_______ are networks that connect people within a company to each other and to the company network.
1.Bitstreams
2.Extranets
3.Internets
4.Intranets
Posted Date:-2021-11-19 05:07:24
_______ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server.
1.Ping
2.Telnet
3.Tracert
4.SSL
Posted Date:-2021-11-19 05:10:11
_________ influence the behavior of others through their personality, skills, or other factors.
1.Opinion leaders
2.Direct reference groups
3.Indirect reference groups
4.Lifestyle groups
Posted Date:-2021-11-19 04:51:44
A perfect market is one in which ______
1.One firm develops an advantage based on a factor of production that other firms cannot purchase
2.One participant in the market has more resources than the others
3.there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production
4.competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage
Posted Date:-2021-11-19 05:09:50
A security plan begins with a(n) is _____
1.security policy
2.risk assessment
3.implementation plan
4.security organization
Posted Date:-2021-11-19 04:51:21
A situation where there are no differences among products or services, and the only basis of choosing products is price is known as ______
1.a value web
2.value chain
3.profit
4.commoditization
Posted Date:-2021-11-19 04:47:53
A website offering content created by third party transparently to customers is an example of _____
1.Reintermediation
2.Syndication
3.Virtual Manufacturing
4.Build-to-order
Posted Date:-2021-11-19 05:08:16
A(n) ______ represents data as two-dimensional tables with records organized in rows and attributes in columns.
1.database management system
2.data warehouse
3.SQL query
4.relational database
Posted Date:-2021-11-19 04:52:10
All of the following are acts Congress has passed or attempted to pass to protect children online except _______
1.Video Privacy Protection Act
2.Children's Online Protection Act
3.Communications Decency Act
4.Children's Internet Protection Act
Posted Date:-2021-11-19 04:55:20
All of the following are challenges to online retail except _____
1.Consumer concerns about the security of transactions
2.Consumer concerns about the privacy of personal information given to Web sites
3.Delays in delivery of goods when compared to store shopping
4.Inability to change prices nearly instantly
Posted Date:-2021-11-19 04:55:47
All of the following are characteristics of a social network except _______
1.involves a group of people
2.features shared social interaction
3.always feature shared goals and purposes
4.common ties among members
Posted Date:-2021-11-19 04:57:26
All of the following are major B2C business models except ______
1.content provider
2.industry consortium
3.transaction broker
4.service provider
Posted Date:-2021-11-19 05:09:25
All of the following are major categories of computer viruses except _______
1.Macro viruses
2.File-infecting viruses
3.Script viruses
4.Trojan viruses
Posted Date:-2021-11-19 05:14:27
All of the following are potential benefits of B2B e-commerce except______
1.reduced amount of 'first-mover' advantages
2.decreased product cycle time
3.increased opportunities for collaborating with suppliers and distributors
4.increased production flexibility
Posted Date:-2021-11-19 04:58:48
All of the following are steps in the systems development life cycle except ______
1.Systems Design
2.Testing
3.Implementation
4.Debugging
Posted Date:-2021-11-19 05:11:21
All of the following are technologies used to gather information about you online except _____
1.spy ware
2.cookies
3.Gmail
4.anonymizers
Posted Date:-2021-11-19 05:09:01
All of the following are types of social marketing except _______
1.affiliate marketing
2.blog advertising
3.social network advertising
4.game advertising
Posted Date:-2021-11-19 05:16:41
Complete price transparency in a perfect information marketplace is necessary for ______________ to take effect.
1.Bertrand's Law
2.the Law of Universal Prices
3.the Law of One Price
4.the Law of Perfect Commerce
Posted Date:-2021-11-19 05:15:34
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called_______
1.versioning
2.bundling.
3.transactive content
4.price discrimination
Posted Date:-2021-11-19 04:52:31
E-business can be defined as _______
1.the uninhibited flow of information and goods on the Web
2.the use of the Internet and the Web to transact business
3.digitally enabled transactions and processes within an organization
4.commercial transactions involving electronic goods
Posted Date:-2021-11-19 05:16:20
E-commerce technologies have improved upon traditional commerce technologies in ____
1.richness
2.reach
3.both richness and reach
4.neither richness nor reach
Posted Date:-2021-11-19 05:08:39
Industry structure is defined as _____
1.the nature of the players in an industry and their relative bargaining power
2.a set of plans for achieving long term returns on the capital invested in a business firm
3.set of planned activities designed to result in a profit in a marketplace
4.how a company's product or service fulfills the needs of customers
Posted Date:-2021-11-19 04:47:30
Internet users account for about ______________ of the world's population.
