Which of the following is the leading location-based mobile ad format?
A) search ads
B) display ads
C) native/social ads
D) video ads
Answer: A) search ads
A) search ads
B) display ads
C) native/social ads
D) video ads
Answer: A) search ads
A) E9-1-1
B) Street View cars
C) iBeacons
D) BLE
Answer: B) Street View cars
A) local marketing
B) location-based mobile marketing
C) mobile marketing
D) social marketing on Facebook
Answer: B) location-based mobile marketing
A) QR codes
B) iBeacon
C) E9-1-1
D) Geo-search
Answer: B) iBeacon
A) Twitter
B) Apple
C) Facebook
D) Google
Answer: D) Google
A) BLE
B) NFC
C) E9-1-1
D) QR codes
Answer: A) BLE
A) Walmart
B) Amazon
C) Google
D) QVC
Answer: B) Amazon
A) GPS
B) NFC
C) BLE
D) QR codes
Answer: B) NFC
A) Only Apple iPhones can use BLE.
B) BLE uses less power than traditional Bluetooth or GPS.
C) BLE has a two-way, push-pull communication capability.
D) BLE is more accurate than targeting through Wi-Fi triangulation.
Answer: A) Only Apple iPhones can use BLE.
A) research products.
B) purchase products.
C) redeem coupons.
D) check for in-store availability.
Answer: C) redeem coupons.
A) 17
B) 27
C) 37
D) 57
Answer: B) 27
A) 25
B) 55
C) 65
D) 75
Answer: C) 65
A) display ads
B) search engine advertising
C) video ads
D) SMS text messages
Answer: B)search engine advertising
A) MoPub
B) iAd
C) AdMob
D) Webtrends
Answer: D) Webtrends
A) around 75%
B) around 50%
C) around 33%
D) around 35%
Answer: C) around 33%
A) watching video
B) social networks
C) listening to music
D) reading news and magazines
Answer: C) listening to music
A) 1
B) 2
C) 3
D) 4
Answer: D) 4
A) Google is the leading display ad site on mobile devices.
B) In 2016, Google is expected to generate almost $15 billion in mobile ad revenues.
C) Mobile advertising is dominated by Google.
D) Google generates almost two-thirds of all mobile search ad spending.
Answer: A) Google is the leading display ad site on mobile devices.
A) shopping
B) socializing
C) entertainment
D) performing tasks, such as finances
Answer: C) entertainment
A) Whatsapp
B) Like button
C) Messenger
D) Open Graph
Answer: D) Open Graph
A) Mobile marketing is the fastest growing form of online marketing.
B) In 2016, spending on mobile marketing will comprise over 60% of the amount spent on all types of online marketing.
C) A substantial part of mobile marketing should be counted as social marketing.
D) People use most of their mobile minutes while they are on the go.
Answer: D) People use most of their mobile minutes while they are on the go
A) YouTube
B) iTunes
C) Twitter
D) Facebook
Answer: D) Facebook
A) Twitter
B) LinkedIn
C) Pinterest
D) Snapchat
Answer: C) Pinterest
A) social density
B) engagement
C) amplification
D) dark social
Answer: B) engagement
A) social density
B) engagement
C) amplification
D) dark social
Answer: C) amplification
A) social density
B) dark social
C) amplification
D) engagement
Answer: B) dark social
A) Amplify
B) FBX
C) DoubleClick
D) PTAT
Answer: B) FBX
A) LinkedIn
B) Instagram
C) YouTube
D) Tumblr
Answer: B) Instagram
A) Facebook
B) YouTube
C) Pinterest
D) Instagram
Answer: A) Facebook
A) engagement
B) information density
C) social density
D) amplification
Answer: C) Information Density
A) They have a tiny tag indicating that they are sponsored.
B) They can be liked, shared, and commented on, just like any News Feed post.
C) They cannot contain links.
D) They have social context.
Answer: C) They cannot contain links.
A) Facebook
B) Twitter
C) Pinterest
D) Instagram
Answer: B) Twitter
A) 8
B) 10
C) 13
D) 16
Answer: C) 13
A) Disney's Playdom
B) W3 Innovation
C) Snapchat
D) Yelp
Answer: B) W3 Innovation
A) impressions
B) reach
C) conversation rate
D) conversion ratio
Answer: B) reach
A) e-mail.
B) tweets.
C) SMS texts.
D) Snapchat.
Answer: B) tweets
A) Facebook's new marketing solutions would be difficult to monetize.
B) new social networks such as Instagram were cannibalizing Facebook's audience.
C) privacy concerns were driving users away.
D) Facebook would be unable to increase advertising revenues fast enough to justify its price.
Answer: D) Facebook would be unable to increase advertising revenues fast enough to justify its price.
A) Open Graph
B) Like button
C) hashtags
D) Whatsapp
Answer: B) Like button
A) Brand pages.
B) Rich Pins.
C) Promoted Pins.
D) Promoted Accounts.
