and order custom apparel such as t-shirts and sweatshirts. Customers can upload their own art, or use the
site's design tools to create a design and order the customized product. See figure Which of the following item(s) are benefits of their E-Commerce? Hint: choose multiple answers (3) | Website
allows people to choose from customink's design ideas, clipart, fonts and colors, or upload their own images to be printed on items including apparel, bags, drinkware and office
supplies.,Artists review each design, and email the customer a picture proof of how the design will print.,Depending on the desired quality and quantity of the item, their staffs
performs screen printing, digital printing, and embroidery services.
Cyber cons have a negative effect on EC because | defending against these cons and compensating for damages significantly increase the costs of EC.
Cybercriminal | A person who intentionally carries out crimes over the Internet.
Cybermediation occurs at Web sites that use intelligent agents to facilitate intermediation. | T
D
Dan Welch, who owns three World Cup Coffee shops in Portland, Oregon, estimates that his free Wi-Fi network has added 10 percent to his overall revenue. Welch credits Wi-Fi consumers with
spending three times as much on food compared with the average consumer. This is an example of: | business ROI
Darknets | Private online community that is only open to those who belong to it.
Data analytics are a valuable tool because it can provide all of the following EXCEPT: | c. Financial reporting
Data collection methods in the Web 2.0 environment include each of the following except | branding.
Data Encryption Standard (DES) | The standard symmetric encryption algorithm supported by the NIST and used by U.S. government agencies until October 2000.
Data mart | A small data warehouse designed for a strategic business unit (SBU) or department.
Data mining | The process of searching a large database to discover previously unknown patterns; automates the process of finding predictive information.
Data warehouse (DW) | A single, server-based data repository that allows centralized analysis, security, and control over data.
Define data and information. Explain how they differ. | data are facts and figures. Information is defined as knowledge derived from data or data presented in meaningful context.- data
is imply recorded in the database, but the data must be manipulated in some way to produce information.
Define database. | a self-describing collection of integrated tables, which means that the tables store both data and the relationships btwn the data
Define e-government. | E-government is the use of IT and e-commerce to provide access to government information and delivery of public services to citizens and business partners.
Define Web 2.0. Identify five characteristics. | Web 2.0 is a popular term for advanced Internet technology and applications, including blogs, wikis, RSS, and social bookmarking. Its
characteristics include the ability to tap into the collective intelligence of users; making data available in new or never-intended ways; relying on user-generated and user-controlled
content and data; lightweight programming techniques and tools, and letting nearly anyone act as a Web site developer.
Define Web 3.0. Identify five characteristics of Web 3.0. | Web 3.0 consists of the creation of high-quality content and services produced by gifted individuals using Web 2.0 technology as
an enabling platform. Web 3.0 will provide faster, far-flung connectivity and richer ways of interacting; new Web services that work entirely within a browser window; more powerful
search engines; new artificial intelligence applications, and more uses of 3D tools.
Defreshfish has been in business for ten years selling custom fishing lures to local fishermen through its store in a shopping mall. The company's owners are considering opening a Web site and
selling their products internationally. One new risk they will face in going from a brick-and-mortar strategy to a click-and-mortar strategy is: | the risk associated with trying to comply with
conflicting rules and regulations in many different locales.
Dells cornerstone business model is based on the concept of: | build-to-order which allows customers to configure their own customized systems.
Denial of service (dos) attack | An attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading
its resources.
Describe database migration process | tables may be created, modified or deleted, relationships may be altered, data constrains may be changed, other changes may be made as needed
Describe G2C. | The government-to-citizens model includes all interactions between a government and its citizens. This model is meant to increase efficiencies and create greater
transparency to citizens.
Describe how EBT works. | The EBT system allows the government to electronically transfer benefits to citizen's smart cards instead of sending checks or other vouchers.
Describe how to effectively manage the return of items | There are several different methodologies for return handling, including returning the item to the place where it was purchased,
separate logistics for returns, outsourcing returns, and physically dropping off the returned items to collection stations.
Describe internal efficiency e-government activities. | These activities are meant to increase operation efficiencies though the use of IT systems and processes.
Describe issues in B2B fulfillment | The major issues are shipment size, multiple distribution channels, variety of shipment frequency, uneven breadth of carrier services, fewer carrier
EC offerings, and complex EC transaction paths.
Describe the basic EIPP options. | A variety of online options are available for making payments in an EIPP system. Each differs in terms of cost, speed, auditability, accessibility, and
control. Some options include: ACH Network, Purchasing Cards, Fedwire or Wire Transfer, Letters of Credit for Global Payments
Describe the two main areas of G2B activities. | The two main areas of government to-business activities include electronic procurement where the government purchases goods from the
private sector, and electronic auctions where the government electronically auctions surplus goods to businesses.
Desktop purchasing | Direct purchasing from internal marketplaces without the approval of supervisors and without the intervention of a procurement department.
Desktop search | Search tools that search the contents of a users or organizations computer files, rather than searching the Internet. The emphasis is on finding all the information that
is available on the users PC, including Web browser histories, e-mail archives, and word-processed documents, as well as in all internal files and databases.
Despite the failures of individual companies and initiatives, the total volume of EC has been growing each year. | True
Despite the many e-tailing EC companies that have failed in the past, the dot-com failure rate has recently declined sharply. | True
Detection measures | Ways to determine whether intruders attempted to break into the EC system; whether they were successful; and what they may have done.
Detection measures are actions that will make criminals abandon their idea of attacking a specific system. | FALSE
Determinant | attribut or set of attributes that functionally determine the value of another attribute or set. The left-hand side of a functional dependence.A -> B, A is determinate
Determining who has the right to access a portion of a Web site is a question of: | Authorization.
Deterring measures | Actions that will make criminals abandon their idea of attacking a specific system (e.g., the possibility of losing a job for insiders).
Digital divide | Refers to the gap between people with effective access to digital and information technology and those without.
Digital economy | An economy that is based on digital technologies, including digital communication networks, computers, software, and other related information technologies; also
called the Internet economy, the new economy, or the Web economy.
Digital enterprise | A new business model that uses IT in a fundamental way to accomplish one or more of three basic objectives: reach and engage customers more effectively, boost
employee productivity, and improve operating efficiency. It uses converged communication and computing technology in a way that improves business processes.
Digital envelope | The combination of the encrypted original message and the digital signature, using the recipients public key.
Digital products | Goods that can be transformed to digital format and delivered over the Internet.
Digital products have different cost curves than those of regular products because: | in digitization, most of the costs are fixed, and variable costs are very low.
Digital products, such as software, music, digitized images, and electronic games are a great fit for consumer focused (B2C) e-commerce because ____. | Electronic distribution is more
efficient than alternative distribution channels for digital products
Digital rights management (DRM) | An umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage.
Digital signature or digital certificate | Validates the sender and time stamp of a transaction so it cannot be later claimed that the transaction was unauthorized or invalid.
Digital signatures or digital certificates: | a and b (a.are used to validate the sender and time stamp of the transaction so it cannot be later claimed that the transaction was unauthorized
or invalid., b.have been compromised by phishers and spammers)
Direct marketers are firms that sell directly to consumers over the Internet without maintaining a physical sales channel. | FALSE
Direct marketing | Broadly, marketing that takes place without intermediaries between manufacturers and buyers; in the context of this book, marketing done online between any seller
and buyer.
Direct marketing describes marketing that takes place offline between manufacturers and retailers. | F
Direct materials | Materials used in the production of a product (e.g., steel in a car or paper in a book).
Disadvantages for using the off-the-shelf approach as an EC development strategy include: | Software may not exactly meet the company's needs.
Disaster avoidance | An approach oriented toward prevention. The idea is to minimize the chance of avoidable disasters (such as fire or other human-caused threats).
Discuss intermediation, disintermediation, and reintermediation. | Intermediation occurs when a third party operates between buyers and sellers. Intermediaries provide information
about demand, supply, prices, and requirements or they offer value-added services. E-marketplaces, infomediaries and portals provide information for free or low cost, resulting in
the disintermediation or elimination of the intermediary. Reintermediation occurs when the disintermediated entity takes on new intermediary roles.
Disintermediation | The removal of organizations or business process layers responsible for certain intermediary steps in a given supply chain.
Disintermediation describes: | the introduction of new intermediaries within the channel structure
Disruption did not occur in the real estate brokerage industry. | FALSE
Disruptors | Companies that introduce a significant change in their industries, thus causing a disruption in normal business operations.
Distance learning | Formal education that takes place off campus, usually, but not always, through online resources.
Domain name | A name-based address that identifies an Internet-connected server. Usually it refers to the portion of the address to the left of .com and .org, etc.
Domain Name System (DNS) | A hierarchical naming system for computers, services, or any resource participating in the Internet; it is like a directory that translates (converts)
domain names to their numeric IP addresses..
Double auction | An auction in which multiple buyers and their bidding prices are matched with multiple sellers and their asking prices, considering the quantities on both sides.
Due process is | a guarantee of basic fairness and fair procedures in legal action
Dynamic pricing | Prices that change based on supply and demand relationships at any given time.
Dynamic pricing refers to the rapid movement of prices over time and possibly across customers as a result of supply and demand matching, as in auctions. | T
Dynamic trading is trading that occurs in situations in which prices are determined by supply and demand, therefore changing continuously. | T
E
Each of the following are ways to pay bills over the Internet EXCEPT: | c. Customer service provider.
Each of the following describes retailing except: | Companies that produce a larger number of products, such as Proctor & Gamble, do not need retailers for efficient distribution.
Each of the following is a characteristic of WAYN except: | When it introduced fees for its premier travel membership service, it lost most of its new subscriptions.
Each of the following is a main function of traditional and electronic markets except | financing the transformation of raw materials into finished products.
Each of the following is a major type of B2B structural model except: | collaborative union.
Each of the following is a revenue model for online independent travel agents except | direct competition revenues.
Each of the following is a true statement about access control except: | All resources need to be considered together to identify the rights of users or categories of users.
Each of the following is an example of e-government except a: | ebay-seller selling surplus army supplies.
Each of the following is one of the three major categories of auction rules EXCEPT: | a. Timing rules
Each of the following is true about auction rules EXCEPT | Rules eliminate conflicts with existing distributors and distribution channels.
Each of the following statements about digital rights management (DRM) is true EXCEPT | DRM technologies were developed with strict regard for privacy protection
E-auctions are becoming less important selling and buying channels for companies and individuals | F
E-book | A book in digital form that can be read on a computer screen or on a special device.
E-books are delivered in each of the following ways except: | via RFID.
E-business | A broader definition of EC that includes not just the buying and selling of goods and services, but also servicing customers, collaborating with business partners, and
conducting electronic transactions within an organization.
EC applications are supported by infrastructure and by each of the following support areas EXCEPT: | Mobile devices
EC architecture | A plan for organizing the underlying infrastructure and applications of a site.
EC businesses generate user profiles in each of the following ways except by: | using customer segmentation to identify customers' preferences.
EC can be conducted in an ... Where buyers and sellers meet online to exchange goods, services, money, or information. | electronic market (e-marketplace)
EC can take several forms depending on the degree of digitization of the following three dimensions _____ | the product or service sold, the process, and the delivery method.
EC competition is very intense because online transactions enable each of the following EXCEPT: | Higher prices because of a greater number of potential buyers.
EC costs and benefits can be classified into two broad categories: | tangible and intangible
EC offers companies new opportunities to test prices and make prices more precise, which are referred to as | optimal prices.
EC reduces cycle time in all of the following ways except: | Customer satisfaction.
EC security programs | All the policies, procedures, documents, standards, hardware, software, training, and personnel that work together to protect information, the ability to conduct
business, and other assets.
EC security strategy | A strategy that views EC security as the process of preventing and detecting unauthorized use of the organizations brand, identity, Web site, e-mail, information,
or other asset and attempts to defraud the organization, its customers, and employees.
EC sellers need to protect against fraud and each of the following EXCEPT: | Public keys
EC suites that enable an organization to quickly build an e-business include all of the following EXCEPT: | Virtual Computing Laboratory
E-commerce (EC) risk | The likelihood that a negative outcome will occur in the course of developing and operating an electronic commerce strategy.
E-commerce and client/server network applications are associated with: | Enterprise databases
E-commerce strategy (e-strategy) | The formulation and execution of a vision of how a new or existing company intends to do business electronically.
Economic, legal, societal, and technological factors have created a highly competitive business environment in which customers are becoming less powerful. | False
E-distributor | An e-commerce intermediary that connects manufacturers with business buyers (customers) by aggregating the catalogs of many manufacturers in one placethe
intermediarys Web site.
Efficient transactions, price comparisons for customers, and global reach are three major capabilities that contribute to the growth of EC. | True
Egghead.com realized a substantial reduction in operating costs and inventory costs by eliminating its brick-and-mortar stores and becoming a pure-play in e-commerce. | T
E-government | E-commerce model in which a government entity buys or provides goods, services, or information to businesses or individual citizens.
E-government can generally include all of the following except: | Selling commercial items.
E-grocer | A grocer that takes orders online and provides deliveries on a daily or other regular schedule or within a very short period of time.
E-learning | The online delivery of information for purposes of education, training, or knowledge management.
E-learning drivers driving the transition from traditional education to online learning include each of the following except: | faculty with specialized expertise.
Electronic (online) banking or e-banking | Various banking activities conducted from home or the road using an Internet connection; also known as cyberbanking, virtual banking,
online banking, and home banking.
Electronic catalogs (e-catalogs) | The presentation of product information in an electronic form; the backbone of most e-selling sites.
Electronic commerce (EC) | The process of buying, selling, or exchanging products, services, or information via computer.
Electronic commerce is the process of buying, selling, or exchanging products, services, or information via computer | True
Electronic market (e-marketplace) | An online marketplace where buyers and sellers meet to exchange goods, services, money, or information
Electronic markets are the EC mechanism supporting the | presence and delivery, find information, compare, and analyze EC activities.
Electronic Product Environmental Assessment Tool (EPEAT) | A searchable database of computer hardware that meets a strict set of environmental criteria.
Electronic shopping cart | An order-processing technology that allows customers to accumulate items they wish to buy while they continue to shop.
Electronic signature | A generic, technology-neutral term that refers to the various methods by which one can sign an electronic record.
Electronic storefronts, Internet malls, and exchanges are major B2B e-marketplaces. | FALSE
E-loyalty | Customer loyalty to an e-tailer or loyalty programs delivered online or supported electronically.
E-loyalty is customer loyalty to an e-tailer or loyalty programs delivered online or supported electronically. | TRUE
E-mail spam | A subset of spam that involves nearly identical messages sent to numerous recipients by e-mail.
E-mall (online mall) | An online shopping center where many online stores are located.
E-marketplace | An online market, usually B2B, in which buyers and sellers exchange goods or services; the three types of e-marketplaces are private, public, and consortia.
E-marketplaces, especially for B2B and mega B2C such as Amazon.com may be plagued by | information overload
Employees purchasing office supplier for their work through an outside vendor is an example of B2E. | False
Emulate the work and behavior of human agents in executing organizational processes, such as travel authorization, planning, or decision making. | Software (or intelligent) agents
Enable an organization that has suffered a loss due to spammers to bring a lawsuit against spammers responsible for the loss | Civil laws
Encryption | The process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble (decrypt) it.
Encryption algorithm | The mathematical formula used to encrypt the plaintext into the ciphertext, and vice versa.
Encryption algorithm is the mathematical formula used to encrypt plaintext into ciphertext, and vice versa. | TRUE
Encryption components include each of the following except: | internal control environment.
E-newsletter | A collection of short, informative articles sent at regular intervals by e-mail to individuals who have an interest in the newsletters topic.
Enterprise 2.0 | Technologies and business practices that free the workforce from the constraints of legacy communication and productivity tools such as e-mail. Provides business
managers with access to the right information at the right time through a Web of interconnected applications, services, and devices.
Enterprise application integration (EAI) | Class of software that integrates large systems.
Enterprise search | The practice of identifying and enabling specific content across the enterprise to be indexed, searched, and displayed to authorized users.
Enterprise social networks are privately owned by corporations and operate inside them. | True
E-payment methods that can address the lower or higher end of the price continuum are unlikely to be widely accepted because of cost and security issues. | False
E-payment systems that require the payer to install specialized security software have proven more likely to succeed. | False
E-procurement | The electronic acquisition of goods and services for organizations. E-procurement supports the purchase of both direct and indirect materials and employs several
Web-based functions such as online catalogs, contracts, purchase orders, and shipping notices.
Erratic shifts in orders up and down supply chains is know as the: | Bullwhip effect.
E-sourcing | The process and tools that electronically enable any activity in the sourcing process, such as quotation/tender submittance and response, e-auctions, online negotiations,
and spending analyses.
E-supply chain | A supply chain that is managed electronically, usually with Web technologies.
E-supply chain management (e-SCM) | The collaborative use of technology to improve the operations of supply chain activities as well as the management of supply chains.
E-supply chain management is the collaborative use of technology to enhance B2C processes and improve speed, agility, real-time control, and customer satisfaction. | F
E-supply chains are usually managed using traditional, non-web-based systems. | False
Ethics | The branch of philosophy that deals with what is considered to be right and wrong.
Ethics is the branch of philosophy that deals with what is considered to be right and wrong. | True
Every time a customer orders a DVD player from an online record store, the inventory for that player is reduced in the inventory system. This is an example of the: | order entry function
Evidence indicates that the basic principles that apply to retail success do not apply to e-tail success. | F
Examples of direct materials for a food processing company are computers and communication devices. | F
Examples of electronic signatures to help distinguish between legitimate and fraud transactions include all of the following EXCEPT: | a Web site development agreement
Exchanges (trading communities or trading exchanges) | Many-to-many e-marketplaces, usually owned and run by a third party or a consortium, in which many buyers and many sellers
meet electronically to trade with each other.
Expanding access to information for people with disabilities is a performance objective of which category of e-government? | G2C
Expert location systems (ELS) | Interactive computerized systems that help employees find and connect with colleagues who have expertise required for specific problemswhether they
are across the country or across the roomin order to solve specific, critical business problems in seconds.
Explain the difference between a candidate key and a primary key | while there can be several candidate keys, any of which could be the primary key, there is only one primary key
actually used to be the "official" key of a relationship
Exposure | The estimated cost, loss, or damage that can result if a threat exploits a vulnerability.
