thương mại điện tửecommerce

15 1 0
thương mại điện tửecommerce

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

1 Organizations that typically provide an array of services to start up companies along with a small amount of funding are referred to as A) angel investors B) crowdfunders C) incubators D) venture ca.

1 Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as: A) angel investors B) crowdfunders C) incubators D) venture capital investors A perfect market is one in which: A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production B) one firm develops an advantage based on a factor of production that other firms cannot purchase C) one participant in the market has more resources than the others D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage What are the two most important management challenges in building a successful e-commerce presence? A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives B) having an accurate understanding of your business environment and an achievable business plan C) building a team with the right skill sets and closely managing the development process D) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site Which of the following is a set of rules for transferring data? A) protocol B) packet C) router D) IP address Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service? A) advertising revenue model B) subscription revenue model C) freemium strategy D) transaction fee revenue model The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: A) routing B) the Transmission Control Protocol C) packet switching D) the File Transfer Protocol Which of the following type of application server monitors and controls access to a main Web server and implements firewall protection? A) proxy server B) list server C) groupware server D) mail server Which of the following factors is not a significant influence on a company's competitive environment? A) how many competitors are active B) what the market share of each competitor is C) the availability of supportive organizational structures D) how competitors price their products Which element of the business model refers to the presence of substitute products in the market? A) value proposition B) competitive environment C) competitive advantage D) market strategy 10 Which of the following features of e-commerce technology allows users to participate in the creation of online content? A) ubiquity B) global reach C) information density D) social technology 11 Which of the following involves testing a site program's modules one at a time? A) system testing B) acceptance testing C) unit testing D) implementation testing 12 Which of the following is not true about the use of apps? A) The average U.S consumer spends over two hours a day using apps B) Users still spend less time using apps than they using desktops or mobile Web sites C) Apps are easier to control and monetize than Web sites D) Around 280 million people worldwide launch a smartphone app more than 60 times a day 13 Which element of the business model addresses what a firm provides that other firms not and cannot? A) revenue model B) competitive advantage C) market strategy D) value proposition 14 Building which of the following is the most expensive path to creating a mobile presence? A) native app B) mobile Web site C) mobile Web app D) hybrid HTTP 15 less expensive: mobile website 16 A firm's describes how a firm will produce a superior return on invested capital A) value proposition B) revenue model C) market strategy D) competitive advantage 17 A firm's describes how a firm will produce a superior return on invested capital A) value proposition B) revenue model C) market strategy D) competitive advantage 18 E-commerce is available just about everywhere and anytime This is known as A) richness B) information density C) ubiquity D) reach 19 Which of the following is not one of the basic technological foundations of the Internet? A) client/server computing B) FTP C) TCP/IP D) packet switching 20 is a model of computing in computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the Internet A) Client/server computing B) P2P computing C) Mobile computing D) Cloud computing 21 The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as: A) split testing B) funnel testing C) benchmarking D) system testing 22 Which of the following is not a basic type of cloud computing service? A) IaaS B) PaaS C) SaaS D) FiOS 23 Which of the following does not use a subscription revenue model? A Apple Music B The Wall Street Journal C Youtube Premium D Instagram 24 Which of the following is the minimum system architecture requirement for an e-commerce Web site that processes orders? A) single-tier architecture B) two-tier architecture C) three-tier architecture D) multi-tier architecture 25 Which of the following is not a concern about IoT? A) the high/falling cost of sensors B) interoperability C) security D) privacy 26 Which of the following protocols is used to send mail to a server? A) SMTP B) FTP C) HTTP D) SSL 27 Interactivity in the context of e-commerce provides which of the following functionalities? A) the ability to physically touch and manipulate a product B) complexity and content of a message C) the ability of consumers to create and distribute content D) the enabling of two-way communication between consumer and merchant 28 In which year can e-commerce be said to have begun? A) 1983 B) 1985 C) 1995 D) 2001 29 Which of the following is a physical place you visit in order to transact? A) marketspace B) marketplace C) social network D) the Internet 30 Which of the following details the actual hardware components to be used in a system? A) architecture plan B) system functionalities plan C) logical design D) physical design 31 E-commerce can be defined as: A) the use of the Internet, the Web, and mobile apps to transact business Digitally enabled commercial transactions and processes within an organization B) the use of any Internet technologies in a firm's daily activities C) the digital enablement of transactions and processes within an organization D) any digitally enabled transactions among individuals and organizations 32 Which of the following is not a unique feature of e-commerce technology? A) interactivity B) social technology C) information asymmetry D) richness 33 The address used by a browser to identify the location of content on the Web is called: A) a domain name B) a uniform resource locator C) an IP address D) a file path 34 Which of the following are the two main components of a systems design? A) logical design and physical design B) behavioral design and technological design C) business objectives and technology requirements D) front-end systems and back-end systems 35 Which of the following type of application server monitors and controls access to a main Web server and implements firewall protection? A) proxy server B) list server C) groupware server D) mail server 36 All of the following are simple steps for optimizing Web page content that can reduce response times except: A) reducing unnecessary HTML comments B) segmenting computer servers to perform dedicated functions C) using more efficient graphics D) avoiding unnecessary links to other pages on the site 37 Which of the following is