Answer: D) Promoted Accounts
A) engagement
B) community
C) brand strength
D) fan acquisition
Answer: D) fan acquisition
A) TweetDeck
B) Curalate
C) Amplify
D) Webtrends
Answer: B) Curalate
A) Promoted Tweet
B) Promoted Trend
C) Promoted Account
D) Lead Generation Card
Answer: D) Lead Generation Card
A) Pinned photos and photo boards are available to all Pinterest users.
B) Pinterest users are overwhelmingly female.
C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.
D) Pinterest is the only one of the major social networks that does not accept paid advertising.
Answer: D) Pinterest is the only one of the major social networks that does not accept paid advertising.
A) tweets
B) hashtags
C) pins
D) Image Hover widget
Answer: B) hashtags
A) Enhanced Profile Pages
B) Amplify
C) Lead Generation Cards
D) Promoted Accounts
Answer: B) Amplify
A) engagement.
B) amplification.
C) community.
D) fan acquisition.
Answer: D) fan acquisition
A) Brand Pages.
B) Right-Hand Sidebar Ads.
C) News Feed Page Post Ads.
D) Mobile Ads.
Answer: A) Brand Pages
A) Over 90% of Facebook's monthly active users access Facebook via a mobile device at least some of the time.
B) The only way to access Facebook from a mobile device is to use a mobile app.
C) Mobile ads are displayed in users' News Feeds.
D) Facebook's mobile ad revenues are its fastest growing revenue stream.
Answer: B) The only way to access Facebook from a mobile device is to use a mobile app.
A) News Feed
B) Timeline
C) Ticker
D) Open Graph
Answer: B) Timeline
A) 8
B) 18
C) 28
D) 38
Answer: B) 18
A) Marketplace Ads.
B) Promoted Ads.
C) Page Post Ads.
D) Brand Ads.
Answer: C) Page Post Ads.
A) It competes with DoubleClick.
B) It allows advertisers to target ads.
C) It is a social search engine.
D) It involves cookies.
Answer: C) It is a social search engine.
A) status updates.
B) app activity.
C) Likes.
D) tweets.
Answer: D) tweets
A) fan acquisition
B) brand strength
C) community
D) amplification
Answer: D) amplification
A) community
B) amplification
C) fan acquisition
D) engagement
Answer: C) fan acquisition
A) Facebook
B) Tumblr
C) Google
D) Instagram
Answer: B) Tumblr
A) $70 million
B) $700 million
C) $7 billion
D) $70 billion
Answer: D) $70 billion
A) Instagram.
B) Pinterest.
C) LinkedIn.
D) Tumblr.
Answer: D) Tumblr
A) More than 50% of Twitter's ad revenues are generated by desktop users.
B) The top seven social networks account for over 90% of all visits.
C) Social marketing differs markedly from traditional online marketing.
D) In social marketing, business cannot tightly control their brand messaging.
Answer: A) More than 50% of Twitter's ad revenues are generated by desktop users.
A) e-mail.
B) corporate websites.
C) mobile marketing.
D) display ads.
Answer: C) mobile marketing.
a) Ones where you can learn all the important characteristics before buying
b) Ones where you can learn all the important characteristics by using the good
c) Ones where even using the good does not reveal important characteristics
d) None of the above
Answer: b) Ones where you can learn all the important characteristics by using the good
a) Customer information can be captured more directly and in greater quantities
b) New kinds of customer information, such as browsing patterns, can be captured and analyzed
c) 'On-the-fly' customization is possible
d) All of the above
Answer: D) all of the above
a) A product is an experience good and consumers need to be induced to try it out
b) Consumers have switching costs
c) A new product is introduced and consumers do not know its characteristics
d) All of the above
Answer: D) all of the above
a) Advertising that pulls in the customer
b) Advertising that exerts a strong appeal
c) Advertising that is pulled in by the consumer, i.e., provided in response to a specific query
d) All of the above
Answer: c) Advertising that is pulled in by the consumer, i.e., provided in response to a specific query
a) Paid listings with search services
b) E-mail to customers and prospects
c) TV infomercials
d) Classified advertising on Craigslist
Answer: C) TV infomercials
a) Free distribution of limited copyrighted content for promotional purposes
b) Lawsuits against possible copyright violators
c) Technologies to prevent copying
d) All of the above
Answer: D) all of the above
a) Bundling
b) Quantity discounts
c) Versioning
d) Any of the above
Answer: D) any of the above
a) The willingness to pay for bundles is less dispersed than the willingness to pay for components
b) It increases switching costs for existing buyers
c) It increases selling costs
d) Only a) and b) above
Answer: D) only A) and B) above
a) One version is not unanimously considered to be better than another, but rather the ranking of products depends on the subjective tastes of the customer
b) Users are unanimous in their ranking of products or services based on the gross value
c) Products are bundled
d) Products are homogeneous
Answer: b) Users are unanimous in their ranking of products or services based on the gross value
a) Matching consumer tastes better
b) Supporting open standards
c) Supporting price discrimination
d) Making the demand for your products less elastic
Answer: b) Supporting open standards
a) Lower transaction costs
b) Greater interactivity between buyers and sellers
c) Guaranteed higher profit margins
d) Better matching of buyers and sellers
Answer: c) Guaranteed higher profit margins