Extranet | A network that uses a virtual private network to link intranets in different locations over the Internet; an extended intranet.
F
Facebook is an example of an enterprise social network. | False
Factors that come into play in determining whether a particular method of e-payment achieves critical mass include all of the following EXCEPT: | full traceability of the buyers.
Factors that determine whether a first mover succeeds or fails in the EC marketplace include all of the following EXCEPT: | the speed of market entry
Factors that determine whether a particular method of e-payment achieves critical mass include each of the following except: | full traceability of the buyers.
Fair use means | that copyrighted material can be used for noncommercial purposes without paying royalties or getting permission.
FAQ page | A Web page that lists questions that are frequently asked by customers and the answers to those questions.
Finding and retaining customers is a major critical success factor for most offline and online businesses. | TRUE
Finding information and knowledge that describe the relationships among consumers, products, marketing methods, and marketers is the goal of | market research.
Finding relevant and accurate information is often time-consuming and requires access to multiple systems causing organizations to lose a lot of productive employee time. One solution to this
problem is the use of: | portals.
Fingerprint scanners, facial recognition systems, and voice recognition are examples of __ that recognize a person by some physical trait. | biometric systems
Firewall | A single point between two or more networks where all traffic must pass (choke point); the device authenticates, controls, and logs all traffic.
Firewalls that filter requests from the Internet to a private network based on the IP address of the computer sending or receiving those requests are called: | packet-filtering routers.
Flappybird is a game that allows peoples to play games for free. So that case study follows: | None of the others
Folksonomy (collaborative tagging, social classification, social indexing, social tagging) | The practice and method of collaboratively creating, classifying, and managing tags to annotate
and categorize content.
For _______ companies, it may be even more important to change strategies quickly. | pure play
For a company to obtain competitive advantage it must use a technology/process that is: | d. A and c
For a given type of payment card and processing system, the processes and participants are essentially the same for offline (card present) and online (card not present) purchases. | True
For a manufacturer, the supply chain ends: | when the product is used up and disposed of.
For all types of e-marketplaces, the most important key to the success of any third-party exchange is the critical mass of buyers and sellers. | T
For many firms, presentment and payment processes are all of the following EXCEPT: | c. Secure.
Ford's strategy is best described as: See figure | direct marketing from a manufacturer.
Forecasting means identifying business, technological, political, economic, and other relevant trends that are currently affecting the business or that have the potential to do so in the future. |
True
Foreign key | the attribute that is a primay key is one table that is then place in a second table to form a relationship to the first table by sorting linking values. The term foreign key
refers to the attribute in the second table.
Formal education that takes place off campus, usually, but not always, through online resources best defines: | distance learning.
Forward auction | An auction in which a seller entertains bids from buyers. Bidders increase price sequentially.
Forward auctions expand online sales and offer businesses a new venue for quickly and easily disposing of excess, obsolete, and returned products. | T
Forward auctions give company Web sites "stickiness." This means that it is difficult to sell goods and have the customer "stick" to the site. | False
Fraud | Any business activity that uses deceitful practices or devices to deprive another of property or other rights.
From 2001 to 2006, a majority of e-exchanges: | folded due to a lack of customers, cash, or both.
From a bank's perspective, online banking offers a cheap alternative to branch banking as well as a chance to enlist customers in remote areas. | T
From the perspective of the billing firm, all of the following are advantages of e-billing EXCEPT: | universal availability.
From the perspective of the customer, all of the following are advantages of e-billing EXCEPT: | greater security than other types of payments.
Front end | The portion of an e-sellers business processes through which customers interact, including the sellers portal, electronic catalogs, a shopping cart, a search engine, and a
payment gateway.
Front end refers to the activities that support online order fulfillment, inventory management, purchasing from suppliers, payment processing, packaging, and delivery. | F
Functional dependency | relationship between attributes in a relation where the value of one or more attributes determines the value of another attribute. A -> B expressed the fact that
if we know a value of A we will always know the corresponding value of B
Functional products are staple products, such as groceries or gasoline, that have stable and predictable demand. For these products, an effective supply chain emphasizes speed, responsiveness,
and flexibility rather than low costs. | F
Fundamentally, the success of the pure-play jewelry e-tailer Blue Nile was due to the companys use of Internet technologies to: | offer lower prices than competitors
G
G2G (government-to-government) includes only intergovernmental activities. | True
Gaye operates a B2B exchange that services a vertical market that marketers have difficulty targeting. What type of revenue model should she consider first? | Advertisement fee
General controls | Controls established to protect the system regardless of the specific application. For example, protecting hardware and controlling access to the data center are
independent of the specific application.
General Motors B2B initiatives successfully enable the auto giant to reduce inventory cost, minimize operational problems, and shorten procurement processes. | T
Geographical information system (GIS) | A computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information.
Give an example of a single-user database application and a multiuser database application. | membership database (single-user), video/dvd rental store that is used by several
employees(multi-user)
Global positioning system (GPS) | A worldwide satellite-based tracking system that enables users to determine their position anywhere on the earth.
Good management and effective operations and rules are critical to the success of B2B exchanges because good governance provides the rules for the exchange, minimizes conflicts, supports
decision making, and tries to induce the necessary liquidity. | T
Goods with the following characteristicguarantee provided by highly reliable or well-known vendorsare expected to facilitate higher sales volumes. | T
Governments use Web 2.0 tools mainly for: | collaboration, dissemination of information, e-learning, online forums, and citizen engagement.
Government-to-business (G2B) | E-government category that includes interactions between governments and businesses (government selling to businesses and providing them with
services and businesses selling products and services to the government).
Government-to-citizens (G2C) | E-government category that includes all the interactions between a government and its citizens.
Government-to-employee applications can lead to significant efficiency improvements for all of the reasons EXCEPT: | Most government employees use handheld digital devices.
Government-to-employees (G2E) | E-government category that includes activities and services between government units and their employees.
Government-to-government (G2G) | E-government category that includes activities within government units and those between governments.
Green computing | The study and practice of ecofriendly computing resources; is now a key concern of businesses in all industriesnot just environmental organizations.
Green IT | Green IT begins with manufacturers producing environmentally friendly products and encouraging IT departments to consider more friendly options like virtualization,
power management, and proper recycling habits.
Group purchasing | The aggregation of orders from several buyers into volume purchases so that better prices can be negotiated.
Group ware is appropriate in all of the following situations EXCEPT: | d. For people working on different tasks or projects
Guidelines regarding enterprise social networking activities include: | all of the above.
H
Hacker | Someone who gains unauthorized access to a computer system.
Has one seller and many buyers, or one buyer and many sellers. | A private marketplace
Hash | A mathematical computation that is applied to a message, using a private key, to encrypt the message.
Having control over the collection, storage, and dissemination of personal information is included in the category of: | privacy
Help customers do comparison-shopping in B2C by collecting data from multiple sellers sites. | Software agents (or intelligent agents)
Honeypot | Production system (e.g., firewalls, routers, Web servers, database servers) that looks like it does real work, but that acts as a decoy and is watched to study how network
intrusions occur.
Hope that consumers will use the trustmark seal as an assurance and as a proxy for actual research into their conduct of business, privacy policy, and personal information protection. | TRUSTe
Horizontal marketplaces | Markets that concentrate on a service, material, or a product that is used in all types of industries (e.g., office supplies, pcs).
How is the one-to-one relationship achieved? | By understanding a customers preferences and needs based on past transactions.
How many type of E-Commerce do you know? Typing these names of them! | 4
How was the transformation to a customer-intimate business accomplished? | The company uses extensive SAS decision support and data mining software.
Human or electronic intermediaries attempt to address each of the following limitations of direct interaction EXCEPT: | product distribution.
Identify five guidelines for enterprise social networking activities. | Five guidelines include allowing employees to collaborate and communicate in an employee-driven system; promoting
the use of enterprise wikis via demonstrations; setting up internal blogs and incorporating them into internal directories so users can see who has a blog; setting up enterprise social
bookmarking systems so users can see what sort of content their colleagues are tagging; and cios should be involved from the beginning to make sure the right infrastructure and tools
are in place.
Identify four trends that may slow EC and Web 3.0 and even cripple the Internet. | Security concerns, lack of net neutrality, copyright complaints, and choppy connectivity are four trends.
Identity theft | Fraud that involves stealing an identity of a person and then the use of that identity by someone pretending to be someone else in order to steal money or get other
benefits.
I
If a company purchases Godiva chocolates as gifts for its employees and has Godiva mail them directly to the recipient, the company is engaged in B2B2C. | True
Impacts of e-marketplaces on B2C direct marketing include all of the following EXCEPT: | Brand images for new companies have become more difficult to establish.
Impacts of the Web on the travel and tourism industry include all of the following EXCEPT | Decrease in direct sales of travel packages on the global market by small, local players
Implementing EC often requires significant investments in infrastructure. Therefore, a good way to start is to undertake __. | one or a few small EC pilot projects
Implementing Web 2.0 sites, especially social networks and similar communities, does all of the following EXCEPT: | Will quickly have a massive impact on almost every company that
produces consumer goods
Important trends in B2C EC include all of the following EXCEPT: | the Internet will influence approximately 25 percent of all retail sales by 2010.
In , the prices are usually dynamic and are based on changes in supply and demand. | spot sourcing
In 2005, human error was responsible for almost _______ percent information security breaches in organizations | 60
In a ______, one company sells to many business buyers from e-catalogs or auctions, usually over an extranet. | sell-side e-marketplace
In a B2C Storefront, the function that provides customers with information about the product through their browser is called the | product presentation function.
In a client/server application, the ____ logic provides the user interface. | c. Presentation
In a database table, two records: | cannot have the same primary key
In a sell-side e-marketplace, a business sells products and services to business customers, frequently over ____. | an extranet
In a sell-side e-marketplace, a business sells products and services to business customers, frequently over . | an extranet
In a sell-side marketplace, the seller must produce all or part of the goods they sell. | True
In a supplier aggregation model the exchange attempts to group many seller's products and services into one exchange. | True
In addition to EC being conducted via the Internet, EC can be conducted over local area networks (lans). | True
In addition to providing an easy mechanism for buying books, the Amazon.com Web site is easily searchable by book title and author. It also has book reviews and suggests titles based on
previous purchase activity. These enhancements make the Amazon site a favorite for readers. This is an example of | internal Web site promotion
In an effort to increase inter-organizational information flow, many companies expand access to corporate intranets to include selected trading partners and customers by creating a(n) ____. | b.
Extranet
In an exchange where plastic components are bought and sold, the market maker collects money from the buyer, and releases it to the seller once successful delivery is completed. This is an
example of: | transaction facilitation.
In an exchange where plastic components are bought and sold, the market maker purchases a new server that will be used to conduct auctions. This is an example of: | maintaining exchange
infrastructure.
In an organizational transformation | there is always a sharp break with the past and every aspect of the business will probably change
In B2B exchanges, software agents can facilitate management of multiple trading partners and their transactions across multiple virtual industry exchanges. | T
In B2C, an example of a tangible EC metric from the buyers perspective is: | cost/price of the product.
In chapter 8 - Marketing and Advertising in E-Commerce, AIDA model is mentioned and used to analyze their differences in illustrating an online purchasing behavior. What does the second A
in AIDA stand for? | Action
In collaborative work, members frequently are in different locations. Using , group members can work on the same document, which is shown on the PC screen of each participant. | Using
screen-sharing software
In company-centric marketplaces, the individual company has very little control over who participates in selling or buying transactions. | False
In cyberspace, there are intermediaries that provide and/or control information flow. These electronic intermediaries are known as | infomediaries.
In dealing with exchange members, the management of the exchange should: | make certain that the exchange is neutral in its dealings with all members.
In direct marketing: | customers are contacted directly without the help of intermediaries.
In EC Framework, which of the following items are belong to infrastructure layer? Hint: choose multiple answers (2) | Security, Messaging and information distribution
In E-Commerce B2B context, what does PRM stand for? See figure | Partner Relationship Management
In E-Commerce framework, the Policy part is belonged to _____ | Support services layer
In E-Commerce, what do PLM and voip stand for? Statement A: PLM stands for Product Life Management Statement B: voip stands for Voice over Internet Protocol Choose the right answer
from the two statements! | Statement A is False, and Statement B is True
In E-Commerce, what does PKI stand for? Hint: capitalize the first letter of each word (e.g. NIC you need to enter Network Interface Card only) | Public key infrastructure
In electronic auctions, near-perfect market information is available about prices, | d. Buyers and sellers
In electronic auctions, near-perfect market information is available about prices, products, current supply and demand, and so on. This feature provides benefits to . | buyers and sellers
In electronic exchanges and traditional open-air marketplace, buyers and sellers can interact and negotiate prices and quantities. | T
In e-procurement, office supplies for a manufacturing company would be considered direct materials. | False
In financial supply chain management, the goal is to optimize all of the following | d. The physical supply chain
In financial supply chain management, the goal is to optimize all of the following EXCEPT: | the physical supply chain
In general, online real estate is replacing existing real estate agents in most markets. | F
In general, the benefits of contract-management software include all of the following EXCEPT: | Reduces contract-related risks.
In general, what is the relationship between the cost of building and installing an EC system and the cost of operating and maintaining it? | It costs about as much time, effort, and money to
operate and maintain as to build and install a system.
In global trade, a __ is a written agreement by a bank to pay the seller, on account of the buyer, a sum of money upon presentation of certain documents. | letter of credit
In implementing a successful click-and-mortar strategy, a company must make sure that whether a customer establishes contact through face-to-face encounters with store personnel or through
the Web page, the information and service received is consistent. | T
In law, fair use refers to the use of copyrighted material for __ purposes. | noncommercial
In marketing, an intermediary is a third party that operates between sellers and buyers. Intermediaries of all kinds offer their services on the Web. | T
In order for a cell phone to be used for m-commerce, it must have a display screen. | True
In order to create a relationship btwn the Student and Grade tables they must contain: | the same column (or field)
In organizational transformation: | there is always a sharp break with the past and every aspect of the business will probably change.
In reviewing integration of new B2B systems with existing information systems, we find which of the following to be untrue? | Most major software vendors do not provide for integration.
In SCM, the supply chain of a manufacturer ends when__ | the product is used
In selling directly, manufacturers may encounter a similar problem to that of B2C, namely _____ with the regular distributors, including corporate dealers. | channel conflict
In spot-sourcing, prices are: | dynamic and set based on supply and demand.
In static trading prices are quickly influenced by supply and demand. | False
In the authorization process, money is transferred from the buyer's to the merchant's account. | False
In the consortia model: | several industry players come together to establish the exchange for the benefit of all.
In the consumer decision process, which of the following roles ultimately makes the buying decision or any part of it? | decider
In the consumer decision-making process, the buyer is the person who ultimately makes the buying decision. | FALSE
In the context of EC, ____ are electronic trading-community meeting places for many sellers and many buyers, and possibly for other business partners. | exchanges
In the decision-making process, virtual catalogs and links to external sources support the evaluation and selection phase of that process. | F
In the field, a sales representative writes notes with a mobile handwriting-recognition computer immediately after a sales call. This can be viewed as an EC activity. | False
In the internal part of the supply chain, the major concerns are production management, manufacturing, and inventory control. | T
In the one buyer, many potential sellers dynamic pricing configuration, the sellers use a forward auction. | FALSE
In the online world, merchants are not held liable for fraudulent transactions. | False
In the online world, virtually every attempt to disintermediate cash and credit cards has failed. | True
In the purchase decision-making process, blogs and search engines support the evaluation, negotiation, and selection step. | FALSE
In the real world, negotiations are done primarily electronically and with negotiation support tools. | F
In the settlement process, the systems must determine whether a buyer's card is active and whether the cardholder has sufficient funds available for the purchase. | False
In the strategy implementation phase, general long-term plans are continuously evaluated. | False
In the United States, which the federal laws place legal limits on monitoring activity? | The Wiretap Act and the Pen Register, Trap, and Trace Devices statute
In the upstream supply chain, attention is directed at distribution, warehousing, transportation, and after-sale service. | F
In the US, cellular companies are not required to support 911 calls. | False
In today’s digital economy, click-and-mortar retailers sell via stores, through voice phone calls to human operators, over the Internet through interactive Web sites, and by mobile devices. | T
In what way does mobile computing not help organizations? | Costs of hardware are increasing
In which type of market would a third-party exchange most likely be less successful? | Balanced market
Incorrect approaches to EC strategy selection include all of the following EXCEPT: | using a late-mover strategy.
Increasing the number of regular suppliers and integrating with their information systems and possibly with their business processes | Enables customized online catalogs with the same prices
for different customers.
Incubator | A company, university, or nonprofit organization that supports businesses in their initial stages of development.
Indirect materials | Materials used to support production (e.g., office supplies or lightbulbs).
Indirect materials are typically used in ______ activities. | maintenance, repair, and operation (MRO)
Individual buyers do most of the actual shopping in cyberspace in terms of dollar volume of sales. | F
Infomediaries | Electronic intermediaries that provide and/or control information flow in cyberspace, often aggregating information and selling it to others.
Information architecture | How the site and its Web pages are organized, labeled, and navigated to support browsing and searching throughout the Web site.
Information assurance (IA) | The protection of information systems against unauthorized access to or modification of information whether in storage, processing, or transit, and against
the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.
Information portals offer a variety of services to encourage users to use and return to their Web sites. | True
Information visibility | The process of sharing critical data required to manage the flow of products, services, and information in real time between suppliers and customers along the
supply chain.
Informational Web site | A Web site that does little more than provide information about the business and its products and services.
Infrastructures that support the wireless connection are: | a. Network access points, mobile communications server switches, and cellular
Infringement | Use of the work without permission or contracting for payment of a royalty.
Insuring: | is the in-house development of applications.
Intangible metrics in the model for IT project justification include each of the following except: | lead-time.
Integrity | Assurance that stored data has not been modified without authorization; a message that was sent is the same message as that which was received.
Intellectual property | Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce.
Intellectual property law is the area of law that is associated with each of the following EXCEPT: | business contracts
Intelligent agents | Software applications that have some degree of reactivity, autonomy, and adaptability as is needed in unpredictable attack situations. An agent is able to adapt itself
based on changes occurring in its environment.
Intelligent agents are capable of more sophisticated tasks than search engines. | True
Interactions within mobile social networks are currently limited to exchanging simple text messages on a one-to-one basis. | FALSE
Interactive marketing | Online marketing, facilitated by the Internet, by which marketers and advertisers can interact directly with customers, and consumers can interact with
advertisers/vendors.