1.7%
2.17%
3.27%
4.47%
Posted Date:-2021-11-19 04:48:59
The ability to change the product to better fit the needs of the customer is called ______
1.customization
2.personalization
3.privacy
4.Accessibility
Posted Date:-2021-11-19 05:14:06
The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is ______
1.TCP
2.IP
3.the Network Layer
4.the Application Layer
Posted Date:-2021-11-19 04:48:14
The dimension of e-commerce that enables commerce across national boundaries is called ______
1.interactivity
2.global reach
3.richness
4.None of these
Posted Date:-2021-11-19 04:45:54
The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as _______
1.The Golden Rule
2.Slippery Slope
3.No Free Lunch
4.Universalism
Posted Date:-2021-11-19 05:17:08
The largest component of a Web site budget is ________
1.system maintenance
2.system development
3.content design and development
4.telecommunications
Posted Date:-2021-11-19 04:49:27
The most common type of Internet crime according to the IC3 is _____
1.Credit card fraud
2.Check fraud
3.Non-delivery
4.Auction fraud
Posted Date:-2021-11-19 04:50:17
The most prevalent online payment method is _____
1.PayPal
2.checks
3.credit cards
4.debit
Posted Date:-2021-11-19 05:15:10
The most widely used encryption standard is ________
1.Advanced Encryption Standard (AES)
2.Data Encryption Standard (DES)
3.Universal Encryption Standard (UES)
4.Optimal Encryption Standard (OES)
Posted Date:-2021-11-19 05:14:50
The primary source of financing during the early years of e-commerce was _______
1.bank loans
2.large retail firms
3.venture capital funds
4.initial public offerings
Posted Date:-2021-11-19 04:46:27
The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as ____
1.affiliate marketing
2.viral marketing
3.permission marketing
4.blog marketing
Posted Date:-2021-11-19 05:15:57
The redirection of traffic from a legitimate site to an infringing site is called ____
1.cybersquatting
2.cyberpiracy
3.metatagging
4.keywording
Posted Date:-2021-11-19 04:54:01
The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _____
1.Active Server Pages (ASP)
2.Java Server Pages (JSP)
3.Common Gateway Interface (CGI)
4.VBScript
Posted Date:-2021-11-19 04:49:57
The source of revenue in a subscription revenue model is ________
1.Fees from advertisers in exchange for advertisements
2.Fees for business referrals
3.Fees from subscribers in exchange for access to content or services
4.Fees for enabling or execution a transaction
Posted Date:-2021-11-19 04:47:09
The two main types of Internet-based B2B commerce are_____
1.Net marketplaces and private industrial networks
2.EDI and collaborative commerce
3.Net marketplaces and collaborative commerce
4.EDI and private industrial networks
Posted Date:-2021-11-19 04:59:12
The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website.
1.marketing
2.click-and-mortar
3.customer service
4.corporate
Posted Date:-2021-11-19 05:07:46
What is the most commonly offered interactive feature of newspaper Web sites?
1.video
2.comments on blogs
3.RSS feeds
4.podcasts
Posted Date:-2021-11-19 04:56:56
What Web server functionality allows it verify usernames and passwords and process certificates and encryption information?
1.Processing of HTTP requests
2.File Transfer Protocol
3.Data capture
4.Security services
Posted Date:-2021-11-19 05:13:41
When hackers flood a Web site with useless traffic to overwhelm the network, it is called _____
1.phishing
2.pharming
3.a Denial of Service (DoS) attack
4.spoofing
Posted Date:-2021-11-19 04:50:40
Which of the following describes paid content's relation to free user-generated content?
1.Free content jeopardizes paid content
2.Paid content jeopardizes free content
3.Free content and paid content can both work in tandem cooperatively
4.Paid content is viable now but will not be in the future
Posted Date:-2021-11-19 04:56:32
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
1.loyalty
2.reach
3.recency
4.unique visitors
Posted Date:-2021-11-19 04:53:15
Which of the following is a new and disruptive Web feature or service?
1.XML
2.diffserv
3.blogs
4.CDMA
Posted Date:-2021-11-19 05:10:38
Which of the following is not a limitation of the current Internet?
1.insufficient capacity throughout the backbone
2.network architecture limitations
3.insufficient reach
4.best-efforts QOS
Posted Date:-2021-11-19 04:48:37
Which of the following is not considered to be a drawback of Internet auctions?
1.market inefficiency
2.trust risks
3.fulfillment costs
4.delayed consumption costs
Posted Date:-2021-11-19 04:57:50
Which of the following is not one of the top three online career service providers?
1.CareerBuilder
2.Monster
3.HotJobs
4.USAJobs
Posted Date:-2021-11-19 04:56:08
Which of the following represents a limiting factor for the growth of e-commerce?
1.Persistent cultural attraction of physical markets and traditional shopping experiences
2.Inadequate selection of goods compared to physical marketplaces.
3.E-commerce lacks the convenience of other methods of transacting business
4.The potential audience for e-commerce is too low to support it as a widespread method of commerce
Posted Date:-2021-11-19 04:52:54
Which of the following statements about privacy is true?
1.It is a moral right to be left alone
2.Only corporations and government need to be concerned about it
3.It has only just recently become a concern
4.It is most easily obtained on the Internet
Posted Date:-2021-11-19 04:53:40
Which portal business model best describes Yahoo?
1.general purpose portal
2.affinity group based vertical market
3.focused content based vertical market
4.None of the above
Posted Date:-2021-11-19 04:58:15