a) Financial claims are essentially just information, and are natural candidates for digitization
b) Much of the back office infrastructure was already electronic
c) Deregulation of financial services made new entry easier
d) All of the above
Answer: D) all of the above
a) Benefiting from complementarity of productive assets
b) Outsourcing some tasks or functions
c) Protecting proprietary knowledge
d) Economies of scope in coordinating provision of different services
Answer: b) Outsourcing some tasks or functions
a) Information is a shareable or non-rival good
b) Digital products are very durable
c) Automation based on information technology converts some variable costs of products to fixed costs
d) All of the above
Answer: D) all of the above
a) Customization
b) Interactivity
c) Currency or timeliness
d) Cupidity
Answer: D) Cupidity
a) Be shareable
b) Be non-excludable
c) Be easy to customize, leading to product differentiation
d) All of the above
Answer: D) all of the above
a) Content
b) Tokens of exchange
c) Processes and services
d) All of the above
Answer: D) all of the above
a) Trademark law
b) Trade secret law
c) Patent law
d) Copyright law
Answer: A) trademark law
a) The costs of transmitting information are lower
b) Communications with customers can be more integrated with internal business processes such as order processing and inventory management
c) Consumers can easily identify false statements on the Internet
d) Both a) and b)
Answer: D) both a) and b)
a) Economies of scope
b) Economies of scale
c) Economies of specialization
d) All of the above
Answer: D) all of the above
a) Online exchanges and similar intermediaries provide matching services
b) Matching can involve buyers and sellers, or other forms of interaction
c) Online matching does not work because the information is unreliable
d) Online matching can involve sophisticated processes and institutions
Answer: c) Online matching does not work because the information is unreliable
a) Reputation is less important in e-commerce than in traditional market transactions
b) Intermediaries are irrelevant for providing reputation in markets
c) E-commerce reputations are affected by the rapid spread of information online
d) None of the above statements is accurate
Answer: c) E-commerce reputations are affected by the rapid spread of information online
a) Greater spatial separation
b) More rapid adjustment
c) More complex forms of organization
d) All of the above
Answer: D) all of the above
a) Bargaining
b) Negotiation
c) Posted prices
d) Auctions
Answer: D) auctions
a) A stylized listing of the sequence of activities performed by a firm
b) Sometimes reconfigured or reshaped as a result of e-commerce
c) Sometimes broadly defined to include activities that take place outside the boundaries of
the firm
d) All of the above
Answer: D) all of the above
A) retention rate
B) attrition rate
C) loyalty rate
D) conversion rate
Answer: B) attrition rate
A) view time
B) click-through rate
C) completion rate
D) skip rate
Answer: C) completion rate
A) abandonment rate
B) unsubscribe rate
C) bounce-back rate
D) attrition rate
Answer: C) bounce-back rate
A) conversion rate
B) cart conversion rate
C) browse-to-buy ratio
D) view-to-cart ratio
Answer: C) browse-to-buy ratio
A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
B) percentage of visitors who become customers.
C) percentage of existing customers who continue to buy on a regular basis.
D) percentage of shoppers who do not return within a year after their initial purchase.
Answer: B) percentage of visitors who become customers
A) percentage of customers who do not return during the next year after an initial purchase.
B) time elapsed since the last visit made by a customer.
C) percentage of existing customers who continue to buy on a regular basis.
D) percentage of customers who return to the site within a year to make additional purchases.
Answer: B) time elapsed since the last visit made by a customer
A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
B) percentage of visitors who become customers.
C) percentage of existing customers who continue to buy on a regular basis.
D) percentage of shoppers who do not return within a year after their initial purchase.
Answer: A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
A) loyalty
B) stickiness
C) page views
D) retention rate
Answer: B) stickiness
A) the total number of impressions
B) the total number of impressions in hundreds
C) the total number of impressions in thousands
D) the total number of impressions in millions
Answer: C) the total number of impressions in thousands
A) pays for impressions in 1,000 unit lots.
B) pays a pre-negotiated fee for each click an ad receives.
C) pays only for those users who perform a specific action, such as registering, purchasing, etc.
D) exchanges something of equal value for the ad space.
Answer: C) pays only for those users who perform a specific action, such as registering, purchasing, etc.
A) number of times an ad is clicked.
B) number of times an ad is served.
C) number of HTTP requests.
D) number of pages viewed.
Answer: C) number of HTTP requests.
A) flash marketing
B) bundling
C) surge pricing
D) freemium
Answer: C) surge pricing
A) 30-minute
B) 24-hour
C) 7-day
D) 30-day
Answer: D) 30-day
A) number of times an ad is clicked.
B) number of times an ad is served.
C) number of http requests.
D) number of pages viewed.