Interactive voice response (IVR) | A voice system that enables users to request and receive information and to enter and change data through a telephone to a computerized system.
Interactive voice response (IVR) systems allow users to send and receive information through an interface that is controlled by their voice. | True
Interactive Web site | A Web site that provides opportunities for the customers and the business to communicate and share information.
Intermediaries are human or electronic agents that play an important role in EC by providing value-added services such as making payment arrangements to buyers and sellers. | T
Intermediaries in B2B commerce, which may be virtual or click-and-mortar intermediaries, are third parties that broker transactions between buyers and sellers. | T
Internal aggregation of products for group purchasing is usually done by large organizations. | True
Internal control environment | The work atmosphere that a company sets for its employees.
Internal procurement marketplace | The aggregated catalogs of all approved suppliers combined into a single internal electronic catalog.
Internet capabilities that make it more difficult for companies to capture profits include each of the following except: | The Internet makes it easier to make secure payments.
Internet fraud has grown even faster than the Internet itself. | TRUE
Internet radio | A Web site that provides music, talk, and other entertainment, both live and stored, from a variety of radio stations.
Internet technologies can provide consumers with easier access to pricing information, | d. Reducing prices.
Internet technologies can provide consumers with easier access to pricing information, which increases their bargaining power. To remain competitive and profitable, sellers need smarter pricing
strategies, which include all of the following strategies EXCEPT: | reducing prices.
Internet underground economy | E-markets for stolen information made up of thousands of Web sites that sell credit card numbers, social security numbers, other data such as numbers
of bank accounts, social network ids, passwords, and much more.
Intrabusiness EC | E-commerce category that includes all internal organizational activities that involve the exchange of goods, services, or information among various units and
individuals in an organization.
Intra-business e-commerce is sometimes called ____ e-commerce. | e. None of the above B2E
Intranet | An internal corporate or government network that uses Internet tools, such as Web browsers, and Internet protocols.
Intra-organizational e-commerce is ____ focused. B2B focuses on improving information exchanges throughout the ____. | c. Value chain/supply chain
Intrusion detection system (IDS) | A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated
action based on what it sees.
Investors in e-tailers which report small losses on each unit sold should not be concerned because the huge volume of business available online should more than offset these small marginal
losses. | F
Involves providing a product or service that is unique and not available elsewhere | Differentiation
Involves the management of workflows so that documents, information, or tasks are passed from one participant to another in a way that is governed by the organizations rules or procedures to
achieve required deadlines. | Workflow management
Involves using various computer-based tools and techniques to analyze transaction data and generate new ideas. | Knowledge creation
IP address | An address that uniquely identifies each computer connected to a network or the Internet.
Is a 3-dimensional word where residents retain the rights to their digital creations and can buy, sell, and trade with other residents are able to sell them at various in-world venues. | Second Life
Is a business strategy that enables manufacturers to control and share product-related data as part of product design and development efforts and in support of supply chain operations. | Product
lifecycle management
Is a business strategy that focuses on managing an enterprises interactions with its suppliers. | Supplier relationship management
Is a business strategy that focuses on providing comprehensive quality service to business partners. | Partner relationship management
Is a characteristic that influences the average length of time a visitor stays in a site. | Stickiness
Is a combination of both the brick-and-mortar retailer and an online transactional Web site. | click-and-mortar retailer
Is a complex process that requires the coordination of many activities so that the shipment of goods and services from supplier right through to customer is done efficiently and effectively for all
parties concerned. | Supply chain management
Is a computer program that can access databases of Internet resources, search for specific information or keywords, and report the results | search engine
Is a corporate or government network that uses Internet tools, such as web browsers, and Internet protocols. | intranet
Is a corporate-based acquisition site that uses reverse auctions, negotiations, group purchasing, or other e-procurement method. | buy-side e-marketplace
Is a flexible language for capturing financial information throughout a business information processes, which makes the analysis and exchange of corporate information more reliable and easier
to facilitate. | XBRL (or extensible Business Reporting Language)
Is a form of distributed computing that involves coordinating and sharing computing, application, data, storage, or network resources across dynamic and geographically dispersed organizations. |
Grid computing
Is a for-profit very rapidly growing Web site that is tapping into the enthusiasm and knowledge of people to build a better search engine than Google. | Wikia.com
Is a gateway through which employees, business partners, and the public can enter a corporate Web site. | Corporate portal
Is a general-purpose architecture that enables distributed applications to be assembled from a Web of software services in the same way that Web sites are assembled from a web of HTML pages.
| Web services
Is a marketing strategy in which customers agree to accept advertising and marketing materials, known as opt-in. | Permission advertising
Is a marketplace in which sellers and buyers exchange goods and services for money or for other goods and services, but do so electronically. | Marketspace
Is a method of doing business by which a company can generate revenue to sustain itself. | Business model
Is a model devised by Porter that says that five major forces of competition determine industry structure and how economic value is divided among the industry players in an industry; analysis of
these forces helps companies develop their competitive strategy. | Competitive forces model
Is a single point of access through a Web browser to critical business information located inside and outside of an organization | Information portal
Is a standard used to improve compatibility between different systems of business partners by defining the meaning of data in business documents. | Extensible markup language (or XML)
Is a tendering (bidding) system in which suppliers are invited to bid on the fulfillment of an order and the lowest bid wins. | Reverse auction
Is a virtual marketplace in which sellers and buyers meet and conduct different types of transactions | E-marketplace
Is a Web development technique for creating quicker and more responsive Web applications by exchanging small amounts of data with the server so that the entire Web page does not have to be
reloaded each time the user makes a change | Ajax
Is an advertising strategy in which customers agree to accept advertising and marketing materials. Known as opt-in. | Permission marketing
Is an approach aimed at making the humancomputer interface more natural. | Social computing
Is an architecture that enables the assembly of distributed applications from software services and ties them together. | Web Services
Is an arrangement whereby a marketing partner or individual refers consumers to the selling company’s Web site. | Affiliate marketing
Is an EC architecture consisting of four tiers: Web browsers, Web servers, application servers, and database servers. | Multitiered application architecture
Is an EC model in which a business provides some product or service to a client business that maintains its own customers | Business-to-business-to-consumer (B2B2C)
Is an EC model in which EC transactions and activities conducted in a wireless environment. | Mobile commerce (m-commerce)
Is an E-commerce category that includes all internal organizational activities that involve the exchange of goods, services, or information among various units and individuals in an organization. |
Intrabusiness EC
Is an exchange formed and operated by a group of major companies in an industry to provide industrywide transaction services. | Consortium trading exchange
Is an exchange that handles materials used by companies in different industries. | Horizontal exchange
Is an exchange whose members are in one industry or industry segment. It trades only in materials/services unique for that industry. | Vertical exchange
Is an invitation to participate in a tendering (bidding) system. | Request for quote (or RFQ)
Is an m-commerce application targeted to a customer whose preferences and needs and location (e.g., using GPS) are known in real time. | Location-based commerce
Is based on the Circle of Friends technique for networking individuals in virtual communities and was the top online social network service until overtaken by myspace. | Friendster
Is marketing that treats each customer in a unique way to fit marketing and advertising with the customer’s profile and needs. | One-to-one marketing
Is money invested in a business by an individual or a group of individuals in exchange for equity in the business | Venture capital
Is MS Access a DBMS? | Is not just a DBMS, combines a DBMS and an application generator.
Is one of an individual’s unique physical or behavioral characteristics that can be used to identify an individual precisely. | Biometric
Is one of Oracle’s key applications. It supports product catalog and content management, interactive and complex selling, personalized pricing, flexible check and payment options, account and
contract management, and post-sales order and shipping services. | iStore
Is one of the two major models of third-party exchanges where distributors standardize, index, and aggregate suppliers’ catalogs and make them available to buyers in a centralized location. |
Supplier aggregation model
Is one type of exchange in which several industry players collaborate to build an exchange so that all can benefit. | A consortium (or co-op)
Is the collaborative use of technology to enhance B2B processes and improve speed, agility, real-time control, and customer satisfaction. | E-supply chain management
Is the continuous evaluation of progress toward the organization’s strategic goals, resulting in corrective action and, if necessary, strategy reformulation. | Strategy assessment
Is the degree to which something can be bought or sold in a marketplace without significantly affecting its price. | Market liquidity
Is the electronic delivery of newspapers, magazines, books, videos, music, and other digitizable information over the Internet. | Online publishing
Is the electronic transfer of specially formatted standard business documents, such as bills, orders, and confirmations, sent between business partners. | Electronic data interchange (or EDI)
Is the mapping and measuring of relationships and flows between people, groups, organizations, animals, computers or other information or knowledge processing entities. | Social network
analysis
Is the method of bringing together the products offered by many different suppliers into one place for consideration by all the buyers at a given company. | Aggregating catalogs
Is the portion of an e-seller’s business processes through which customers interact, including the seller’s portal, electronic catalogs, a shopping cart, a search engine, and a payment gateway. |
Front end
Is the practice of using games, particularly computer games, to advertise or promote a product, an organization, or a viewpoint. | Advergaming
Is the process made up of a range of activities by which an organization obtains or gains access to the resources they require to undertake their core business activities. | Procurement
Is the process of buying, selling, or exchanging products, services, or information via computer networks. | Electronic commerce
Is the process of making the selected applications and projects a reality by hiring staff; purchasing equipment; licensing, purchasing, or writing software; and contracting vendors. | Project
management
Is the process whereby intermediaries, either new ones or those that had been disintermediated, take on new intermediary roles. | Reintermediation
Is the psychological status of depending on another person or organization to achieve a planned goal. | Trust
Is the purchase of goods and services as they are needed, usually at prevailing market prices. | Spot buying
Is the rapid production of customized products or services at a reasonable cost for a large number of customers. | Mass customization
Is the term that refers to the collective functionality of ERP, SCM, CRM, and e-business solutions. | Enterprise systems
Is the transfer of documents and computer files while video conferencing | Data conferencing
Is the use of Web-based technologies to support the material acquisition, warehousing, and transportation processes. | E-logistics
Is typically a third party that operates between sellers and buyers | Intermediary
Islands of automation do not allow for productivity of individual functional groups. | b. False
ISP hosting service | A hosting service that provides an independent, stand-alone Web site for small and medium-sized businesses.
Issues related to trust in EC include all of the following EXCEPT: | As a result of trust-transference programs through portal affiliation, seal of approval programs, online shopping
communities, and customer endorsements, customers are fully confident in online purchasing transactions.
It can be said that competition between companies is being replaced by competition between _____ . | Networks
It has been well known for generations that the success of many private, public, and military organizations depends on their ability to manage the flows of materials, information, and money,
which is referred to as the product life cycle. | T
It is currently known that if a front-end application such as a Web site is effectively secured, then | The data itself may not be secure because the application may not function as planned.
J
Jackie has an e-card that she uses to purchase office supplies for the company she works for. What type of smart card is she using? | Purchase card
Jackie has an e-card that she waves at the turnstile to enter the subway. What type of smart card is she using? | Contactless card
Jackie purchases a new e-book from an online publisher. She loses power to her computer in a thunderstorm before the download is completed. When she tries to restart the download, she
receives a message saying her download is complete. Jackie will need the: | customer service function
Jackie uses a software system to place bids automatically on her behalf until her predetermined maximum price is reached. The software bids in such a way as to minimize the final bid. This is
referred to as: | proxy bidding
Jami sells construction equipment. Whenever she calls on her building contractor customers, she asks if they are having any problems. In doing so, Jami is addressing which of the following core
aspects of marketing? | Satisfying customer needs and wants
Janice and Tony decided to buy the new computer system Paul suggested after careful analysis. Janice directed Rich, her assistant, to order the system. In this example, what purchasing role does
Rich play? | Buyer
Janice and Tony decided to buy the new computer system Paul suggested after careful analysis. Janice directed Rich, her assistant, to order the system. In this example, what purchasing role does
Janice play? | Buyer
Jeff wants to purchase online, but is concerned about a company's privacy policy. What online purchase decision aid should he use? | Trust verification site
Jewelry sales over the Internet is just beginning, but could be one of the top sellers on the Internet in the near future. | F
Job seekers can both reply to ads and post their information on several online recruiting sites. | True
John wants to know if the first edition novel he just purchased through an e-auction is | b. Authentication
John wants to know if the first edition novel he just purchased through an e-auction is actually a first edition. The auction host helps him locate an expert that will him whether the novel is a
genuine first edition or a fake. This is an example of: | authentication
Joining a public e-marketplace provides a business with greater buying and selling capabilities, but the tradeoff is lower supply chain power. | T
Julie is using an intelligent agent to help her find the best price on a CD she would like to purchase. What type of agent is she using? | Merchant brokering
Justifying an EC investment by comparing the costs of each project against its benefits is known as a cost-benefit analysis. | True
Justifying information security projects: | should be done because employee security training is usually poorly done
K
Key (key value) | The secret code used to encrypt and decrypt a message.
Key business drivers for B2B are all of the following EXCEPT: | the willingness of companies to incur higher costs to improve collaboration.
Key factors limiting the use of personalization include | privacy and trust issues.
Key performance indicators (kpis) | The quantitative expression of critically important metrics.
Key space | The large number of possible key values (keys) created by the algorithm to use when transforming the message.
Key strategies for successful online community include all of the following EXCEPT: | Control the sharing of information or sensitive opinions
Keyword banners | Banner ads that appear when a predetermined word is queried from a search engine.
Knowledge discovery in databases (KDD)/knowledge discovery (KD) | The process of extracting useful knowledge from volumes of data.
Knowledge generated in e-business contributes to the enhancement of three core operating processes, which include all of the following EXCEPT | project management
Knowledge management (KM) | The process of capturing or creating knowledge, storing it, updating it constantly, disseminating it, and using it whenever necessary.
L
Lack of consumer confidence in EC security is a limitation of EC. | True
Lack of search and retrieval tools is a common problem for corporate portals. | True
Large private organizational buyers and government agencies make large-volume or large-value purchases through __, also known as reverse auctions. | electronic tendering systems
Learning agent technology is a nonintrusive way to personalize web content by watching a user's actions. | True
Learning, training, and knowledge sharing in social networks and by using social software tools for learning best describes: | social learning.
Light bulbs and office supplies might be purchased in a(n) _____ by both an automaker and a steelmaker. | horizontal exchange
Lightweight programming techniques and tools letting nearly anyone act as a Web site developer is a representative characteristic of Web 2.0. | TRUE
Limitations of online research methods are all of the following EXCEPT: | E-mail surveys have the lowest response rate.
List and briefly describe the three components of the CIA security triad. | The CIA triad includes confidentiality, integrity, and availability. Confidentiality is the assurance of data
privacy. The data or transmitted message is encrypted so that it is readable only by the person for whom it is intended. The confidentiality function prevents unauthorized disclosure
of information. Integrity is the assurance that data are accurate or that a message has not been altered. It means that stored data has not been modified without authorization; a
message that was sent is the same message that was received. Availability is the assurance that access to data, the Web site, or other EC data service is timely, available, reliable, and
restricted to authorized users.
List and briefly discuss the five major roles that people play in the decision-making process. | The major roles are initiator, influencer, decider, buyer, and user. The initiator is the person
who first suggests or thinks of the idea of buying a particular product or service. The influencer is the person whose advice or view carries some weight in making a final purchasing
decision. The decider is the person who ultimately makes a buying decision or part of it, such as whether to buy, what to buy, how to buy, or where to buy. The buyer is the person
who makes the actual purchase. The user is the person who consumes or uses the product or service.
List consequences of poorly designed database. | poor performance, difficult to revise adapt to changing circumstances, hard to navigate, slow
List five business models by distribution channel. | The five business models are direct marketing by mail-order retailers that go online, direct marketing by manufacturers, pure-play e-
tailers, click-and-mortar retailers, and Internet malls.
List four reasons why Web advertising is growing rapidly. | Seven reasons are mentioned in the textbook and include cost, richness of format, personalization, timeliness, location-basis,
linking, and digital branding. Referencing cost, online ads are sometimes cheaper than those in other media. In addition, ads can be updated at any time with minimal cost. In terms of
format richness, Web ads effectively use the convergence of text, audio, graphics, and animation. In addition, games, entertainment, and promotions can be easily combined in online
advertisements. When using personalization, Web ads can be interactive and targeted to specific interest groups or individuals, and the Web is a much more focused medium. In the
area of timeliness, Internet ads can be fresh and up-to-the-minute. Web advertising can be location based; Internet ads can be sent to consumers whenever they are in a specific time
and location. With linking, it is easy to link from an online ad to a storefront. In the area of digital branding, even the most price-conscious online shoppers are willing to pay
premiums for brands they trust.
List the six major EC trading activity categories. | presence and discovery, find information, compare, analyze; , (2) trading buy, sell, exchange; (3) communicate, collaborate, learn; (4)
entertainment; (5) improve performance; (6) other activities, recruit, customer service.
List the six major objectives of EC defense strategies. | Prevention and deterrence, detection, containment, recovery, correction, and awareness and compliance are the six objectives.
Localization | The process of converting media products developed in one environment (e.g., country) to a form culturally and linguistically acceptable in countries outside the original
target market.
Location-based m-commerce (l-commerce) | Delivery of m-commerce transactions to individuals in a specific location, at a specific time.
Lowering a customer's search cost allows them to: | Research more items to find the best price
M
Macro virus (macro worm) | A macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed.
Maintenance, repair, and operation (MRO) | Indirect materials used in activities that support production.
Major characteristics of the digital economy include obsolescence, digitization, and wars. | True
Major department and discount stores are classified as: | General malls.
Major implementation challenges that companies must consider when planning e-procurement initiatives include all of the following EXCEPT: | Increasing the number of regular suppliers
and integrating with their information systems and possibly with their business processes.
Many auction sites are implementing _______ because of the significant | d. M-commerce applications
Many auction sites are implementing __ because of the significant increase in the number of users who browse the Internet wirelessly. | M-commerce applications
Many B2C and B2B businesses rely on specialized third-party software and services to calculate the taxes associated with a sale because: | Of the complexities.