the core communications protocol for the Internet? A) Telnet B) FTP C) TCP/IP D) TLS 38 In the address https://www.company.com/clients.html, which of the following is the top-level domain? A company.com B https C .com D www 39 All of the following are examples of business-to-business (B2B) business models except: A) e-distributors B) e-procurement C) exchanges D) e-tailers/portals 40 The allows a natural language expression, such as Google.com to represent a numeric IP address A) uniform resource locator system B) Internet protocol addressing schema C) domain name system D) assigned numbers and names (ANN) system The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions FALSE Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? A) accountability B) privacy C) responsibility D) liability SOCIAL MARKETING PROCESS: Fan Acquisition → Engagement → Amplification → Community → Brand Strength (Sales) Which of the following is the most important tool in establishing a relationship with the customer? A) company Web site B) company CRM system C) Facebook D) search engine display ads Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends? A) social density B) engagement C) amplification D) dark social Describe the five-step process that can be used to analyze an ethical dilemma What other guidelines are there to help in understanding a complicated ethical or moral situation? Answer: The five-step process is: Identify and describe the facts Find out who did what to whom, and where, when, and how It helps to get the opposing parties involved in an ethical dilemma to agree on the facts Define the conflict or dilemma and identify the higher-order values involved Ethical, social, and political issues always reference higher values Otherwise, there would be no debate The parties to a dispute all claim to be pursuing higher values (e.g., freedom, privacy, protection of property, and the free enterprise system) Identify the stakeholders Every ethical, social, and political issue has stakeholders: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions Find out the identity of these groups and what they want This will be useful later when designing a solution Identify the options that you can reasonably take You may find that none of the options satisfies all the interests involved, but that some options a better job than others Sometimes, arriving at a "good" or ethical solution may not always be a balancing of consequences to stakeholders Identify the potential consequences of your options Some options may be ethically correct, but disastrous from other points of view Other options may work in this one instance, but not in other similar instances Always ask yourself, "What if I choose this option consistently over time? Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? A) the Golden Rule B) Universalism C) the Collective Utilitarian principle D) the Social Contract rule Which of the following is the leading location-based mobile ad format? A) search ads B) display ads C) native/social ads D) video ads Which of the following measures the percentage of times an ad is clicked? CTR: click through rate 10 Which of the following is not a major e-commerce public safety and welfare issue? A) regulation of gambling B) regulation of cigarette sales C) regulation of pornography D) regulation of taxation 11 Spoofing is the attempt to hide a hacker’s true identity by using someone else’s e-mail or IP address TRUE 12 Acquisition rate is a measure of the: A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages B) percentage of visitors who become customers C) percentage of existing customers who continue to buy on a regular basis D) percentage of shoppers who not return within a year after their initial purchase 13 Which of the following is an example of an integrity violation of e-commerce security? A) A Web site is not actually operated by the entity the customer believes it to be B) A merchant uses customer information in a manner not intended by the customer C) A customer denies that he or she is the person who placed the order D) An unauthorized person intercepts an online communication and changes its contents 14 Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users? A) engagement B) information density C) social density D) amplification 15 refers to the ability to ensure that e-commerce participants not deny their online actions A) Nonrepudiation B) Authenticity C) Availability D) Integrity 16 is an open source database that can store and analyze both structured and unstructured data Hadoop 17 Creating multiple variations of information goods and selling these to different market segments at different prices is called: A) bundling B) customization C) dynamic pricing D) versioning 18 All the following statements about symmetric key cryptography are true except: A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message B) the Data Encryption Standard is a symmetric key encryption system C) symmetric key cryptography is computationally slower D) symmetric key cryptography is a key element in digital envelopes 19 Confidentiality is sometimes confused with: A) privacy B) authenticity C) integrity D) nonrepudiation 20 Brand pages on Facebook typically attract more visitors than a brand's Web site TRUE 21 If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be: A) page views B) unique visitors C) hits D) reach 22 Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: A) spyware B) a backdoor C) browser parasite D) adware 23 Which of the following is the most popular use for mobile devices? A) shopping B) socializing C) entertainment D) performing tasks, such as finances 24 Which of the following is not a primary source of ad fraud? A) browser extensions that insert ads into a premium publisher's Web site and then list the ads as available on a programmatic ad exchange B) ad targeting firms that create bots that imitate the behavior of real shoppers and then charge advertisers C) botnets hired by publishers to click on Web pages to create phony traffic D) native advertising that is displayed on a social media site 25 Which of the following is not one of the main stages of the online purchasing process? A) post-purchase service and loyalty B) awareness C) engagement D) conversation 26 Phising attacks rely on browser parasites FALSE 27 Which of the following is the most important tool in establishing a relationship with the customer? A) company Web site B) company CRM system C) Facebook D) search engine display ads 28 Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? A) accountability B) privacy C) responsibility D) liability 29 Which of the following is an example of an online privacy violation? A) your e-mail being read by a hacker B) your online purchasing history being sold to other merchants without your consent C) your computer being used as part of a botnet D) your e-mail being altered by a hacker 30 Downloading music tracks owned by record companies without paying for them is an example of a violation of: A) patent law B) copyright law C) trademark law D) privacy law 31 Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends? A) social density B) engagement C) amplification D) dark social

Ngày đăng: 23/05/2023, 23:59

Tài liệu cùng người dùng

Tài liệu liên quan