Answer: B) number of times an ad is served.
A) page views.
B) unique visitors.
C) hits.
D) reach.
Answer: B) unique visitors
A) query-driven
B) customer profiling
C) model-driven
D) behavioral
Answer: A) query driven
A) long tail marketing
B) flash marketing
C) yield management
D) bait-and-switch
Answer: B) flash marketing
A) customer service chat system
B) CRM system
C) data warehouse
D) transactive content system
Answer: B) CRM system
A) SQL
B) PHP
C) DBMS
D) JSP
Answer: A) SQL
A) a cookie that carries a virus.
B) an executable cookie.
C) an automated applet for performing web searches.
D) a tiny graphics file embedded in an e-mail or web page.
Answer: D) a tiny graphics file embedded in an e-mail or web page.
A) cookies can be used to create cross-site profiles of users.
B) the data typically stored in cookies includes a unique ID and e-mail address.
C) cookies make shopping carts possible by allowing a site to keep track of a user's actions.
D) the more cookies are deleted, the less accurate ad server metrics become.
Answer: B) the data typically stored in cookies includes a unique ID and e-mail address.
A) 50,000
B) 500,000
C) 5 million
D) 50 million
Answer: C) 5 million
A) It reduces the cost of delivering marketing messages and receiving feedback from users.
B) It allows consumers to become co-producers of the goods and services being sold.
C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
D) It enables worldwide customer service and marketing communications.
Answer: C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
A) personalization/customization
B) information density
C) ubiquity
D) interactivity
Answer: B) information density
A) ubiquity
B) richness
C) information density
D) universal standards
Answer: D) universal standards
A) The Internet has broadened the scope of marketing communications.
B) The Internet has decreased the impact of brands.
C) The Internet has increased the richness of marketing communications.
D) The Internet has expanded the information intensity of the marketplace.
Answer: B) The Internet has decreased the impact of brands.
A) data warehouse
B) Hadoop
C) SQL
D) profiling
Answer: B) Hadoop
A) retargeting
B) behavioral targeting
C) programmatic advertising
D) keyword advertising
Answer: C) programmatic advertising
A) Native advertising is controversial.
B) Native advertising is a new form of advertising found only online.
C) Native advertising is growing rapidly, especially on social networks.
D) Consumers look at native ads much more frequently than display ads.
Answer: B) Native advertising is a new form of advertising found only online.
A) financial services
B) retail
C) automotive
D) entertainment
Answer: B) retail
A) the Law of One Price
B) dynamic pricing
C) price discrimination
D) versioning
Answer: A) the Law of One Price
A) context advertising
B) SEO
C) programmatic advertising
D) viral marketing
Answer: A) context advertising
A) affiliate marketing
B) viral marketing
C) native advertising
D) lead generation marketing
Answer: B) viral marketing
A) bundling.
B) versioning.
C) free pricing.
D) yield management.
Answer: D) yeild management
A) bundling.
B) customization.
C) dynamic pricing.
D) versioning.
Answer: D) versioning
A) Free products and services can knock out potential and actual competitors.
B) The free pricing strategy was born in the early days of the Web.
C) It is difficult to convert free customers into paying customers.
D) Free products and services can help build market awareness.
Answer: B) The free pricing strategy was born in the early days of the Web.
A) Law of One Price.
B) variable cost.
C) marginal cost.
D) fixed cost.
Answer: C) marginal cost
A) customer co-production
B) transactive content
C) price discrimination
D) permission marketing
Answer: A) customer co-production
A) gaming sites.
B) newsgroup/forums.
C) social network sites.
D) online retailers.
Answer: D) online retailers
A) affiliate marketing.
B) e-mail and permission marketing.
C) social marketing.
D) sponsorship marketing.
Answer: C) social marketing
A) company website
B) company CRM system
C) Facebook
D) search engine display ads
Answer: A) company website
A) Canada's law is based on an opt-in model.
B) The law has no impact on companies located within the United States.
C) The first phase of the law went into effect in 2014.
D) The law applies to e-mail, texts, and social media messaging.
Answer: B) The law has no impact on companies located within the United States.
A) CAN-SPAM went into effect in January 2004.
B) CAN-SPAM prohibits unsolicited e-mail (spam).
C) CAN-SPAM prohibits the use of deceptive subject lines and false headers.
D) Large spammers are among CAN-SPAM's biggest supporters.
Answer: B) CAN-SPAM prohibits unsolicited e-mail (spam).
A) 53
B) 63
C) 73
D) 83
Answer: A) 53
A) browser extensions that insert ads into a premium publisher's website and then list the ads as available on a programmatic ad exchange
B) ad targeting firms that create bots that imitate the behavior of real shoppers and then charge advertisers
C) botnets hired by publishers to click on web pages to create phony traffic
D) native advertising that is displayed on a social media site
Answer: D) native advertising that is displayed on a social media site
A) anti-virus software
B) firewalls
C) Flash cookies
D) anonymous browsing
Answer: B) firewalls
A) viral marketing
B) local marketing
C) affiliate marketing
D) lead generation marketing
Answer: C) affilitate marketing
A) social search
B) link farms
C) content farms
D) click fraud
Answer: A) social search
A) Spending on search engine advertising constitutes over 45% of all online advertising spending.