Many companies employ a(n) ____, which is a gateway for customers, employees, and partners to reach corporate information and to communicate with the company. | Corporate portal
Many companies use a corporate portal, which is a gateway for customers, employees, and partners to reach corporate information and communicate with the company. | True
Many companies use different names, colors, sizes, and packaging for their overseas products and services. This practice is referred to as: | Localization.
Many companies use intermediaries or trading assistants instead of implementing e-auctions themselves for each of the following reasons EXCEPT: | To avoid tax and legal fees.
Many experts believe that the next major step in the evolution of computing will be _______ in which almost every object will have processing power and a wired or wireless connection to a
network. | Pervasive computing
Many insurance companies use a dual strategy, keeping human agents but also selling online. | TRUE
Many of the outcomes from the first two phases of the strategic planning process, such as a determination of goals, competitor analysis, strategic opportunities, and risk analysis come together in
a __. | Business plan
Mark is purchasing crude oil through an online system. This is an example of strategic sourcing. | False
Mark is using an intelligent agent to help him determine which CD to purchase. What type of agent is he using? | Product brokering
Market liquidity refers to the degree to which a product or service can be bought or sold in a marketplace without significantly affecting its price. | T
Market segmentation | The process of dividing a consumer market into logical groups for conducting marketing research and analyzing personal information.
Market segmentation increases the size of the group you are selling to. | False
Marketing and advertising approaches has evolved from mass marketing to market segmentation to one-to-one marketing. This evolution occurred because: | The Internet enabled companies to
better communicate with customers and understand their needs and buying habits.
Marketing done online between any seller and buyer is indirect marketing. | FALSE
Marketing that takes place without the help of intermediaries is called: | Direct marketing.
Markets in which several large sellers sell to a large number of buyers are called: | Seller-concentrated markets.
Markets that deal with one industry or industry segment are: | Vertical marketplaces.
Markets that focus on providing materials or products that are used in various types of industries are known as horizontal marketplaces. | T
Marketspace | A marketplace in which sellers and buyers exchange goods and services for money (or for other goods and services), but do so electronically.
Mark's company helps several buyers and sellers meet and conduct business online. What type of model is he using? | Many-to-many marketplace
Mass customization | A method that enables manufacturers to create specific products for each customer based on the customer’s exact needs.
Mass marketing is an approach to marketing that treats each customer in a unique way such as fitting advertising to the customer’s profile and needs. | F
Maverick buying | Unplanned purchases of items needed quickly, often at non-pre-negotiated higher prices.
McAfee allows users of its VirusScan virus-detection software to automatically update the latest security patches online. This is an example of _______ to attract customers who value this
automatic update. | Product or service differentiation.
M-commerce allows for localization of services by knowing exactly where a user might be located. | True
Means that the communication and collaboration are done in real time. | Synchronous
Measures the time required to complete an operation such as downloading a Web page. It is an indicator of the user’s experience with the system. | Latency
Membership in the exchange should be inclusive and allow a variety of businesses to take part. Which of the five critical success factors identified by Ramsdell is being described? | Openness
Merchant brokering | Deciding from whom (from what merchant) to buy products.
Merchant brokering agents help users decide which product to purchase. | False
Merchant server software commonly includes the following features EXCEPT | Order management that optimizes movement of products through the supply chain.
Merchants can study and find out what customers want through | Market research.
Message digest (MD) | A summary of a message, converted into a string of digits after the hash has been applied.
Metadata | Data about data, including software programs about data, rules for organizing data, and data summaries.
Methodology and software that enable organizations to perform a variety of activities involved in Web advertising, such as tracking viewers and rotating ads is known as | Ad management.
Microblogging | A form of blogging that allows users to write messages (usually up to 140 characters) and publish them, either to be viewed by anyone or by a restricted group that can
be chosen by the user. These messages can be submitted by a variety of means, including text messaging, instant messaging, e-mail, MP3, or just on the Web.
Microfinance | Refers to the provision of financial services to poor or low-income clients, including consumers and the self-employed.
Microsoft built its internal marketplace, named for the procurement of small items. | MS Market
Middleware provides all of the following functions or features EXCEPT: | Integrates large systems with one or more back-end databases
Mike's business plan calls for him to coordinate several businesses together in one exchange. Together, he hopes that this group of businesses will receive better pricing from the big vendors.
What type of model is Mike using? | Buyer aggregation
Mobile access supports the two functions of sales force mobilization and field service, which extends the reach of to both employees and business partners on a 24/7 basis to any place where
recipients are located. | Customer relationship management
Mobile access supports the two functions of sales force mobilization and field service, which extends the reach of _____ to both employees and business partners on a 24/7 basis to any place
where recipients are located. | Customer relationship management
Mobile business applications can be used to support employees through Internet-based and non-Internet-based applications. | True
Mobile commerce (m-commerce or m-business) | Any business activity conducted over a wireless telecommunications network or from mobile devices.
Mobile entertainment | Any type of leisure activity that utilizes wireless telecommunication networks, interacts with service providers, and incurs a cost upon usage.
Mobile government (m-government) | The wireless implementation of e-government mostly to citizens but also to businesses.
Mobile social networking | Members converse and connect with one another using cell phones or other mobile devices.
Mobile worker | Any employee who is away from his or her primary workspace at least 10 hours a week or 25 percent of the time.
More and more people are willing to pay for digital music, as shown by the success of __ | Apple’s iTunes
Morgan has an e-card that he uses to access different parts of his company's R&D offices. What type of smart card is he using? | Smart card
Most EC applications are based on _____ that begin with an order, frequently a __ order. | Pull operations; customized
Most of the social-networking sites expect to earn revenue from: | Transaction Fees
Most online travel agents do not offer real travel bargains. | True
Most social networks, such as LinkedIn and Weibo, are private communities. | FALSE
Most WLANs run on a telecommunications standard known as ______, which is more commonly called __. | IEEE 802.11; Wi-Fi
MRO stands for maintenance, repair, and operation which refer to indirect or nonproduction materials that support the production process. | T
MSN or Yahoo! are types of exchanges that generate revenue through membership fees. | F
Multichannel business model | A business model where a company sells in multiple marketing channels simultaneously (e.g., both physical and online stores).
Multimedia messaging service (MMS) | The emerging generation of wireless messaging; MMS is able to deliver rich media.
N
Name-your-own-price model | Auction model in which a would-be buyer specifies the price (and other terms) he or she is willing to pay to any willing and able seller. It is a C2B model
that was pioneered by Priceline.com.
Negotiation and bargaining are two types of auctions where prices are not fixed, but rather are allowed to fluctuate as market supply and demand change. | F
Net-a-Porter buying merchandise from its designers is an example of B2B commerce. | True
Netflix implemented intelligent agents in its movie recommendation service called Cinematch to help customers select movies they would like to watch and to better manage its inventory. | T
Network infrastructures include cell phones and other electronic devices that are located in various locations by telecommunications networks, including wireless ones. | True
Network-based positioning | Relies on base stations to find the location of a mobile device sending a signal or sensed by the network.
Networked computing connects multiple computers and other electronic devices that are located in various locations by telecommunications networks, including wireless ones. | True
Neutrality among members and groups is vital for the management of an exchange. | True
Nonproduction materials such as equipment and tools that support production are called: | indirect materials
Nonproduction materials, such as office supplies, that support production are called: | indirect materials.
Nonrepudiation | Assurance that online customers or trading partners cannot falsely deny (repudiate) their purchase or transaction.
Normal form | one category in a set of categories used to describe relations according to the type of anomalies that can occur in the relations
Not all EC investments need to be formally justified. All of the following are cases where formal evaluation may not be needed EXCEPT: | When competitors have made that type of
investment
O
Observing members are not generally allowed to trade in exchanges. | True
Offer two-way video, on-the-fly interaction, and application sharing. Such systems provide for interactive remote instruction systems, which link sites over a high-speed intranet. | E-learning
systems
Offering quality merchandise at good prices, coupled with excellent service, and cross-channel coordination and integration in which customers can almost seamlessly operate between the online
and physical environments of a business are also important elements in successful e-tailing. | T
Offers one of the most popular storefront packages at with three levels of merchant solutions: starter, standard, and professional | Yahoo!
Offline transactions are somewhat influenced by research conducted online, with approximately one-third of online shoppers reporting that they used the Internet to research and influence their
offline shopping choices. | F
Old economy processes will be broken into specialized segments that can be delivered by specialized intermediaries. | Unbundling
On a(n) ____ architecture, the server does most of the work. | d. Thin client
Once a company knows a consumer's preferences, the company can predict, without asking the consumer directly, what other products or services that consumer might enjoy through |
Collaborative filtering
On-demand CRM | CRM hosted by an ASP or other vendor on the vendor's premise; in contrast to the traditional practice of buying the software and using it on-premise.
On-demand delivery service | Express delivery made fairly quickly after an online order is received.
On-demand delivery services usually rely on third party shipping agents (like UPS). | False
One basic way to categorize different EC investments is to distinguish between investments in infrastructure and investment in specific EC applications because benefits from infrastructure
investments: | Are made for the long-term.
One company sells to many business buyers from e-catalogs or auctions, usually over an extranet. | Sell-side e-marketplace
One initiative underway that could lead to widespread support for the introduction of RFID | d. Electronic Product Code
One initiative underway that could lead to widespread support for the introduction of RFID is the __, which identifies the manufacturer, producer, version, and serial number of each item and
does not require line-of-sight contact to be read. | Electronic Product Code
One major characteristic of all exchanges is that they are electronic trading-community meeting places for a single seller and many buyers, and possibly for other business partners. | F
One of the facilitators of e-learning is __ technologies, such as blogs and wikis. | Web 2.0
One of the factors that has led to the failure of initial B2B exchanges was the failure of these marketplaces to foster a broad-based sharing of | Information
One of the factors that influence the success of a B2B exchange is __, which provides the rules for the exchange, minimizes conflicts, and supports decision making. | Governance
One of the first decisions to be made in building a Web site is: | Who will host it
One of the keys to building effective customer relationships is an understanding of intelligent agents. | FALSE
One of the major benefits of e-markets is the improvement in supply chains with the creation of a(n) __. | Hub-based chain
One of the major challenges of one-to-one advertising is __, or the flooding of users with junk e-mail, banners, and pop-ups. | Spamming
One of the major phenomena of Web 2.0 is the emergence and rise of e-auctions. | FALSE
One of the major problems facing direct sellers is __. | How to find buyers
One of the most important issues in implementing e-government is: | Its adoption and usage by citizens.
One of the most significant differences between Web 2.0 and the traditional Web is the greater collaboration among Internet users and other users, content providers, and enterprises. | TRUE
One of the strengths of EC is the ease with which its adopters can reach a global population of consumers. However, EC-driven businesses must consider the critical elements affecting the value
of EC across cultures. Those elements include all of the following EXCEPT | Delivery delays
One problem with the Address Verification System (AVS) for fraud prevention is the number of false positives, meaning that the merchant rejects a valid order. | True
One problem with Web analytics, Web mining, and clickstream data is that we observe and follow a computer, not knowing who is actually moving the mouse. | True
One unique item is offered. The price starts high until someone bids and becomes the winner. What type of auction is being described? | Quickwin auction
One way to share information with supply chain partners is wireless ___, which is the science of measuring physical phenomena such as temperature, volume, or an on/off condition at a remote
point and transmitting the value to a distant recorder or observer. | Telemetry
Online analytical processing (OLAP) | End-user analytical activities, such as DSS modeling using spreadsheets and graphics, that are done online.
Online banking is purely an expense for banks, it offers no advantage other than to retain current customers. | False
Online intermediary | An online third party that brokers a transaction online between a buyer and a seller; may be virtual or click-and-mortar.
Online market research is generally less expensive than traditional market research. | True
Online markets owned and operated by a single company and may be either sell-side or buy-side. | Private e-marketplaces
Online methods of bringing new customers to a B2B site when a B2B vendor wants to grow by adding new customers or products include all of the following EXCEPT: | Through direct mail
campaigns.
Online negotiation can be facilitated by computer technology for the negotiation process and software agents for searches and comparisons. | T
Online publishing only seeks to digitize materials that have traditionally been available in print. | False
Online trading and investing in stocks is one of the fastest growing areas of EC. | True
Online travel services have high margins because of their multiple revenue models including commissions, revenue from advertising, lead-generation payments, consultancy fees, subscription or
membership fees, and revenue-sharing fees. | F
Operational data store | A database for use in transaction processing (operational) systems that uses data warehouse concepts to provide clean data.
Opt-in | Agreement that requires computer users to take specific steps to allow the collection of personal information.
Options for acquiring storefronts include all of the following EXCEPT: | Join a mall
Opt-out | Business practice that gives consumers the opportunity to refuse sharing information about themselves.
More and more people are willing to pay for digital music, as shown by the success of __ | Apple’s iTunes
Organizations are embracing mobilized computing technologies for several reasons EXCEPT: | Wireless security problems have been solved with encryption.
Most WLANs run on a telecommunications standard known as ______, which is more commonly called __ | IEEE 802.11; Wi-Fi
Outsourcing | A method of transferring the management and/or day-to-day execution of an entire business function to a third-party service provider.
Outsourcing options for creating and operating EC applications include: | All of the above.
P
P2P systems have all of the following key characteristics EXCEPT: | The overall system is well integrated, but lacks tools for easy creation of content or for adding functionalities.
P2P systems primarily allow business to share media with customers. | False
Packing, delivery, accounting and logistics are examples of: | c. Back-office operations.
Page | An HTML (Hypertext Markup Language) document that may contain text, images, and other online elements, such as Java applets and multimedia files. It can be generated
statically or dynamically.
Partner relationship management (PRM) | Business strategy that focuses on providing comprehensive quality service to business partners.
Patent | A document that grants the holder exclusive rights to an invention for a fixed number of years.
Paying a yearly fee to access Salon.com's articles is an example of a subscription business model. | True
Payment card | Electronic card that contains information that can be used for payment purposes.
Payment service provider (PSP) | A third-party service connecting a merchant’s EC system to the appropriate acquiring bank or financial institution. PSPs must be registered with the
various card associations they support.
Peer-to-peer (P2P) technology can be used in C2C, B2B, and B2C. | True
Penetration test (pen test) | A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source, (e.g., a cracker).
Perhaps a potential customer’s most common path to a previously unknown website is through a(n) ____ | a. Search engine
Permission advertising (permission marketing) | Advertising (marketing) strategy in which customers agree to accept advertising and marketing materials (known as opt-in).
Personal area network (PAN) | A wireless telecommunications network for device-to-device connections within a very short range.
Personal characteristics of customers, such as age and income, are independent variables, which are uncontrollable variables for EC companies. | T
Personal digital assistant (PDA) | A stand-alone handheld computer principally used for personal information management.
Personal firewall | A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s
network interface card.
Personalization | The tailoring of services, products, and advertising content with individual consumers and their specific preferences.
Personalization and user profiling strategies include each of the following EXCEPT: | Segmenting the market based on demographics.
Personalization matches services, products, and advertising content with large groups of customer segments. | FALSE
Personalized content | Web content that matches the needs and expectations of the individual visitor.
Person-to-person lending | Lending done between individuals circumventing the bank’s traditional role in this process.
Perspectives about Web 2.0 include all of the following EXCEPT | Web 2.0 is organized around pages, software, technology, individuals, and corporations.
Phishing | A crimeware technique to steal the identity of a target company to get the identities of its customers.
Phishing is rampant because some people respond to it and make it profitable. | True
Platform for Privacy Preferences Project (P3P) | A protocol allowing Web sites to declare their intended use of information they collect about browsing users.
Pop-up ad | An ad that appears in a separate window before, after, or during Internet surfing or when reading e-mail.
Pop-up under ad | An ad that appears underneath the current browser window, so when the user closes the active window the ad is still on the screen.
Portal ABC was designed for a company’s intranet. It has a broad amount of information designed for a narrow audience. What type of portal is being described? | Corporate portal
Portal ABC was designed for a large and diverse audience. It has little individual customization available. What type of portal is being described? | Publishing portal
Potential advantages of e-learning include each of the following EXCEPT: | College professors are anxious to develop new online courses.
Potential drawbacks of e-learning include each of the following EXCEPT: | Knowledge retention is lower than in traditional classrooms.
Potential uses for a corporate intranet can be best described as: | Robust, potential uses still being discovered.
Pouilly’s Poodle Shop wants to produce monthly cash flows from its Internet Doggie-Cam investment. The most appropriate method for assessing this investment is: | Internal rate of return
(IRR).
Preventing vulnerability during the EC design and pre-implementation stage is far more expensive than mitigating problems later. | False
Prevention measures | Ways to help stop unauthorized users (also known as intruders) from accessing any part of the EC system.
Prices, advertising, promotions, and logistics are intervening variables that can be controlled by vendors. | T
Pricing, technical support, and logistics support are several of the __ that can be controlled by EC vendors and sellers. | Intervening variables
Primary key | The candidate key selected to be the "official" key of a relationship
Privacy | The right to be left alone and free of unreasonable personal intrusions.
Private online communities that are only open to those who belong to them are called: | Darknets
Procter & Gamble (P&G) used the Internet in the new product development of Whitestrips, a teeth-brightening product. Based on this experience, P&G: | Reduced the time-to-market from
concept to market launch by approximately two years.
Procurement | The process made up of a range of activities by which an organization obtains or gains access to the resources (materials, skills, capabilities, facilities) it requires to
undertake its core business activities.
Procurement management | The planning, organizing, and coordinating of all the activities related to purchasing goods and services needed to accomplish the organization’s mission.
Productivity benefits from using EC are difficult to measure because: | EC gains in certain areas of the company may be offset by losses in other areas.
Project management is the process of making the selected applications and projects a reality, including hiring staff; purchasing equipment; and licensing, purchasing, or writing software. | True
Projections of the business technological, political, economic, and other environments are called: | Forecasts
Property rights relevant to e-commerce include all of the following EXCEPT: | The right to bring criminal charges against a violator
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction best defines: | Information
security
Protocol tunneling | Method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets, sending them in packets across the Internet,
and decrypting them at the destination address.
Provide connectivity among merchants, customers, and financial networks enabling authorization and payments is called the: | Payment processing services
Psychographic segmentation involves dividing customers based on where they live. | False
Public (asymmetric) key encryption | Method of encryption that uses a pair of matched keys — a public key to encrypt a message and a private key to decrypt it, or vice versa.
Public e-marketplaces | Third-party exchanges open to all interested parties (sellers and buyers).
Public exchanges are many-to-many marketplaces that are open to all interested sellers and buyers and usually run by third parties. | T
Public key infrastructure (PKI) | A scheme for securing e-payments using public key encryption and various technical components.
Public key infrastructure (PKI) is an authentication method | a. That has become the cornerstone for secure e-payments and intranet applications.
Purchases by governments, private corporations, resellers, and other organizational buyers often are used to create other products or services by adding value to them. | T
Purchases of goods and services based on long-term contracts is referred to as: | Strategic sourcing
Purchases of goods or services that are based on short-term contracts and frequently purchased in large quantities are known as strategic sourcing. | F
Purchasing a computer from Dell's Web site is partial EC because the merchandise is physically delivered. | True
Purchasing a Dell computer online for use at home is an example of e-tailing. | True
Purchasing new computers or technologies generally leads to a competitive advantage for a company. | b. False
Purchasing-oriented (procurement) consortia have not yet been a successful or popular B2B consortium model. | F
Purely physical companies are referred to as ______ companies, whereas companies that are engaged only in EC are considered ____ companies. | Brick-and-mortar; virtual
Pure-play organizations are old-economy organizations that perform their primary business offline, selling physical products by means of physical agents. | False
R
Random banners | Banner ads that appear at random, not as the result of the user’s action.
Real transformation of government structure takes place in what stage of implementation? | Clustering of services
Real-time location system (RTLS) | Systems used to track and identify the location of objects in real time.
Recognizes that ____ are the core of a business and that a company’s success depends on effectively managing its relationships with them. | Customer relationship management; customers
Referencing the licensing fees revenue model, a company receives commissions for referring customers to others' websites. | False
Referential integrity constraint | A constraint on a foreign key that states that no value can be placed in the foreign key unless it already exists as a primary key value in the linked table.
Referral economy | The effect upon sales of consumers receiving a referral or recommendation from other consumers.
Refers to a broad range of business activities that includes not just the buying and selling of goods and services, but also servicing customers, collaborating with business partners, and conducting
electronic transactions within an organization. | E-business
Refers to a customer’s loyalty to an e-tailer or a manufacturer that sells directly online or to loyalty programs delivered online or supported electronically. | E-loyalty
Refers to a single company’s Web site where products and services are sold. | Storefront
Refers to any situation in which direct competition and/or damage caused by bypassing a former existing channel partner is perceived to have resulted from the introduction of a new, often
online, channel. | Channel conflict
Refers to communication systems that transmit voice calls over Internet-Protocol-based networks. | Voice-over-IP (VoIP)
Refers to erratic shifts in orders up and down supply chains. | Bullwhip effect
Refers to M-commerce transactions targeted to individuals in specific locations, at specific times. | Location-based commerce (L-commerce)
Refers to prices that are not fixed, but that are allowed to fluctuate as supply and demand in a market change. | Dynamic pricing
Refers to the benefits, including the intangible, nonquantitative ones, that a company can derive from using EC. | Value proposition
Refers to the conduct of e-commerce via wireless devices or from portable devices. | Mobile commerce
Refers to the integration of computers and wireless communications in order to improve information flow. | Telematics
Refers to the matching of services, products, and advertising content to individuals and their preferences. | Personalization
Refers to the planning, organizing, and coordination of all the management activities pertaining to the purchasing of goods and services needed to accomplish the mission of an enterprise. |
Procurement management
Refers to the practice of promoting a product or service to a subset of customers or prospects. | Market segmentation
Refers to the process and tools that enable any activity in the sourcing process to be done electronically, including identifying new suppliers for a specific category of purchasing requirements. |
E-sourcing
Refers to the rapid movement of prices over time and possibly across customers, as a result of supply and demand matching. | Dynamic pricing
Refers to the removal of organizations or business process layers responsible for certain intermediary steps in a given supply chain. | Disintermediation
Refers to the second-generation of Internet-based services that let people collaborate and share information online in new ways, such as social networks and wikis. | Web 2.0
Refers to the use of data mining techniques for discovering and extracting information from Web documents. | Web mining
Refers to the use of digital technologies that enable companies to collaboratively plan, design, develop, manage, and research products, services, and innovative EC applications. | Collaborative
commerce
Refers to transactions between businesses conducted electronically over the Internet, extranets, intranets, or private networks. | Business-to-business e-commerce (or B2B)
Refers to various banking activities conducted from home or the road using an Internet connection. | Electronic (online) banking
Regulatory compliance | Systems or departments in an organization whose job is to ensure that personnel are aware of and take steps to comply with relevant laws, standards, policies,
and regulations.
Reintermediation | The process whereby intermediaries (either new ones or those that had been disintermediated) take on new intermediary roles.
Relation | A table-like structure of rows and columns; each column has a unique name, all values in a column are for the same attribute, cells only hold single values, order of rows or
columns doesn't matter, and each row as a whole must be unique.
Request for proposal (RFP) | Notice sent to potential vendors inviting them to submit a proposal describing their software package and how it would meet the company’s needs.
Request for quote (RFQ) | The invitation to participate in a tendering (bidding) system.
Research has shown that e-commerce sites that use an auction model tend to: | a. Reach critical mass more quickly than catalog-order-based.
Researchers believe that the use of technology to facilitate collaboration among trading partners will help the expansion of the exchanges. | Wireless
Responses to environmental pressures may include activities that exploit opportunities created by changing conditions. | True
Retailers make their suppliers responsible for determining when to order and how much to order. The retailer provides the supplier with real-time information, inventory levels, and a threshold
below which orders are replenished. | Vendor-managed inventory
Retailers stand to benefit from online communities in several important ways EXCEPT | Viral marketing will be replaced by free advertising
Reusability | The likelihood a segment of source code can be used again to add new functionalities with slight or no modification.
Reverse auction (bidding or tendering system) | Auction in which the buyer places an item for bid (tender) on a request for quote (RFQ) system, potential suppliers bid on the job, with
the price reducing sequentially, and the lowest bid wins; primarily a B2B or G2B mechanism.
Reverse auctions are a type of __ auctions. | One buyer, many potential sellers
Reverse auctions are bidding or tendering systems in which the buyer places an item for bid on a request for quote system; then potential suppliers bid on the job, with the price reducing
sequentially, and the lowest bid wins. | True
Reverse auctions did not exist before being created on the Internet. | True
Reviews, testimonials, expert advice, or further explanation about the product are called: | Cross-selling
RFID can provide immediate, short-term, and long-term value to organizations. An example of immediate value from RFID is when: | An RFID tag tells inventory control every time a roll of
wire moves out of the warehouse and onto the factory floor
Rick purchased and downloaded a new firewall software suite online. After installing the suite, he finds that he is unable to connect with the Internet so he visits the FAQ for the software to look
for solutions to the problem. This is an example of the | Product support function
Rick sends a message from a delayed flight to his friend on her cell phone that he will be arriving late. The service that allows the sending and receiving of such short text messages on mobile
phones is called: | SMS
Risks in corporate blogging include all of the following EXCEPT: | The risk of disciplinary action against abusive bloggers
Rite Aid, a click-and-mortar firm, enhanced its EC future by: | Buying an equity stake in an existing EC company
ROI calculator | Calculator that uses metrics and formulas to compute ROI
Rubee relies on low-frequency magnetic waves to track products and transfer information. It is becoming a replacement for RFID because Rubee overcomes many of RFID’s limitations. | F
S
Sales force automation (SFA) | Software that automates the tasks performed by salespeople in the field, such as data collection and its transmission
Scalability | How big a system can grow in various dimensions to provide more service; measured by total number of users, number of simultaneous users, or transaction volume
Scenario planning | A strategic planning methodology that generates plausible alternative futures to help decision makers identify actions that can be taken today to ensure success in
the future
SCM aims to minimize inventory levels, optimize production and increase throughput, decrease manufacturing time, optimize logistics and distribution, streamline order fulfillment, and overall
reduce the costs associated with these activities. | True
S-commerce refers to electronic commerce activities conducted on Facebook or influenced by the site | False
Search engine | A computer program that can access databases of Internet resources, search for specific information or key words, and report the results
Search engine optimization (SEO) | The craft of increasing site rank on search engines; the optimizer uses the ranking algorithm of the search engine (which may be different for different search
engines) and best search phases, and tailors the ad accordingly.
Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine's unpaid results - often referred to as "natural," "organic," or "earned"
results. In general, the earlier (or higher ranked on the search results page), and more frequently a site appears in the search results list, the more visitors it will receive from the search engine's
users. Which of the following category SEO is belonged to? | Marketing and advertising
Search engine spam | Pages created deliberately to trick the search engine into offering inappropriate, redundant, or poor-quality search results
Search engines not only search and match, but also have capabilities that can be used to perform routine tasks that require intelligence. | False
Search tools that search the contents of a user's or organization's computer files, rather than searching the Internet are | Desktop search tools
Sears marketing strategy would best be described as: | A click-and-mortar strategy
Secondary content that offers a coupon, rebate, or special service is called: | Promotion
Section 5 of the FTC Act does each of the following EXCEPT: | Requires monitoring of employees e-mail
Secure Socket Layer (SSL) | Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality
Secure Socket Layer (SSL), which is also known as Transport Layer Security (TLS): | Is one of the major generally accepted protocols for securing e-commerce used by Microsoft and
Netscape
Security functions or characteristics of digital signatures include each of the following except: | A digital signature is the electronic equivalent of a personal signature, which can be forged
See the figure and choose the right options to fill in blank A and B | A is Infrastructures and B is Support services
Segmentation refers to the matching of services, products, and advertising content to individuals and their preferences. | False
Select the correct answer from the choices below to fill in blank. Click in to figure to see the blank | Customize
Select the correct answer from the choices below which is corresponding with the following statement in STRATEGIC PLANNING TOOLS: It is a methodology that surveys external
opportunities and threats and relates them to internal strengths and weaknesses. | SWOT analysis
Select the correct definition of "Spot buying" term from the choices below | Is the purchase of goods and services as they are needed, usually at prevailing market prices
Self-hosting | When a business acquires the hardware, software, staff, and dedicated telecommunications services necessary to set up and manage its own Web site
Selling as many products as possible to one customer over a long period of time and across different product lines to maximize customer value is known as relationship marketing. | True
Sell-side e-marketplace | A Web-based marketplace in which one company sells to many business buyers from e-catalogs or auctions, frequently over an extranet
Semantic Web | An evolving extension of the Web in which Web content can be expressed not only in natural language, but also in a form that can be understood, interpreted, and used
by intelligent computer software agents, permitting them to find, share, and integrate information more easily
Sending a large number of messages to a server that is unable to handle it. What type of attack is described? | Denial of service (DOS)
Sending a piece of code that replicates and sends itself to everyone in your address book. What type of attack is described? | Worm
Sending spam that disguises a sales pitch to look like a personal e-mail so that it will bypass e-mail spam filters violates the | Controlling the Assault of nonsolicited Pornography and
Marketing (CAN-SPAM) Act
Separating a company’s online operations into a new company makes sense in each of the following situations EXCEPT: | When the company is unable to form new alliances, attract new
talent, or raise additional funding
Service-level agreement (SLA) | A formal agreement regarding the division of work between a company and a vendor
Several businesses create a single online catalog for their customers. This is an example of: | Catalog aggregation
Several identical items are offered with a minimum bid. The winners pay the same lowest price. What type of auction is being described? | Dutch auction
Shopbots are tools that rate businesses based on multiple criteria. | False
Shoppers can rely on fraud protection provided by credit card issuers to protect them from identity theft. | False
Shopping carts for B2B are fairly simple, but a shopping cart for B2C may be more complex. | False
Shopping portals | Gateways to e-storefronts and e-malls; may be comprehensive or niche oriented
Shopping robots (shopping agents or shopbots) | Tools that scout the Web on behalf of consumers who specify search criteria
Short message service (SMS) | A service that supports the sending and receiving of short text messages on mobile phones
Since 2001, no other company has had more of an impact on EC than | Google
Since business-to-consumer (B2C) transactions are segments in the supply chain, they should be examined in light of other supply chain activities such as manufacturing, procurement,
shipments, and logistics. | False
Site navigation | Aids that help visitors find the information they need quickly and easily
Smart card | An electronic card containing an embedded microchip that enables predefined operations or the addition, deletion, or manipulation of information on the card
Smart card operating system | Special system that handles file management, security, input/output (I/O), and command execution and provides an application programming interface
(API) for a smart card
Smart card reader | Activates and reads the contents of the chip on a smart card, usually passing the information on to a host system
Social bookmarking | Web service for sharing Internet bookmarks. The sites are a popular way to store, classify, share, and search links through the practice of folksonomy techniques
on the Internet and intranets
Social capital | A sociological concept that refers to connections within and between social networks. The core idea is that social networks have value. Just as physical capital or human
capital can increase productivity (both individual and collective), so can social contacts affect the productivity of individuals and groups
Social class, lifestyle, personality, and activities are descriptors used in market segmentation. | Psychographic
Social computing | An approach aimed at making the human-computer interface more natural
Social engineering | A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network
Social engineering attacks are: | Take advantage of Web 2.0 applications like social networking sites, blogs, wikis and RSS feeds
Social factors such as customer endorsement strategies and word-of-mouth are independent variables that play an important role in EC shopping and purchases. | True
Social marketing | A combination of social policy and marketing practices to achieve a set of social behavioral goals within a target audience
Social marketplace | The term is derived from the combination of social networking and marketplace. An online community that harnesses the power of one's social networks for the
introduction, buying, and selling of products, services, and resources, including one's own creations. Also may refer to a structure that resembles a social network but is focused on
individual members.
Social media | The online platforms and tools that people use to share opinions, experiences, insights, perceptions, and various media, including photos, videos, and music, with each
other
Social media marketing | A term that describes use of social media platforms such as networks, online communities, blogs, wikis, or any other online collaborative media for marketing,
market research, sales, CRM, and customer service.
Social network | A category of Internet applications that help connect friends, business partners, or individuals with specific interests by providing free services such as photo
presentation, e-mail, blogging, and so on using a variety of tools.
Social network advertising | Online advertising that focuses on social networking sites.
Social network analysis (SNA) | The mapping and measuring of relationships and information flows among people, groups, organizations, computers, and other information- or
knowledge-processing entities. The nodes in the network are the people and groups, whereas the links show relationships or flows between the nodes. SNAs provide both visual and a
quantitative analysis of relationships.
Social network analysis provides both a visual and a mathematical analysis of relationships where the nodes in the network are the people or groups, and the links show relationships between
nodes. | True
Social network service (SNS) | A service that builds online communities by providing an online space for people to build free homepages and that provides basic communication and
support tools for conducting different activities in the social network.
Social networking | Social networks and activities conducted in social networks. It also includes activities conducted using Web 2.0 (e.g., wikis, microblogs) not within social networks.
Social networking is the execution of any Web 2.0 activity, such as blogging and/or having a presence in a social network. | True
Social networks, such as Facebook, YouTube, and MySpace, are Web sites that connect people with specific interests by providing free services such as photo sharing, e-mail, and blogging. |
True
Software applications for the administration, documentation, tracking, and reporting of training programs, classroom and online events, e-learning programs and training content best describes: |
Learning management systems.
Software applications that address project management concerns are examples of: | Collaborations workflow applications.
Software that gathers user information over an Internet connection without the users knowledge is known as | Spyware.
Software that helps integrate different types of information systems among collaborating companies is called: | Middleware.
Software tools that scout the Web for stores that sell similar items at low prices are called: | Shopbots.
Software tools that scout the Web on behalf of consumers who specify search criteria are | Shopping robots
Solutions to problems in the supply chain for EC companies are: | Generic across both EC and traditional companies.
Some of the benefits of a(n) _____ are that distributors can check inventory, make transactions, and look up the status of their orders, significantly reducing the number of phone calls, e-mails,
and incorrect product shipments. | Extranet-based order-entry tool
Some Web sites allow buyers to purchase travel at a deep discount if it is purchased at the last minute. | True
Spam site | Page that uses techniques that deliberately subvert a search engine's algorithms to artificially inflate the page's rankings.
Specialized businesses operate in a very narrow market and would find it difficult to survive in the physical world because they would not have enough customers or could not hold the variety of
stock. | True
Specialized firms that offer customized Web advertising, such as brokering ads and targeting ads to select groups of consumers are known as | Advertising networks.
Splog | Short for spam blog. A site created solely for marketing purposes.
Spot buying | The purchase of goods and services as they are needed, usually at prevailing market prices.
Spyware | Software that gathers user information over an Internet connection without the user's knowledge.
Spyware is tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server. | False
Standard of due care | Care that a company is reasonably expected to take based on the risks affecting its EC business and online transactions.
Stickiness | Characteristic that influences the average length of time a visitor stays in a site.
Storebuilder service | A hosting service that provides disk space and services to help small and microbusinesses build a Web site quickly and cheaply.
Stored-value card | A card that has monetary value loaded onto it and that is usually rechargeable.
Storefronts, malls, and portals are EC mechanisms that support the entertainment EC activity. | False
Strategic (systematic) sourcing | Purchases involving long-term contracts that usually are based on private negotiations between sellers and buyers.
Strategic planning is used to direct a company’s long term goals. The process is a cycle of assessment, initiation, formulation, and implementation. | True
Strategic sourcing refers to purchases involving long-term contracts that usually are based on private negotiations between sellers and buyers. | True
Strategic sourcing requires a holistic process that automates the entire sourcing process, including order planning, RFQ creation, bid evaluation, negotiation, settlement, and order execution. |
True
Strategy | A broad-based formula for how a business is going to accomplish its mission, what its goals should be, and what plans and policies will be needed to carry out those goals.
Strategy assessment | The continuous evaluation of progress toward the organization's strategic goals, resulting in corrective action and, if necessary, strategy reformulation.
Strategy formulation | The development of strategies to exploit opportunities and manage threats in the business environment in light of corporate strengths and weaknesses.
Strategy implementation | The development of detailed, short-term plans for carrying out the projects agreed on in strategy formulation.
Strategy initiation | The initial phase of strategic planning in which the organization examines itself and its environment.