B) The top three search engine providers supply over 95% of all online searches.
C) The click-through rate for search engine marketing has been steady over the years.
D) Search engine advertising is the fastest growing type of online advertising.
Answer: D) Search engine advertising is the fastest growing type of online advertising.
A) Panda
B) Penguin
C) Hummingbird
D) Graph Search
Answer: C) Hummingbird
A) Nielsen ratings
B) data collected from social networks
C) integration of online data with offline data
D) clickstream data
Answer: A) Nielsen ratings
A) paid search
B) sponsorships
C) search engines
D) rich media
Answer: D) rich media
A) Penguin
B) Hummingbird
C) Panda
D) Knowledge Graph
Answer: C) Panda
A) education level of the consumer.
B) communication skills of the consumer.
C) knowledge consumers have about how to conduct online transactions.
D) product evaluation skills of the consumer.
Answer: C) knowledge consumers have about how to conduct online transactions.
A) 67
B) 77
C) 87
D) 97
Answer: B) 77
A) search engines.
B) online catalogs.
C) social networks.
D) targeted banner ads.
Answer: D) targeted banner ads
A) 25%
B) 33%
C) 66%
D) 75%
Answer: C) 66%
A) post-purchase service and loyalty
B) awareness
C) engagement
D) conversation
Answer: D) conversation
A) search
B) classifieds
C) rich media
D) e-mail
Answer: D) e-mail
A) 45
B) 55
C) 75
D) 85
Answer: C) 75
A) less than 10%; less than 25%
B) about 25%; about 10%
C) more than 50%; less than 20%
D) 100%; 0%
Answer: C) more than 50%; less than 20%
A) DES
B) NFC
C) IM
D) text messaging
Answer: B) NFC
A) digital cash.
B) virtual currency.
C) EBPP.
D) peer-to-peer payment systems.
Answer: B) virtual currency
A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.
Answer: B) cost to consumers
A) Mobile retail payment volume decreases.
B) PayPal remains the most popular alternative payment method.
C) Google refocuses Google Wallet solely on sending and receiving money.
D) Payment by credit and/or debit card remains the dominant form of online payment.
Answer: A) Mobile retail payment volume decreases.
A) the banking industry
B) the credit card industry
C) the federal government
D) the retail industry
Answer: B) the credit card industry
A) online stored value payment system.
B) digital checking system.
C) accumulating balance system.
D) digital credit card system.
Answer: A) online stored value payment system
A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
B) Apple Pay is based on Touch ID biometric fingerprint scanning.
C) Apple Pay can be used for mobile payments at the point of sale at a physical store.
D) Apple Pay relies on NFC chip technology.
Answer: A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
A) Venmo.
B) Bill Me Later.
C) Square Cash.
D) Google Wallet.
Answer: B) Bill Me Later
A) Most states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.
B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.
C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices.
Answer: C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
A) access controls.
B) an authorization management system.
C) security tokens.
D) an authorization policy.
Answer: B) an authorization management system.
A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit
Answer: C) Perform a risk assessment
A) DES
B) SSL/TLS
C) VPN
D) HTTP
Answer: B) SSL/TLS
A) biometrics
B) encryption
C) IDS
D) firewall
Answer: A) biometrics
A) Apple's Touch ID stores a user's actual fingerprint.
B) Biometric devices reduce the opportunity for spoofing.
C) A retina scan is an example of a biometric device.
D) Biometric data stored on an iPhone is encrypted
Answer: A) Apple's Touch ID stores a user's actual fingerprint.
A) A VPN provides both confidentiality and integrity.
B) A VPN uses both authentication and encryption.
C) A VPN uses a dedicated secure line.
D) The primary use of VPNs is to establish secure communications among business partners.
Answer: C) A VPN uses a dedicated secure line.
A) firewalls
B) proxy servers
C) digital signatures
D) login passwords
Answer: C) digital signatures
A) examining network traffic.
B) setting off an alarm when suspicious activity is detected.
C) checking network traffic to see if it matches certain patterns or preconfigured rules.
D) blocking suspicious activity.
Answer: D) blocking suspicious activity
A) digital signatures.
B) certificates of authority.
C) biometric devices.
D) packet filters.
Answer: D) packet filters
A) firewalls.
B) application gateways.
C) dual home systems.
D) packet filters.
Answer: C) dual home systems
A) firewall
B) virtual private network
C) proxy server
D) PPTP
Answer: A) firewall
A) SSL/TLS.
B) certificates.
C) VPN.
D) FTP.
Answer: D) FTP
A) confidentiality
B) availability
C) message integrity
D) nonrepudiation
Answer: B) availability
A) subject's private key.
B) subject's public key.
C) digital signature of the certification authority.