Strong competition and increased power of consumers are two of the major market pressures in today’s business environment. | True
Strong EC security makes online shopping more convenient for customers. | False
Studies have shown that electronic-based collaboration and product lifecycle management (PLM) can reduce product costs and travel expenses by 50 percent, as well as significantly reduce costs
associated with product-change management. | False
Such as Amazon.com, are firms that sell directly to consumers over the Internet without maintaining a physical sales channel. | Pure-play e-tailers
Supplier relationship management (SRM) | A comprehensive approach to managing an enterprise's interactions with the organizations that supply the goods and services it uses.
Supply chain | The flow of materials, information, money, and services from raw material suppliers through factories and warehouses to the end customers.
Supply chain improvements and collaborative commerce are a basic type of B2B which has a hub manager for supply chain improvements, communicating, collaborating, and information
sharing. | True
Supply chain management (SCM) | A complex process that requires the coordination of many activities so that the shipment of goods and services from supplier right through to
customer is done efficiently and effectively for all parties concerned. SCM aims to minimize inventory levels, optimize production and increase throughput, decrease manufacturing
time, optimize logistics and distribution, streamline order fulfillment, and overall reduce the costs associated with these activities.
Supply chain management involves integrating the efforts of: | All of these.
Supply chain partners using Web-based systems to combine orders to decrease costs is an example of group purchasing. | True
Supply chain problems can cause delays, products not being where they are required at the right time, customer dissatisfaction, lost sales, and high expenses that result from fixing the problems
once they occur. | T
Suppose a relation describes students at a university including studentid, Name, and Major. What determines what? | studentid determines student major
Suppose we try to enter a grade in the grade table for a student that has not yet been entered in the Student table. This violates: | referential integrity
Surrogate key | a column of artificial data added to a relation to serve as the primary key
SWOT analysis | A methodology that surveys external opportunities and threats and relates them to internal strengths and weaknesses.
Symmetric (private) key encryption | An encryption system that uses the same key to encrypt and decrypt the message.
Syndicated content is Web content that matches the needs and expectations of the individual visitor. | False
Syndication | The sale of the same good (e.g., digital content) to many customers, who then integrate it with other offerings and resell it or give it away free.
T
Tag A | Nonhierarchical keyword or term assigned to a piece of information (such as an Internet bookmark, digital image, video clip, or any computer document).
Technologies and business practices that free the workforce from the constraints of legacy communication and productivity tools such as e-mail describes: | Enterprise 2.0.
Technology enables networked peer computers to share or swap data files, music, videos, software, and processing with each other directly. | Peer-to-peer (P2P)
Tendering (bidding) system | Model in which a buyer requests would-be sellers to submit bids; the lowest bidder wins.
Terminal-based positioning | Calculating the location of a mobile device from signals sent by the device to base stations.
Text mining | The application of data mining to nonstructured or less-structured text files.
That monitors traffic on a B2B exchange and takes appropriate actions when needed, such as sending an alert to management when traffic is too heavy or routing traffic to other places. |
Software agent
The “Name-your own-price” Model pioneered by Priceline.com is a type of _____ auction. | One buyer, many potential sellers
The _____ support area includes: sellers, buyers, intermediaries, information systems specialists, other employees | Public policy
The __ is an auction in which the buyer places an item for bid on a request for quote system, potential suppliers bid on the job, with the price reducing sequentially, and the lowest bid wins. |
Reverse auction
The __ is an auction model in which a would-be buyer specifies the price he or she is willing to pay to any willing and able seller. | Name-your-own-price model
The __ is the online B2C business model where a manufacturer sells to a business, but delivers to individual customers. | B2B2C
The _______ consists of a number of interrelated sub processes that extend from the acquisition of materials from suppliers to packaging it and moving it to distributors and retailers. | Supply
chain
The _______ pricing strategy means adding up all the costs involved, such as material, labor, rent, overhead, and so forth, and adding a percentage mark-up as profit. | Cost-plus
The __ is how Web pages are organized, labeled, and navigated to support browsing and searching | information architecture
The ______ give law enforcement agencies broader range in their efforts to protect the public | USA PATRIOT Act
The _______ is the name-based address that identifies an Internet-connected server | Domain name
The 3G standard does not yet support multimedia such as video clips. | False
The administrative activities of order taking and fulfillment involve all of the following activities EXCEPT: | Accounts payable
The advantages of virtual private networks (VPN) for data communications include all of the following EXCEPT: | They ensure the confidentiality and integrity of the data transmitted over
the Internet without requiring encryption.
The aggregation of orders from several buyers into volume purchases so that better prices can be negotiated. | Group purchasing
The aggregation of suppliers catalogs on the buyers server to make it easier to centralize and control all procurement is called a(n): | Internal procurement marketplace
The aim of market research is to discover marketing opportunities and issues, to establish marketing and advertising plans, to better understand the purchasing process, and to evaluate marketing
performance. | True
The amount and percentage of goods and services sold on the Internet is increasing rapidly, despite the failure of many dot-com companies. | True
The application logic in a handheld PDA, smartphone, Palm or Wintel notebook is called: | A mobile application user interface
The approach that seeks to make tapping into computing resources as simple as plugging in a lamp into an electrical outlet is called | Utility computing
The assurance that an online customer or trading partner cannot falsely deny their purchase or transaction is referred to as: | Nonrepudiation
The average-cost curve (AVC) of physical products and digital products: | Are different because the AVC of digital products declines as quantity increases forming a L-shape, while the
AVC of physical products is U-shaped.
The banking industry was a good candidate for disruption by person-to-person (P2P) technology and disintermediation by ZOPA because: | The industry was making a huge profit margin off
its customers.
The barrier to selling books online, either hardcopy or electronic, is technical and not financial. | False
The basic reasons that companies invest in IT and EC are all of the following EXCEPT: | To justify new marketing campaigns
The basic security concepts relating to customers and other users are: | Authentication, authorization, and nonrepudiation
The bidder details exactly what they are willing to pay. The seller accepts or rejects the price. What type of auction is being described? | Name-your-own-price auction
The business forces that are driving the transition from traditional education to online learning are all of the following EXCEPT: | Limited supply of faculty with specialized expertise
The central portal for an entire organization is called a(n): | enterprise portal
The Cisco Connection Online (CCO) Web site receives over 2 million hits per month for technical assistance, ordering, order checking, or software downloads. This online service had been so
well received that nearly ___ percent of all customer service inquiries and ___ percent of software updates are delivered online. | 85 / 95
The combination of the encrypted original message and the digital signature, using the recipient's public key, best describes: | digital envelope
The concept of consistency in Web site design includes: | making sure Web pages look the same no matter which browser a customer is using
The concept of liquidity for a B2B exchange is the: | number of buyers and sellers in a market
The consists of a number of interrelated subprocesses that extend from the acquisition of materials from suppliers to packaging it and moving it to distributors and retailers. | supply chain
The core of the new marketing model consists of: | customer relationships
The cost of converting an existing client-server network to an internal Web is very expensive, even if the business is currently using the Internet. | False
The Council of Supply Chain Management Professionals defines _______ as: | logistics
The current Internet sales tax moratorium in the United States applies to: | all sales made over the Internet if the seller has no physical presence in the state where the buyer lives
The development of ____ has been more evolutionary than revolutionary. | Intra-business e-commerce
The development of m-commerce is being driven by the following technological, business, social, and economic factors EXCEPT: | The transition to a manufacturing economy
The development of the first database technology was driven by the need for: | data integration
The difference between a business plan and a business case is: | all new businesses should have a business plan, but only existing businesses planning a major EC or IT initiative should
develop a business case
The digital economy refers to an economy based on digital communication networks, computers, software, and other related information technologies that provide a global platform over which
people and organizations interact, communicate, collaborate, and search for information. | True
The digital enterprise shifts the focus from managing individual information resources such as devices, applications, and data to that define the business and ultimately deliver value to customers
and end users. | orchestrating the services and workflows
The disadvantage of the NPV method for evaluating EC and IT is: | it is difficult to compare projects of unequal lifespans or sizes
The disintermediation of cash and credit cards has been successful in the online world. | False
The downstream part of the supply chain includes the activities of a company with its suppliers, which can be manufacturers, assemblers, or both, or service providers, and their connections with
their suppliers. | False
The dynamic pricing configuration where the resulting price is determined by each party's bargaining power, supply and demand in the item's market, and possibly business environment factors
best describes | A) one buyer, one seller.
The EC application development option that is most appropriate when an application is needed quickly, money is in short supply, and/or the new system is not expected to provide a competitive
advantage is: | purchasing a commercial application.
The EC application development option that is most appropriate when the application is needed quickly, money is a critical concern, and/or large amounts of maintenance are required is called |
leasing.
The EC application development technique that is most appropriate for strategic applications that will differentiate the company from its competitors is called: | insourcing
The EC application development technique which entire applications are employed in the new system, that is especially useful when applications from several business partners must be
integrated is called | enterprise application integration.
The e-commerce model in which a business provides some product or service to a client business that maintains its own customers is called: | business-to-business-to-consumer.
The electronic job market has increased the number of individuals who advertise their availability. | True
The elimination of various types of agents that mediate between buyers and sellers, such as travel and insurance agents, is referred to as: | disintermediation
The emergence of electronic marketplaces has resulted in lower information search costs for buyers and lower transaction and distribution costs for sellers. | T
The e-SCM process that includes integrated production and distribution processes is: | supply chain replenishment
The exchange model in which a third party sets up the exchange and promises to run it efficiently and without bias is called the: | neutral entrepreneur model.
The exchange model in which rfqs are aggregated then linked to a pool of suppliers who are notified automatically of the RFQ is the __ model. | buyer aggregation
The exchange of updated information with other computing devices is called: | synchronization.
The exclusively online publication of Stephen King's e-book Riding the Bullet in March 2000 | as disrupted by hackers who breached security, then distributed free copies of the book.
The factors that are critical for an e-payment method to achieve critical mass | All of above
The financial crisis of 2008-2010 resulted in many companies going out of business or being acquired by other companies. | True
The first generation of EC involves social networks, virtual worlds, and online transactions. | False
The first major step in developing and e-commerce project is | identify, justify, and plan the EC system
The first step in creating a new company or adding an online project is to identify a consumer or business need in the marketplace. | True
The first step in the auction process is: | d. Searching and comparing.
The first step in the purchase decision-making process is product evaluation and comparison. | FALSE
The following direct metrics indicate progress in e-procurement EXCEPT: | reduced inventory costs.
The functions and efficiency of an e-market are the same as that of a physical marketplace. | False
The Global Transportation Network (GTN) provides participating carriers and customers with significant cost savings because it frees individual carriers from the huge capital costs of advanced
technologies. | T
The goal of collaborative planning, forecasting, and replenishment (CPFR) is to streamline product flow from manufacturing plants to retailers. | F
The government-to-employees category consists of EC activities between units of government, including those within one government body. | False
The greatest difficulty in dealing with venture capital is: | finding a willing venture capitalist.
The growth in electronic meeting systems has been driven by all of the following EXCEPT: | Shorter cycle times.
The IEEE standard offers bandwidth transfer rates of 200 to 540 Mbps, which makes it impractical because it exceeds the limits of most broadband connections used by homes and small
businesses | 802.11n
The implementation of most EC applications requires the use of all of the following | d. Manufacturing
The implementation of most EC applications requires the use of all of the following support services EXCEPT: | manufacturing
The inability to deliver products on time is a typical problem: | in both off-line and e-commerce.
The incidence of online fraud and identity theft has increased for each of the following | c. New effective phishing scams and schemes being carried out by computer experts.
The Internet and its network protocols were never intended for use by untrustworthy people or criminals. | TRUE
The Internet ecosystem refers to animals and plants discussed online. | False
The Internet has created a large demand for personalized products and services. Manufacturers can meet that demand by using a | mass customization
The Internet has influenced industry structures in each of the following ways EXCEPT: | b. Increases differences among competitors whose offerings are kept proprietary.
The Internet introduced the concept of interactive marketing, which has enabled marketers and advertisers to interact or communicate directly with customers and consumers can interact with
marketers/advertisers. | interactive marketing
The introduction of EC has | decreased customer loyalty because customers can more easily shop, compare, and switch to different vendors.
The key difference between an e-business plan and a traditional business plan is that the entrepreneur must | understand that the Internet is a unique sales channel
The key problem that biometric marketing is intended to solve is | knowing the identity of the actual shopper.
The key reasons why EC criminals cannot be stopped include each of the following | b. Sophisticated hackers use browsers to crack into Web sites.
The last fifteen orders from a manufacturer to its suppliers range from $100,000 to $8,740,000. This is an example of: | the bullwhip effect.
The least effective method to protect against pop-up ads and their risk is: | Minimizing the pop-up window
The legal term for the use of the work without permission or contracting for payment of a royalty is | infringement.
The limitations of mobile auctions are all of the following EXCEPT: | d. Internet cell phones are less private than a PC <498: more private>
The main purpose of LinkedIn is to allow registered users to | create and maintain a list of contact details of people they know and trust in business.
The major B2C e-marketplaces are storefronts and Internet malls. | B2C
The major 13213 services include each of the following EXCEPT: | Retail
The major attributes that enable development of new applications that are possible only in a mobile environment include all of the following EXCEPT: | Security
The major B2B e-marketplaces are electronic storefronts, Internet malls, and exchanges. | F
The major B2B services include each of the following EXCEPT: | Retail
The major benefit of group decision support systems is: | in conducting virtual meetings
The major characteristic of B2B commerce is that companies attempt to electronically automate trading, communication, and collaboration processes in order to improve them, which cannot be
done without the Internet. | F
The major difference between e-logistics and traditional logistics is: | traditional logistics deals with movement of large amounts of materials to a few destinations
The major enterprise mobile applications are all of the following EXCEPT: | research and development
The major environmental variables influencing EC purchasing are: | social, cultural, community, regulatory, political, and legal
The major limitations of e-auctions are insufficient security, risk of fraud, and a limited pool of participants | T
The major steps in the process of justifying large-scale EC and IT projects include all of the following EXCEPT: | Be careful not to over-estimate cost and under-estimate benefits (a
tendency of many managers)
The major tasks of knowledge management include each of the following except: | supplementing knowledge
The membership business model gives members discounts when they make purchases. | True
The most attractive industries for a vertical exchange are characterized by: | a market in which a small number of very large orders account for more than half the total market volume per
year
The most cited reason for not purchasing online is price. | False
The most common and traditional form of auctions in which one seller entertains bids from many buyers is referred to as: | forward auctions
The most cost-effective approach to EC security is to develop and implement a strategy that | proactively meets regulatory, financial, marketing and operational requirements
The most dangerous risk to a company engaged in e-commerce is: | b. Business risk
The most difficult and crucial task in evaluating a vendor and a packaged system is: | to determine a weighted set of detailed criteria for choosing the best vendor and package
The most efficient way to expand an organization's scope is: | to introduce new products or services into new or existing markets without increasing production facilities or staff
The most important objectives of strategic assessment are all of the following EXCEPT: | Identify what competitors are doing to avoid head-on competition
The motives of hackers have shifted from the desire for fame and notoriety to advancing personal and political agendas. | False
The name-your-own-price model pioneered by Priceline.com is a type of auction. | one buyer, many potential sellers
The nationwide batch-oriented electronic funds transfer system that provides for interbank clearing of electronic payments for participating financial institutions is called the: | Automated
Clearinghouse Network
The New York Metropolitan Transit Authority (MTA) did not need to open another airport for almost two decades, even though air traffic had tripled because of productivity gains derived from
improved IT systems. This case illustrates that: | Intangible benefits can be complex, yet substantial
The online delivery of information for purposes of education, training, or knowledge management best describes: | E-learning
The online platforms and tools that people use to share opinions and experiences, including photos, videos, music, insights, and perceptions with each other are known as __. | social media
The original click-and-mortar strategy used by Toys R Us failed, as did the original toy venture of Amazon.com. Afterwards, Toys R Us sold toys online through Amazon.com. This is an
example of: | an alliance of a pure-player with a traditional retailer
The original objections to the relational database model were that it was: | too slow and used too many resources
The overwhelming majority of B2C purchases are paid for by smart cards. | False
The person who first suggests a purchase is the Initiator. | True
The portion of an e-seller's business through which customers interact, including the seller's portal, electronic catalogs, shopping cart, and payment gateway is the | front end of the business
The power adapters Dell sells with its computers are built by small companies who specialize in power-related accessories. Dell and the power adapter manufacturers are engaging in B2B
marketing. | True
The practice by sellers of having associates place fake bids in an auction as a way to drive up the selling price is called: | shilling
The presentation of product information in an electronic form and also serving as the backbone of most e-selling sites describes | electronic catalog
The primary advantage that e-books offer publishers is: | lower production, marketing, and distribution costs
The primary benefits of workflow management systems include all of the following EXCEPT: | increased data security
The primary reason for writing a business plan is to: | acquire external funding
The process by which companies present invoices and make payments to one another through the Internet is known as: | enterprise invoice presentment and payment
The process of building auction applications is complex for all of the following reasons EXCEPT: | auctions must provide payment systems
The process of capturing or creating knowledge, storing it, updating it constantly, disseminating it, and using it whenever necessary best describes: | knowledge management
The process of determining whether a card is active and whether the customer has sufficient funds for the purchase is called: | authorization
The process of dividing a consumer market into logical groups for conducting marketing research and analyzing personal information is | market segmentation
The process of selecting a software vendor and EC package includes each of the following except: | close vendor contract
The process of verifying the real identity of an individual, computer, computer program, or EC Web site best describes: | authentication
The process whereby intermediaries take on new intermediary roles describes __. | reintermediation
The processing of card payments has two major phases: identification and settlement. | False
The procurement inefficiency refers to the unplanned purchases of items needed quickly, often at non-negotiated higher prices. | maverick buying
The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as: | information
assurance
The psychological status of willingness to depend on another person or organization best defines | trust
The purchase of goods and services as they are needed, usually at prevailing market prices is referred to as: | spot buying
The purchase of goods and services as they are needed, usually the purchase of commodities at prevailing market prices, is referred to as demand buying. | False
The purpose of a consumer behavior model is to help firms understand how a consumer makes a purchasing decision to be able to influence that decision through advertising, special promotions,
or other marketing method. | True
The purpose of CPFR is to: | ensure that members of the supply chain will have the right amount of raw materials and finished goods when they need them
The real estate brokerage industry has been disrupted by companies such as Zillow and Homegain for each of the following reasons EXCEPT | The Web 2.0 real estate sites have driven down
commissions from 6 percent to almost 1 percent
The relationship between stock price and when an investor invests is | IPO investors will pay the highest price per share
The risks of being a first mover include all of the following EXCEPT | the risk that the move will be too late
The risks of e-mail advertising management include all of the following EXCEPT: | measuring e-mail advertising effectiveness
The search war between Google and Yahoo! And other search engines is about: | Internet advertising dollars
The second generation of Internet-based services that lets people collaborate and share information online in new ways, such as social networking sites, wikis, communication tools, and
folksonomies best defines: | Web 2.0
The second most often cited reason for customers not buying on the Web is: | a. The lack of a good return mechanism
The second-generation of Internet-based services that lets people collaborate and share information online is known as Web 2.0. An example of this is: | blogging
The security of an intranet is important, so many businesses use firewalls to protect them. | True
The services provided through location-based m-commerce focus on key factors which include all of the following EXCEPT: | Geocaching, or determining the topography of an area
The single factor that will determine which intermediaries continue to exist and which are replaced is: | the addition of value-added services by the intermediary
The sole purpose of e-government is to use EC technologies to sell products to citizens and collect taxes. | False
The spread of instant messaging and Internet telephony has naturally led to the idea of linking people via a video chat room, which is called | instant video
The steps required to approve an expense report is an example of: | administrative workflow applications
The strategy of providing comprehensive, quality e-service for business partners is called customer relationship management (CRM). | False
The study and practice of ecofriendly computing resources, and it is now a key concern of businesses in all industries best describes: | green computing
The success and security of EC depends on the of information and the business Web site. | confidentiality, integrity, and availability
The success of an e-payment method depends on its interoperability with existing enterprise systems and applications. | True
The success of an e-supply chain depends on managing information with strict policies, discipline, and daily monitoring. | True
The success of an e-supply chain depends on an e-supply chain that is loosely integrated both within a company and across an extended enterprise made up of suppliers, trading partners, logistics
providers, and the distribution channel. | False
The success of many organizations—private, public, and military—depends on their ability to manage the flow of materials, information, and money into, within, and out of the organization.
Such a flow is referred to as a | supply chain
The tasks of KM include each of the following EXCEPT | restricting knowledge access to prevent its transfer between individuals
The term __ is an online community that uses the power of social networks for the introduction, buying, and selling of products and services, including people's own creations. | social
marketplace
The term _____ refers to the number of distinct individuals requesting pages from the website during a given period, regardless of how often they visit. | unique visitor
The term _____ refers to the number of times users call up a page that has a banner on it during a specific period. | ad view
The term _____ refers to the way of measuring the success of an online advertising campaign for a particular website as well as the effectiveness of an email campaign by the number of users
that clicked on a specific link. | click through rate
The term domestic key is not used. If it were used, what do you think it would mean? | the primary key in the relation that the foreign key links to
The term supply chain comes from the concept of how systems and processes within an organization are linked together. | False
The term supply chain comes from the concept of how the partnering organizations are | linked
The threat of substitute products or services is a major force that can endanger a company's position in a given industry. | True
The three functions of a market include: matching buyers and sellers, facilitating transactions and institutional infrastructure. | True
The three major elements of Caterpillar Inc.'s learning infrastructure include: | all of the above
The time required for negotiation online is the same for all products because of the use of intelligent agents. | False
The tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server are | Web bugs
The top 500 e-tailers accounted for 65 percent of all online sales in 2009. | True
The topic of e-learning is gaining much attention, especially because world-class universities such as MIT, Harvard, and Stanford in the United States and Oxford in the United Kingdom are
implementing it. | True
The transfer of money from the buyers to the sellers account is called: | settlement
The trouble with most virtual e-tailers is that they | lose money
The two key factors limiting the use of personalization to more precisely target marketing efforts to individual customers are: | privacy and trust issues
The two most cited reasons for abandoning a shopping cart and not making the purchase are shipping charges and security concerns. | False
The two types of materials and supplies traded in B2B are: | direct and indirect
The type of contact card that is erasable and modifiable is: | EEPROM
The type of portal which acts as an interface between companies, customers, and suppliers, revealing subsets of information to specific audiences is called a(n): | extranet portal
The U.S. agencies dedicated to eliminating fraud resulting from phishing and crimeware are: | The High-Tech Crime Network, Anti-Phishing Working Group, and Federal Trade
Commission
The ultimate objective of a company’s website is to add enough value to achieve ____, a state in which the customer has a vested interest to stay with the company because switching to a
competitor entails significant switching costs. | lock-in
The underlying reasons why a comprehensive EC security strategy is needed include | managers treating EC security as a process
The unique combination of resources, experiences, and expertise within a particular firm is called their: | core competencies
The use of Web technologies to manage warehousing and transportation processes is called: | e-logistics
The vast majority of B2B payments are: | still made by paper check
The volume of business should be high to reduce transaction fees. Which of the five critical success factors identified by Ramsdell is being described? | Early liquidity
The way government makes use of Web 2.0 technologies to interact with citizens and provide government services best describes: | Government 2.0
The ways in which EC is done include: | the Internet, value-added networks, on local area networks using intranets, or on a single computerized machine
The ways in which EC is done include: | the Internet, value-added networks, on local area networks using intranets, or on a single computerized machine
The Web hosting option under which the business acquires the hardware, software, staff, and dedicated telecommunications services needed to host a Web site is called: | self-hosting
The wireless implementation of e-government mostly to citizens but also to businesses best describes: | mobile government
The work atmosphere that a company sets for its employees describes: | internal control environment
There are two statements: Statement A: WAP stands for Wireless Application Protocol Statement B: voip stands for Video over Internet Protocol Which of the statements is/ are correct? | A is
True, B is False
Thirty-eight percent of all merchants use negative lists, which are files that include a customer's information and the status of that customer. A customer's transaction is matched against these
files and flagged if the customer is a known problem. | True
This software allows for viewing of web pages on mobile devices. What type of software is being described? | Microbrowser
This software is used to view online WML content. What type of software is being described? | Microbrowser
This transmission media is used for short distance, wireless communication between computers. | Bluetooth
This wireless standard is a set of protocols that allows portable devices to communicate with the Internet | WAP
Thomas Register is basically a directory for buyers using search engines because it does not offer any opportunity for trade or transactions on its site. | False
Three RFID supply chain applications are: | Food, Labeling and Inventory
To avoid getting false information from participants of online surveys, marketers learn about customers by observing their behavior using each of the following EXCEPT: | Data mining to
analyze clickstream data
To be effective, an acceptable use policy (AUP) needs | to inform all users of their responsibilities when using company networks, computer equipment, wireless devices, and customer
data
To defend against unethical and illegal business tactics that exploit EC operations, Google, MSN Search, and Yahoo have turned to all of the following aggressive measures EXCEPT: |
Implemented honeypots
To increase their financial viability, third-party exchanges try to partner with large sellers or buyers, financial institutions that provide payment schemes, or logistics companies to cut costs or
increase market liquidity. | True
To succeed, special e-payment methods, such as e-cash, have to maintain anonymity. | True
To the ____, physical location does not matter because the Internet allows anyone to link to any Web site no matter where in the world that site might be. | e-tailer
Today, many business experts agree with each of the following EXCEPT: | Supply chain integration has reduced the intensity of competition in most industries
Today, over 90 percent of EC volume is B2C. | False
Tom visits a Web interface that provides personalized access to information of interest to him. This is an example of a(n): | portal
Tools that scout the Web on behalf of consumers who specify search criteria are | shopbots
Total benefits of ownership (TBO) | Benefits of ownership that include both tangible and intangible benefits
Total cost of ownership (TCO) | A formula for calculating the cost of owning, operating, and controlling an IT system
Trademark | A symbol used by businesses to identify their goods and services; government registration of the trademark confers exclusive legal right to its use
Traditional and electronic markets have three main functions, which include each of the following EXCEPT: | transforming raw materials into finished products
Traditional methods for evaluating EC investments include all of the following EXCEPT: | Discount rate
Transaction costs include all of the following EXCEPT: | Production costs incurred for labor and overhead
Transaction fees for B2B financial services are higher than for most other methods. | False
Transactional Web site | A Web site that sells products and services
Transport Layer Security (TLS) | As of 1996, another name for the SSL protocol
Travelers using airline Web sites to book their flights directly without the use of travel agents is resulting in the reintermediation of travel agents. | False
Trends that may slow EC and Web 2.0, and even cripple the Internet include: | all of the above
Trojan horse | A program that appears to have a useful function but that contains a hidden function that presents a security risk
Trust verification sites evaluate a business's trustworthiness. How comprehensive is this evaluation? | Moderate, generally verification indicates a trustworthy user
Turnkey approach | Ready to use without further assembly or testing; supplied in a state that is ready to turn on and operate
Twitter | A free microblogging service that allows its users to send and read other users’ updates
Two innovative e-strategies for order fulfillment are: | merge-in-transit and rolling warehouses
Two major models of third-party exchanges are supplier aggregation and buyer aggregation. | True
Two purposes of a type of auctions are liquidation and market efficiency | one seller, many potential buyers
Types of business activities in virtual worlds include each of the following EXCEPT: | assembling physical products
Types of costs and cost issues that need to be considered in justifying EC investments include all of the following EXCEPT: | opportunity costs
U
Unique visits | A count of the number of visitors entering a site, regardless of how many pages are viewed per visit.
Unit testing | Testing application software modules one at a time.
Unlike the brick-and-mortar marketplace, the failure rate for online companies is low. | False
Unlike the physical supply chain, __ characterize the financial supply chains of most companies. | inefficiencies
Up-selling | Offering an upgraded version of the product in order to boost sales and profit.
USA PATRIOT Act | Uniting and Strengthening America by Providing Appropriate Tools to Intercept and Obstruct Terrorism Act passed in October 2001, in the aftermath of the
September 11 terrorist attacks. Its intent is to give law enforcement agencies broader range in their efforts to protect the public.
Usability (of Web site) | The quality and usefulness of the users experience when interacting with the Web site.
Usability testing | Testing the quality of the users experience when interacting with a Web site.
User profile | The requirements, preferences, behaviors, and demographic traits of a particular customer.
Using tunneling technology to improve security of communication over the Internet is called: | virtual private network (VPN).
Ustomer-to-customer (C2C) e-commerce is conducted in various ways on the Internet, but the best-known C2C activities are: | C2C auctions
V
Value proposition | The benefit that a companys products or services provide to a company and its customers.
Value proposition refers to the benefits that a company can derive from using EC. | True
Various banking activities conducted from home or the road using an Internet connection describes __. | electronic banking
Vendor-managed inventory (VMI) | The practice of retailers making suppliers responsible for determining when to order and how much to order.
Venture capital (VC) | Money invested in a business by an individual, a group of individuals (venture capitalists), or a funding company in exchange for equity in the business.
Vertical marketplaces | Markets that deal with one industry or industry segment (e.g., steel, chemicals).
Viewing a system (such as an organization) as a set of individual processes leads to ____. | a. Sub-optimization
Viral marketing | Word-of-mouth method by which customers promote a product or service by telling others about it.
Virtual (Internet) community | A group of people with similar interests who interact with one another using the Internet.
Virtual (pure-play) e-tailers | Firms that sell directly to consumers over the Internet without maintaining a physical sales channel.
Virtual (pure-play) organizations | Organizations that conduct their business activities completely online
Virtual catalogs and links to external sources support the information search step in the purchase decision-making process. | True
Virtual credit cards are used to: | Use in place of actual CC numbers online for security
Virtual private network (VPN) | A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication
to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network.
Virtual travel agents offer only a small subset of the services provided by a traditional travel agent. | False
Virtual university | An online university from which students take classes from home or other offsite locations, usually via the Internet.
Virtual world | A user-defined world in which people can interact, play, and do business. The most publicized virtual world is Second Life.
Virus | A piece of software code that inserts itself into a host, including the operating systems, in order to propagate; it requires that its host program be run to activate it.
Visibility | The knowledge about where materials and parts are at any given time, which helps solve problems such as delay, combining shipments, and more.
Visit | A series of requests during one navigation of a Web site; a pause of a certain length of time ends a visit.
Voice commerce (v-commerce) | An umbrella term for the use of speech recognition to allow voice-activated services including Internet browsing and e-mail retrieval.
Voice portal | A Web site with an audio interface that can be accessed through a telephone call.
Vortals | B2B portals that focus on a single industry or industry segment; vertical portals.
Vulnerability | Weakness in software or other mechanism that threatens the confidentiality, integrity, or availability of an asset (recall the CIA model). It can be directly used by a
hacker to gain access to a system or network.
W
Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of materials along the supply chain. This is an example of | Collaborative Planning, Forecasting
and Replenishment (CPFR)
Was coined by O’Reilly Media in 2004 to refer to a supposed second generation of Internet-based services that let people collaborate and share information online in new ways, such as social
networking and wikis. | Web 2.0
We can directly connect information systems with increased firm performance. | False
Web 2.0 | The second generation of Internet-based services that lets people collaborate and share information online in new ways, such as social networking sites, wikis,
communication tools, and folksonomies
Web 3.0 | A term used to describe the future of the World Wide Web. It consists of the creation of high-quality content and services produced by gifted individuals using Web 2.0
technology as an enabling platform
Web 4.0 | The Web generation after Web 3.0. It is still mostly an unknown entity. However, it is envisioned as being based on islands of intelligence and as being ubiquitous
Web analytics and mining tools and services | Offer advanced functions that help marketers decide which products to promote, and merchandisers achieve a better understanding of the
nature of demand
Web bugs | Tiny graphics files embedded in e-mail messages and in Web sites that transmit information about users and their movements to a Web server
Web hosting service | A dedicated Web site hosting company that offers a wide range of hosting services and functionality to businesses of all sizes
Web mining | The application of data mining techniques to discover meaningful patterns, profiles, and trends from both the content and usage of Web sites. Also extracting
information from Web documents and Web usage
Web mining hopes to accomplish all of the following EXCEPT: | Determine characteristics of specific users
Web portal | A single point of access, through a Web browser, to critical business information located inside and outside (via Internet) an organization
Web self-service | Activities conducted by users on the Web to find answers to their questions (e.g., tracking) or for product configuration
Web site content is especially important to increase stickiness because | customers are expensive to acquire
Web site usability means that people who use the Web site can do so quickly and easily to accomplish their tasks and may also consider such factors as cost-effectiveness and usefulness. | True
Web sites use ____ to compile personal information on their visitors and then use the information to create customer profiles. | cookies & registration forms
Web sites with audio interfaces that can be accessed by a cell phone best describes | voice portals
Web video analytics | A way of measuring what viewers do when they watch an online video
Webcasting | A free Internet news service that broadcasts personalized news and information, including seminars, in categories selected by the user
WebMD, which is the largest U.S. medical services company, is known mainly for its WebMD.com consumer portal, but its core business is being an e-intermediary. | True
Webstore (storefront) | A single company’s Web site where products or services are sold and usually has an online shopping cart associated with it. Many Webstores target a specific
industry and find their own unique corner of the market
What are the basic elements of e-commerce | Web-based storefronts, secure Web sites
What are the four major categories of e-government services? | The four categories are: government-to-citizens, government-to-business, government-to-government and government-to-
employees
What are the four types of consortium trading exchanges? | Vertical-purchasing oriented, horizontal-purchasing oriented, horizontal-selling oriented and vertical-selling oriented
What are the functions of application programs? | Create and process forms, process end users, queries, create and process reports, execute application logic, control the application
What are the key elements of PKI? | A pair of matched keys: a public key to encrypt a message and a private key to decrypt it, or vice versa
What are the stages of implementation of e-government? | Information publishing, official two-way transactions, multipurpose portals, portal personalization, clustering of common
services and full integration
What are the steps and their order in EC order fulfillment? | Ensuring payment, checking availability, arranging shipment, insurance, production, plant services, purchasing and
warehousing, contacts with customers and returns
What are the steps in a Web-based reverse auction? | Prepare and post project information, identify and approach suppliers, bids are created and submitted, bids evaluated and awarded
What are the steps in bargaining online? | Search, selection, negotiation, continuing selection and negotiation, and transaction completion
What are the steps in creating a vertical e-marketplace? | Thinking ahead, planning, system analysis and design, building the exchange, testing/installation/operation, and system
evaluation
What are the two most cited reasons for not purchasing online? | Security and quality assessment
What are the two types of materials and supplies that are traded in B2B? | Direct and indirect
What are virtual (pure-play) e-tailers? Give an example. List one advantage and one disadvantage of this model. | Virtual (pure-play) e-tailers are firms that sell directly to consumers over
the Internet without maintaining a physical sales channel. Amazon.com is a prime example. Advantage: low overhead costs. Disadvantage: lack of physical infrastructure to support
operations
What does database migration mean? | Used to describe the process of redesigning an existing database to meet new or changing database requirements
What does DBMS stand for? | Database management system
What does DDL stand for? | Data definition language, used for creating tables, relationships, and other database querying and modifying data
What does DML stand for | Data manipulation language, used for querying and modifying data
What has been the impact of the introduction of EC on customer loyalty in general? | Loyalty has decreased because of customers' ability to shop, compare, and shift vendors
What is a benefit of e-auctions to sellers? | The optimal price is determined by the market
What is a closed-loop stored-value card? | A card that can only be spent for its initial value
What is a normal form? | One category in a set of categories used to describe relations according to the type of anomalies that can occur in the relations
What is a virtual community? Identify six common classifications. | A virtual community is a group of people with similar interests who interact with one another using the Internet. Six
common classifications are transaction, purpose or interest, relations or practices, fantasy, social networks, and virtual worlds
What is cybercriminal? | A person who intentionally carries out crimes over the Internet
What is metadata? How does this term pertain to a database? | Metadata is data about data. Metadata in databases allow them to be self-describing
What is not a benefit of an FAQ? | The answers can change dynamically based on the questions
What is NOT a major benefit of m-commerce? Hint: choose two answers | Reduces time utilization and productivity of mobile employees, Increases time to order
What is the function of DBMS? | Creates, processes, and administers databases under the control of the DBMS
What is the function of the application generator in Access? | To create and manage forms, reports, and queries
What is the likely effect on intermediation of the following market events: aggregation, complex search requirements, and new markets? | Cybermediation
What is the primary advantage of catalog sales? | Catalogs eliminate the constraints of physical location and time
What is the primary responsibility of the Chief Information Officer? | Set and guide the information systems strategy
What is the proper order for the steps in market research? | Problem Definition, Research Methodology, Data Collection and Analysis, Results and Recommendation
What is the relationship between a primary key and a candidate key? | A primary key is a candidate key
What is the role of data mining? | It allows the firm to anticipate customer needs
What is the SQL SELECT/FROM/WHERE framework? | SELECT specifies which columns to list, FROM specifies tables, WHERE filters rows in the result
What is the typical order of the phases of the auction process? | Searching and comparing, getting started at an auction, the actual bidding, and post-auction follow-up
What strategic benefits are associated with using social networks? | They allow a business to better access customers for sales, feedback, and research
What term refers to a primary key made up of more than one field | Composite key
What type of mechanism determines who can legitimately use a network resource? | Access Control
When a car manufacturer sells trucks, cars, and car parts to the government or military, this is an example of B2C marketing. | False
When a good or service is promoted, the purpose of the promotion is to inform, persuade, or remind customers. | True
When a supply chain is managed electronically, usually with Web technologies, it is referred to as a(n) | e-supply chain
When a tee shirt manufacturer states, "We only sell it in black because that way we can buy plenty of black fabric and run our plant efficiently," their statement reflects the views that were
popular in which era of the evolution of marketing? | Production-oriented
When Chaplin's auto lease is about to expire, he decides it is time to buy a new car. This imbalance between a desired state and an actual state is called need identification. | True
When choosing between two identical goods, customers will always choose the lowest price. | False
When compared to the traditional job market, an advantage of the online job market is its long life cycle. | True
When comparing retailing to e-tailing, e-tailing has a lower cognitive shopping overhead due to easy-to-establish mutual trust. | False
When computing agency cost, companies should consider | only production-related costs and ignore transaction costs
When creating a new business, the first step is to: | Identify a consumer or business need that is not presently being met
When Dell purchases Godiva chocolates as gifts for its employees and has Godiva mail them directly to the recipient, Dell is engaged in B2B2C. | True
When large suppliers or buyers are involved, a workflow system: | Is needed for both the collaborative efforts and for supply chain and production improvements
When making a purchasing decision, deciding what product to buy is referred to as product brokering. | True
When measuring the effectiveness on an online advertisement, the ____ is the percentage of visitors to a page who click on an advertisement. | Click-through rate
When membership fees are the basis for revenue generation in an e-exchange, it has been shown that: | Low membership fees often result in losses to the exchange; however, high fees
discourage participation
When planning an EC project, planners must first consider: | How the EC project aligns with the organization's overall business plans and processes
When planning, designing and implementing integrated supply chain operations, management requires a holistic focus that takes account all of the following primary factors EXCEPT: | Location
and revenues
When the supermarket scans your premier customer card it links you to your purchases and then uses that information to establish a personal shopping pattern for you. Subsequently, the
supermarket uses that information to target advertising (like coupons and mailers) directly to you based on your established shopping patterns, a form of one-to-one, ____ marketing. | E-
relationship
When the works of sale employees are recorded in real time, the organization benefits through each of the following EXCEPT: | More extensive collaboration and sharing of customer leads
When would you use a surrogate key? | When the non-surrogate primary key would be too large and unwieldy
Where do a huge majority, possibly as high as 95 percent, of hackers reside? | Turkey, China, Romania, or Brazil
Where does the value of a surrogate key come from? | A surrogate key value is normally assigned by the BDMS when a new row is created
Where is Web 2.0 software going? | Large companies are adding Web 2.0 tools to their existing collaboration products and IBM Lotus and Intel are adding social networking software
to their software suites
Whether the delivery is made by company-owned vehicles or is outsourced to a carrier, an express delivery model is referred to as an | On-demand delivery service
Which are the most popular type of B2B consortium, consist of a group of companies that join together to streamline purchasing processes. | Purchasing-oriented consortia
Which factor is responsible for most information security breaches? | Human error
Which involve bundling some goods and services together to provide more value than from offering them separately. | Complementarities
Which is a data file that is stored on the users hard drive, frequently without disclosure or the users consent. | Cookie
Which is INCORRECT about company-centric marketplaces term? | It is a public marketplace entities owned by that company.