D) digital certificate serial number.
Answer: A) subject's private key
A) the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.
B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
C) PKI guarantees that the verifying computer of the merchant is secure.
D) the acronym PKI stands for public key infrastructure.
Answer: C) PKI guarantees that the verifying computer of the merchant is secure.
A) WEP
B) TLS
C) WPA2
D) WPA3
Answer: C) WPA2
A) public key cryptography uses two mathematically related digital keys.
B) public key cryptography ensures authentication of the sender.
C) public key cryptography does not ensure message integrity.
D) public key cryptography is based on the idea of irreversible mathematical functions.
Answer: B) public key cryptography ensures authentication of the sender.
A) 8
B) 56
C) 256
D) 512
Answer: B) 56
A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.
B) the Data Encryption Standard is a symmetric key encryption system.
C) symmetric key cryptography is computationally slower.
D) symmetric key cryptography is a key element in digital envelopes.
Answer: C) symmetric key cryptography is computationally slower
A) public key cryptography.
B) secret key cryptography.
C) PGP.
D) PKI.
Answer: B) secret key cryptography
A) an application-centric approach to firewall control.
B) the ability to identify applications regardless of the port, protocol, or security evasion tools used.
C) the ability to automatically update applications with security patches.
D) the ability to identify users regardless of the device or IP address.
Answer: C) the ability to automatically update applications with security patches.
A) Crackers
B) White hats
C) Grey hats
D) Hacktivists
Answer: D) Hacktivists
A) malicious insiders
B) malicious code
C) denial of service
D) botnets
Answer: D) botnets
A) mobile malware
B) software vulnerability
C) botnet
D) Trojan horse
Answer: B) software vulnerability
A) sniffing.
B) social engineering.
C) pharming.
D) DDoS attack.
Answer: C) pharming
A) Stuxnet
B) Flame
C) Snake
D) Storm
Answer: A) Stuxnet
A) adware
B) browser parasite
C) drive-by download
D) spyware
Answer: C) drive by download
A) Trojan horse.
B) backdoor.
C) drive-by download.
D) PUP.
Answer: C) drive by download
A) a worm.
B) an exploit kit.
C) phishing.
D) hacktivism.
Answer: B) exploit kit
A) SQL injection attack
B) browser parasite
C) DDoS attack
D) MitM attack
Answer: C) DDoS attack
A) Scareware
B) A Trojan horse
C) A bot
D) A sniffer
Answer: D) a sniffer
A) integrity
B) availability
C) integrity and authenticity
D) availability and integrity
Answer: C) integrity and authenticity
A) lost cards
B) the hacking and looting of corporate servers storing credit card information
C) sniffing programs
D) phishing attacks
Answer: B) the hacking and looting of corporate servers storing credit card information
A) a high-profile data breach
B) a DDoS attack that shut down its website
C) a hacktivist attack to protest its employment policies
D) a browser parasite
Answer: A) a high-profile data breach
A) spyware.
B) a backdoor.
C) browser parasite.
D) adware.
Answer: A) spyware
A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks
Answer: C) hackers
A) virus.
B) worm.
C) Trojan horse.
D) botnet.
Answer: B) worm
A) Anonymous.
B) LulzSec.
C) Impact Team.
D) Avid Life.
Answer: D) Avid Life
A) social network security issue
B) cloud security issue
C) mobile platform security issue
D) sniffing
Answer: B) cloud security issue
A) HTML
B) HTML5
C) Adobe Flash
D) Adobe Acrobat
Answer: C) Adobe Flash
A) less than 1%
B) around 5%
C) around 10%
D) around 15%
Answer: A) less than 1%
A) digital cash.
B) virtual currency.
C) a stored value payment system.
D) an EBPP system.
Answer: A) digital cash
A) CVS.
B) Walgreens.
C) Amazon.
D) Experian.
Answer: C) Amazon
A) Confidentiality
B) Integrity
C) Privacy
D) Availability
Answer: A) Confidentiality
A) your e-mail being read by a hacker
B) your online purchasing history being sold to other merchants without your consent
C) your computer being used as part of a botnet
D) your e-mail being altered by a hacker
Answer: B) your online purchasing history being sold to other merchants without your consent
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Answer: C) Availability
A) A website is not actually operated by the entity the customer believes it to be.
B) A merchant uses customer information in a manner not intended by the customer.
C) A customer denies that he or she is the person who placed the order.
D) An unauthorized person intercepts an online communication and changes its contents.
Answer: D) An unauthorized person intercepts an online communication and changes its contents.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Answer: B) Authenticity
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Answer: A) Nonrepudiation
A) privacy.
B) authenticity.
C) integrity.
D) nonrepudiation.
Answer: A) privacy
A) the average U.S. consumer now spends more time using mobile apps than watching television.
B) iOS apps are cross-platform, open-source applications.
C) over 130 billion apps have been downloaded from the Apple App Store.
D) almost all the top 100 brands have a presence in at least one of the major app stores.
Answer: B) iOS apps are cross-platform, open-source applications.
A) virtual reality
B) artificial intelligence
C) augmented reality
D) chatbot
Answer: C) augmented reality
A) VoIP.
B) IPTP.
C) VTP.
D) IP.
Answer: A) VoIP
A) wiki
B) podcast
C) blog
D) RSS feed
Answer: A) wiki
A) Kik
B) WhatsApp
C) Viber
D) Feedly
Answer: D) Feedly
A) mobile messaging
B) online forum
C) SMS messaging
D) VoIP
Answer: B) online forum
A) intelligent personal assistant.
B) widget.
C) gadget.
D) social network.
Answer: A) intelligent personal assistant
A) a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer.
B) use of CSS3.
C) ability to access built-in functionality of mobile devices, such as GPS and swiping.
D) support for digital rights management.
Answer: D) support for digital rights management.
A) XML
B) SGML
C) HTML
D) GML
Answer: D) GML
A) Internet Explorer
B) Safari
C) Chrome
D) Firefox
Answer: C) Chrome
A) security services.
B) FTP.
C) search engine.
D) an RSS aggregator.
Answer: D) an RSS aggregator
A) .com
B) company.com
C) www
D) http
Answer: A) .com
A) Netscape Navigator.
B) Mosaic.
C) Mozilla.
D) Internet Explorer.
Answer: B) Mosaic
A) New Zealand
B) Sri Lanka
C) Ghana
D) Australia
Answer: B) Sri Lanka
A) redundancy
B) latency
C) Net neutrality
D) QOS
Answer: B) latency
A) AllSeen Alliance.
B) Industrial Internet Consortium.
C) Open Connectivity Foundation.
D) W3C.
Answer: D) W3C
A) 802.11a
B) 802.11b
C) 802.11ac
D) 802.11ad
Answer: D) 802.11ad
A) Wi-Fi and Bluetooth.
B) Wi-Fi and WiMax.
C) Bluetooth and 3G.
D) WiMax and 3G.
Answer: A) Wi-Fi and Bluetooth.
A) It transmits more data at faster speeds than coaxial or twisted pair cable.
B) It is thinner and lighter than coaxial or twisted pair cable.
C) As of 2016, a majority of U.S. homes have fiber connections.
D) Telecommunications firms have made substantial investments in cross-country fiber optic systems in the last decade.
Answer: C) As of 2016, a majority of U.S. homes have fiber connections
A) the continued reliance on cables and wires for connectivity
B) limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic
C) architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance
D) the difficulty in expanding capacity by adding servers and clients
Answer: D) the difficulty in expanding capacity by adding servers and clients
A) Bluetooth
B) drones
C) WLANs
D) DSL
Answer: B) drones
A) 10 seconds
B) 1 minute
C) 10 minutes
D) 1 hour
Answer: B) 1 minute
A) the high cost of sensors
B) interoperability
C) security
D) privacy
Answer: A) the high cost of sensors
A) decrease
B) double
C) triple
D) quadruple
Answer: C)triple
A) ICANN
B) IGF
C) NTIA
D) IANA
Answer: D)IANA
A) Most smartphones use Intel chips.
B) The number of cell phones worldwide exceeds the number of PCs.
C) Over a third of the world's cell phones are smartphones.
D) Smartphones use flash memory chips.
Answer: A) Most smartphones use Intel chips
A) IAB
B) IESG
C) W3C
D) ITU
Answer: A) IAB
A) Internet Engineering Steering Group (IESG)
B) World Wide Web Consortium (W3C)
C) Internet Engineering Task Force (IETF)
D) Internet Society (ISOC)
Answer: D) Internet Society
A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs
Answer: D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
A) Internet Exchange Points (IXPs).
B) Tier 1 ISPs.
C) Network Access Points (NAPs).
D) Metropolitan Area Exchanges (MAEs).
Answer: B) Tier 1 ISPs
A) Network Technology Substrate layer.
B) Middleware Services layer.
C) Transport Services and Representation Standards layer.
D) Applications layer.
Answer: B) Middleware Services layer.
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Answer: D) Applications layer
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Answer: C) Transport Services and Representation Standards layer
A) IETF
B) IAB
C) W3C
D) ICANN
Answer: D) ICANN
A) HTTP
B) BGP
C) FTP
D) SMTP
Answer: B) BGP
A) Telnet
B) Ping
C) IMAP
D) Tracert
Answer: D) Tracert
A) to provide a network that would allow businesses to connect with consumers
B) to link large mainframe computers on different college campuses
C) to develop military communications systems that could withstand nuclear war
D) to enable government agencies to track civilian communications
Answer: B) to link large mainframe computers on different college campuses
A) web servers
B) root servers
C) client servers
D) DNS servers
Answer: B) root servers
A) IaaS
B) PaaS
C) SaaS
D) FiOS
Answer: D)FiOS
A) protocol
B) packet
C) router
D) IP address
Answer: A) protocol
A) routers
B) web servers
C) IP servers
D) packet servers
Answer: A) routers
A) fiber optics
B) Wi-Fi
C) IPv6
D) client/server computing
Answer: D) client/server computing
A) Ping
B) Telnet
C) Tracert
D) Finger
Answer: A) Ping
A) Telnet
B) FTP
C) HTTP
D) SSL
Answer: A) Telnet
A) A public cloud is typically used by companies with stringent privacy and security requirements.