Which normal forms are concerned with functional dependencies? | 2NF to Boyce-Codd NF
Which of the following about business plans and business cases is NOT correct? | The audiences are the same: senior management and the board of directors.
Which of the following advertising methods involves the use of games? | Advergaming
Which of the following are benefits of social commerce to the consumer and to vendors? | Customers' expectations can be met fully and quickly, increase trust via direct conversations,
target advertisements more accurately
Which of the following are EC activities supported by Web 2.0 tools and social network services? | Entertainment
Which of the following are main major characteristics of Web 2.0? | Rich User Experience, User Participation, Collaborative
Which of the following businesses is an information portal? | Company D provides news, bulletin boards and classified ads for a particular vertical market
Which of the following case-study is opening case of chapter 8 - "Marketing and Advertising in E-Commerce"? | Netflix Increases Sales Using Movie Recommendations and Advertisements
Which of the following categories of e-government increases the number of grant programs available for electronic application? | G2G
Which of the following categories of e-government reduces the average time for citizens to find benefits? | G2C
Which of the following categories of e-government reduces the average time for businesses to comply with regulations? | G2B
Which of the following categories of e-government reduces the average time to process clearance forms? | IEE
Which of the following companies does not trade stocks online? | Priceline.com
Which of the following connects a circle of Weblogs with a common focus or theme? | Blogring
Which of the following content are benefits of E-Learning? | Reduces travel time and travel costs for off-campus students, self-paced learning modules allow students to work at their own
pace
Which of the following content is NOT the benefit of E-Government? | Reduced access to information. It reduces a greater amount of information to businesses and provides it in a more
organized and accessible manner.
Which of the following do businesses consider the least important when creating portal services? | News services
Which of the following does not correctly describe what firewalls protect against? | Macros are the electronic equivalent of junk mail.
Which of the following does not create dynamic pricing? | Long-term contracts
Which of the following does not describe intrabusiness workflows after the addition of m-commerce? | Work orders assigned by multiple dispatchers
Which of the following E-Commerce models is conducted almost entirely through wireless networks or portable devices? | M-Commerce
Which of the following factors would not affect a demand forecast? | Production schedule
Which of the following forms of connectivity is the least scalable? | Private leased network
Which of the following groups is the least likely to own a B2B exchange? | Mid-sized industry player
Which of the following is a benefit of EC? | Individuals can telecommute more easily
Which of the following is a free method used to help deter fraud in online auctions? | Grading services
Which of the following is a limitation of EC? | Special network and hardware requirements
Which of the following is a private B2B e-marketplace? | Company ABC sells machine parts to their 20 customers on their Web site
Which of the following is a technological limitation of EC? | Order fulfillment requirements of large-scale B2C
Which of the following is a virtual organization? | Two companies combine resources to market a new product. They know this product can only be sold for the next 3 months.
Which of the following is an area where supply chains can be improved? | Manufacturing processes
Which of the following is an electronic magazine delivered over the internet? | E-Zine
Which of the following is an example of a general purpose pure-play e-tailer? | Store A does not have a physical location and sells a variety of products.
Which of the following is an example of disintermediation? | In addition to selling through department stores, a firm begins to sell online
Which of the following is an example of edutainment? | An online game that uses colorful characters to teach young children about numbers
Which of the following is an example of government-to-citizen (G2C) EC? | Electronic benefits transfer (EBT)
Which of the following is an example of G2C? | A driver applies for and pays for the renewal of his auto tag online.
Which of the following is an intermediary? | Computer system that matches buyers with "Goods Wanted" to sellers with "Goods for Sale"
Which of the following is generally the "best" way for customers to deal with returns? | Establish drop off locations for returns
Which of the following is generally the lowest ranked attack type? | DOS attacks
Which of the following is INCORRECT about edutainment? | Some adult games like Doom, Grand Theft Auto, are example of edutainment.
Which of the following is likely to have the lowest cost of entry? | An e-retailer
Which of the following is not a benefit of forward auctions? | Increased product quality
Which of the following is not a benefit of Internet-based XML over traditional EDI? | Guarantees universal compatibility
Which of the following is not a benefit of using the Internet to aid real estate transactions? | Online services eliminate the need to visit houses
Which of the following is not a benefit of using wireless phones in auctions? | Security
Which of the following is not a benefit to working with an intermediary? | Increased control over auction sales
Which of the following is not a capability of home banking? | Print new checks online
Which of the following is not a change in the travel industry created by online travel agents? | Higher total trip cost due to lost services
Which of the following is not a characteristic of sell-side merchants? | They slightly increase prices for online sales
Which of the following is not a characteristic of the Digital Revolution? | Many business processes are expedited by up to 50 percent.
Which of the following is not a driver in the electronic job market? | Size of labor market
Which of the following is not a future direction of CRM? | Reduced impact of open source products
Which of the following is not a goal of procurement management? | Increase maverick buying
Which of the following is not a limitation of EC? | Customers now have nearly unlimited bandwidth.
Which of the following is not a limitation of traditional auctions? | Technical ability of buyers
Which of the following is not a part of the EC Consumer Behavior Model? | Decider variables
Which of the following is not a reason to outsource? | The function is a core competence
Which of the following is not a typical service provided by online travel agents? | True bargains on airfare cost
Which of the following is not an advantage of online banking? | Personal interaction with staff
Which of the following is not an advantage of virtual private networks (VPN) for data communications? | They ensure the confidentiality and integrity of the data transmitted over the
Internet without requiring encryption.
Which of the following is not an area where supply chains can be improved? | Customer research
Which of the following is not an attribute of a corporate portal? | The public uses this portal to access the Internet
Which of the following is not an example of a P2P system? | User interfaces are based inside a Web browser
Which of the following is not an example of B2E? | A business advertises for new employees on their Web site
Which of the following is not an example of company-centric EC? | A group of companies purchase office supplies from a consolidated online catalog
Which of the following is not an example of web self-service? | Call center support
Which of the following is not an identified benefit of electronic benefits transfer (EBT)? | Ease in assigning taxes
Which of the following is not an organizational buyer? | Student purchasing school supplies
Which of the following is not characteristic of an e-check? | Work under a new, enhanced legal framework
Which of the following is not characteristic of an m-wallet. | Is currently only experimental and not used by the public
Which of the following is not currently a factor in the development of m-commerce? | Reluctance of vendors
Which of the following is not one of the advantages of the electronic job market for employees? | Lack of Internet users
Which of the following is not one of the four phases of risk management? | Reporting
Which of the following is not one of the major benefits of B2B? | Enables customized online catalogs with the same prices for different customers.
Which of the following is not one of the major types of payment cards? | Flip cards
Which of the following is not one of the parties usually associated with electronic payments? | Enforcer
Which of the following is not required for an intranet? | Access to the Internet
Which of the following is not the function of a market? | Ensuring profits of brokers
Which of the following is not true about the anatomy of cyber attacks? | Reporting serious attacks has increased
Which of the following is not true of targeted advertising? | Customers inform vendors of their locations
Which of the following is the central point of control for an e-market? | collaboration hub
Which of the following is the e-government category that includes interactions between governments and businesses? | government-to-business
Which of the following is the e-government category that includes activities and services between government units and their employees? | government-to-employees
Which of the following is the e-government category that includes all the interactions between a government and its citizens? | government-to-citizens
Which of the following is the e-government category that includes activities within government units and those between governments? | government-to-government
Which of the following is the flow of materials, information, money and services from raw materials suppliers to end customers? | Supply chain
Which of the following is the most popular online customer service tool? | E-mail
Which of the following is the most serious strategic threat to traditional travel agents? | Intelligent software agents
Which of the following is the underlying reason why comprehensive EC security is necessary? | Security costs and efforts from reacting to online attacks and paying for damages are
greater than if an EC security strategy is in place
Which of the following is true about copyrights? | The entertainment industry, led primarily by the Motion Picture Association of America (MPAA) and RIAA, is trying technical
solutions via the legal system to protect its interests
Which of the following is true about the scope of business ethics? | The scope of business ethics has expanded to encompass the nature and quality of the relationships with shareholders,
customers, business partners, suppliers, the community, environment, and future generations
Which of the following is true of virtual banks? | Virtual banks have no physical location
Which of the following is true regarding a second round of financing? | IPO investors will pay the highest price per share
Which of the following item is NOT included in the four major categories of e-government services? | government-to-customers
Which of the following items drivers of m-commerce? | The handset culture, Improving bandwidth, Improved price/performance
Which of the following major factors is the most important predictor of online buying behavior? | product information requested
Which of the following network type has the largest range of geography implement? | WAN
Which of the following parties use the Internet job market? | all of the above
Which of the following provides learning to an employee while the work is being done? | learning on-demand
Which of the following refers to the mapping and measuring of relationships and flows between people, groups, organizations, animals, computers or other information- or knowledge-processing
entities? | social network analysis
Which of the following services does an automated search service provide? | Searches several auction sites for a particular product selected by the user
Which of the following spurred the use of debit cards by eliminating the requirement for merchants to issue receipts for debit purchases of $15 or less? | U.S. Electronic Funds Transfer Act
Which of the following statements about bartering is false? | It is primarily done between individuals and private parties
Which of the following statements about blogs is not true? | Blogs are limited to one-way communication
Which of the following statements about differentiation and personalization is not correct? | Products must be differentiated for perfect competition
Which of the following statements about hardware and software security defenses is false? | Hardware and software security defenses protect against irresponsible business practices or
corrupt management.
Which of the following statements about the rights to privacy and free speech is not correct? | The Internet has destroyed the right to privacy.
Which of the following systems have suppliers and retailers collaborating in their planning and demand forecasting to optimize the flow of materials along the supply chain? | CPFR
Which of the following systems make suppliers responsible for retailers inventory levels? | VMI
Which of the following systems use algorithms to identify optimal solutions to complex planning problems that are bound by constraints? | APS
Which of the following technologies use item level tracking of items? | RUBEE
Which of the following technologies use magnetic waves to track items? | RFID
Which of the following term is CORRECT with the description paragraph: "A term coined by Mark Zuckerberg of Facebook, which originally referred to the social network of relationships
between users of the social networking service provided by Facebook. The idea was for Facebook to benefit from the social graph by taking advantage of the relationships between individuals
that Facebook provides, to offer a richer online experience. This definition was expanded to refer to a social graph of all Internet users." | Social graph
Which of the following term is correct with the following statement: "Develops knowledge of the Internet and computers skills that will help learners throughout their lives, careers and they can
study anywhere they have access to a computer and Internet connection". | E-Learning
Which of the following term is the best description for the figure? | E-Government
Which of the following types of products is not typically offered on priceline.com? | Antiques
Which of the following types of virtual communities just facilitates the exchange of information on a topic of mutual interest and does not support trading? | purpose or interest
Which of the following wireless technology has the lowest coverage of signal? | wifi
Which of the following would not create a "bullwhip" in the supply chain? | Accurate demand forecasts
Which of these following items are benefits of E-Learning? | lower cost, greater flexibility, more effective learning
Which technologies are designed and used to secure EC communications across a network? | Access control lists, tokens, passwords, and biometric systems
Which type of shopping software agent learns a user's preferences over time? | Learning agent
Which types of services are outsourced the most? | IT services are most often outsourced.
Which U.S. law mandates the use of filtering technologies in schools and libraries that receive certain types of federal funding? | Children's Internet Protection Act
Why does MS Access hide important database technology? | to make it easier for beginning users to create and work with small database applications
Why is a database considered to be self-describing? | because it contains a description of itself—such as what tables are in the database, which columns are in each table and what kind of
data is stored in each column
Why is being number one in operation efficiency not enough to keep 1-800-Flowers.com at the top of its industry? | More is needed because all other competitors offer similar efficiencies.
Why is SQL described as a data sublanguage? | consists only of language statements for defining and processing a database
Why must the online presence and the telephone system be integrated? | So that all data constantly and consistently enters the system.
Wi-Fi (wireless fidelity) | The common name used to describe the IEEE 802.11 standard used on most WLANs.
Wiki (wikilog) | A blog that allows everyone to participate as a peer; anyone may add, delete, or change content.
Wikipedia.com, a Web site that allows people to work together online and share information, is an example of Web 2.0. | True
Wikis, blogs and RSS are replacing e-mail for all of the following EXCEPT | Wikis, blogs and RSS are more secure than e-mail.
Will play a major role in facilitating B2B because it makes it easier to meet the demands of business customers and channel partners. | Web Services
Wimax | A wireless standard (IEEE 802.16) for making broadband network connections over a medium-size area such as a city.
Wimax and 3G wireless mobile technologies offer telemedicine application opportunities that include all of the following EXCEPT | Reduced threat of malpractice suits because there is no
hands-on interaction between the remote physician and the patient.
Windows Live Expo is an online _______ similar to Craigslist in that it provides online classifieds and lets users choose listings they want to search sorted either by friends and contacts or by
geographic proximity | social marketplace
Wireless local area network (WLAN) | A telecommunications network that enables users to make short-range wireless connections to the Internet or another network.
Wireless mobile computing (mobile computing) | Computing that connects a mobile device to a network or another computing device, anytime, anywhere.
Wireless wide area network (WWAN) | A telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network.
With , a business sells to a business but delivers small quantities to customers of the buying business. | B2B2C
With ____, a business sells to a business but delivers small quantities to customers of the buying business. | B2B2C
With a bartering exchange, a company submits its surplus to the exchange and receives: | points of credit, which the company can then use to buy items that it needs.
With all else being equal in the online environment, goods with any of the following product characteristics are expected to facilitate greater online sales EXCEPT: | Relatively expensive items.
With vendor-managed inventory, retailers make their suppliers responsible for determining when to order and how much to order. The retailer provides the supplier with real-time information
such as point-of-sale data, inventory levels, and a threshold below which orders are replenished. | T
Word-of-mouth marketing by which customers promote a product or service by telling others about it is referred to as | viral marketing.
Work on the principle that once Web surfers arrive at their site, a few of them will click on one of the linked advertisements and earn them a few cents for each click. | Sploggers
Worldwide purchases of EPEAT-registered products result in each of the following except: | reduced staffing requirements.
Worm | A software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself
onto another machine.
Y-Z
You are walking near a coffee shop and suddenly your cell phone beeps with a message: Come inside and get a free biscotti with any purchase. This is an example of: | location-based
advertising
Zombies | Computers infected with malware that are under the control of a spammer, hacker, or other criminal.