B) Dropbox is an example of a public cloud.
C) Hybrid clouds offer both public and private cloud options.
D) A private cloud hosted internally or externally.
Answer: A) A public cloud is typically used by companies with stringent privacy and security requirements.
A) between the Internet Layer and the Transport Layer
B) between the Transport Layer and the Application Layer
C) between the Network Interface Layer and the Transport Layer
D) between the Internet Layer and the Application Layer
Answer: B) between the Transport Layer and the Application Layer
A) IMAP
B) FTP
C) HTTP
D) SSL
Answer: A) IMAP
A) Client/server computing
B) P2P computing
C) Mobile computing
D) Cloud computing
Answer: D) cloud computing
A) It is easy to expand capacity by adding servers and clients.
B) Each client added to the network increases the network's overall capacity and transmission speeds.
C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.
D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.
Answer: B) Each client added to the network increases the network's overall capacity and transmission speeds.
A) a domain name.
B) a uniform resource locator.
C) an IP address.
D) a file path.
Answer: B) a uniform resource locator
A) uniform resource locator system
B) Internet protocol addressing schema
C) domain name system
D) assigned numbers and names system
Answer: C) domain name system
A) 32-bit number that appears as a series of four separate numbers separated by semicolons.
B) 64-bit number that appears as a series of four separate numbers separated by semicolons.
C) 64-bit number that appears as a series of four separate numbers separated by periods.
D) 32-bit number that appears as a series of four separate numbers separated by periods.
Answer: D) 32-bit number that appears as a series of four separate numbers separated by periods.
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Answer: B) addressing, packaging, and routing messages
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Answer: C) providing communication with the application by acknowledging and sequencing the packets to and from the application
A) Telnet
B) FTP
C) TCP/IP
D) TLS
Answer: C) TCP/IP
A) routing.
B) the Transmission Control Protocol (TCP).
C) packet switching.
D) the File Transfer Protocol (FTP).
Answer: C) packet switching
A) client/server computing
B) FTP
C) TCP/IP
D) packet switching
Answer: B)FTP
A) Commercialization
B) Institutional
C) Innovation
D) Consolidation
Answer: B)innovation
A) The fundamental building blocks of the Internet were realized in actual hardware and software.
B) Personal computers were invented.
C) The Domain Name System (DNS) was introduced.
D) NSF privatized the operation of the Internet's backbone.
Answer: D) NSF privatized the operation of the Internet's backbone.
A) 1950-1960
B) 1961-1974
C) 1975-1995
D) 1995-through the present
Answer: C)1975-1995
A) No one academic perspective dominates research about e-commerce.
B) Economists take a purely technical approach to e-commerce.
C) There are two primary approaches to e-commerce: behavioral and technical.
D) Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.
Answer: B) Economists take a purely technical approach to e-commerce.
A) liability
B) anonymity
C) equity
D) intellectual property
Answer: D) intellectual property
A) transaction automation (e.g., payroll)
B) desktop automation (e.g., word processing)
C) industrial system automation (e.g., supply chain management)
D) workgroup automation (e.g., document sharing)
Answer: D) workgroup automation
A) technology driven
B) finance-driven
C) sociological
D) government-driven
Answer: A) technology driven
A) copyright infringement.
B) inability to retain users.
C) spam.
D) scams.
Answer: B) inability to retain users
A) Information is equally distributed.
B) Transaction costs are high.
C) Prices can be dynamically adjusted to reflect actual demand.
D) Unfair competitive advantages are eliminated
Answer: B) Transaction costs are high.
A) network effect
B) disintermediation
C) friction-free commerce
D) first mover advantage
Answer: B) disintermedition
A) zooming
B) grazing
C) showrooming
D) webrooming
Answer: D) webrooming
A) Etsy
B) eToys
C) eBay
D) E*Trade
Answer: B) Etoys
A) Information asymmetries are continually being introduced by merchants and marketers.
B) Intermediaries have not disappeared.
C) Overall transaction costs have dropped dramatically.
D) Brands remain very important in e-commerce
Answer: C) Overall transaction costs have dropped dramatically
A) Economists' visions of a friction-free market have not been realized.
B) Consumers are less price-sensitive than expected.
C) There remains considerable persistent price dispersion.
D) The market middlemen disappeared.
Answer: D) the market middlemen dissappeared
A) predominance of pure online strategies
B) emphasis on revenue growth versus profits
C) brand extension and strengthening becomes more important than creating new brands
D) shift to a technology-driven approach
Answer: C) brand extension and strengthening becomes more important than creating new brands