Which of the following statements about BLE is not true?

Which of the following statements about BLE is not true?



A) Only Apple iPhones can use BLE.

B) BLE uses less power than traditional Bluetooth or GPS.

C) BLE has a two-way, push-pull communication capability.

D) BLE is more accurate than targeting through Wi-Fi triangulation.



Answer: A) Only Apple iPhones can use BLE.

Which of the following statements is not true?

Which of the following statements is not true?



A) Google is the leading display ad site on mobile devices.

B) In 2016, Google is expected to generate almost $15 billion in mobile ad revenues.

C) Mobile advertising is dominated by Google.

D) Google generates almost two-thirds of all mobile search ad spending.



Answer: A) Google is the leading display ad site on mobile devices.

Which of the following is not true about mobile marketing?

Which of the following is not true about mobile marketing?



A) Mobile marketing is the fastest growing form of online marketing.

B) In 2016, spending on mobile marketing will comprise over 60% of the amount spent on all types of online marketing.

C) A substantial part of mobile marketing should be counted as social marketing.

D) People use most of their mobile minutes while they are on the go.



Answer: D) People use most of their mobile minutes while they are on the go

Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users?

Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users?



A) engagement

B) information density

C) social density

D) amplification



Answer: C) Information Density

Which of the following is not true about Facebook News Feed Page Post Ads?

Which of the following is not true about Facebook News Feed Page Post Ads?



A) They have a tiny tag indicating that they are sponsored.

B) They can be liked, shared, and commented on, just like any News Feed post.

C) They cannot contain links.

D) They have social context.



Answer: C) They cannot contain links.

Facebook's share price fell dramatically after its IPO because investors feared that:

Facebook's share price fell dramatically after its IPO because investors feared that:



A) Facebook's new marketing solutions would be difficult to monetize.

B) new social networks such as Instagram were cannibalizing Facebook's audience.

C) privacy concerns were driving users away.

D) Facebook would be unable to increase advertising revenues fast enough to justify its price.



Answer: D) Facebook would be unable to increase advertising revenues fast enough to justify its price.

Which of the following statements about Pinterest is not true?

Which of the following statements about Pinterest is not true?



A) Pinned photos and photo boards are available to all Pinterest users.

B) Pinterest users are overwhelmingly female.

C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.

D) Pinterest is the only one of the major social networks that does not accept paid advertising.



Answer: D) Pinterest is the only one of the major social networks that does not accept paid advertising.

Which of the following statements is not true?

Which of the following statements is not true?



A) Over 90% of Facebook's monthly active users access Facebook via a mobile device at least some of the time.

B) The only way to access Facebook from a mobile device is to use a mobile app.

C) Mobile ads are displayed in users' News Feeds.

D) Facebook's mobile ad revenues are its fastest growing revenue stream.



Answer: B) The only way to access Facebook from a mobile device is to use a mobile app.

Ads that appear in a Facebook user's News Feeds are called:



A) Marketplace Ads.

B) Promoted Ads.

C) Page Post Ads.

D) Brand Ads.



Answer: C) Page Post Ads.

Which of the following statements about Facebook Exchange is not true?

Which of the following statements about Facebook Exchange is not true?



A) It competes with DoubleClick.

B) It allows advertisers to target ads.

C) It is a social search engine.

D) It involves cookies.



Answer: C) It is a social search engine.

Which of the following is not true about social marketing?

Which of the following is not true about social marketing?



A) More than 50% of Twitter's ad revenues are generated by desktop users.

B) The top seven social networks account for over 90% of all visits.

C) Social marketing differs markedly from traditional online marketing.

D) In social marketing, business cannot tightly control their brand messaging.



Answer: A) More than 50% of Twitter's ad revenues are generated by desktop users.

Experience goods are

Experience goods are



a) Ones where you can learn all the important characteristics before buying

b) Ones where you can learn all the important characteristics by using the good

c) Ones where even using the good does not reveal important characteristics

d) None of the above



Answer: b) Ones where you can learn all the important characteristics by using the good

Among the reasons marketing online is different from traditional marketing are

Among the reasons marketing online is different from traditional marketing are



a) Customer information can be captured more directly and in greater quantities

b) New kinds of customer information, such as browsing patterns, can be captured and analyzed

c) 'On-the-fly' customization is possible

d) All of the above



Answer: D) all of the above

Promotional pricing may be used when

Promotional pricing may be used when



a) A product is an experience good and consumers need to be induced to try it out

b) Consumers have switching costs

c) A new product is introduced and consumers do not know its characteristics

d) All of the above



Answer: D) all of the above

Pull advertising refers to

Pull advertising refers to



a) Advertising that pulls in the customer

b) Advertising that exerts a strong appeal

c) Advertising that is pulled in by the consumer, i.e., provided in response to a specific query

d) All of the above



Answer: c) Advertising that is pulled in by the consumer, i.e., provided in response to a specific query

Options for copyright strategy in e-commerce include

Options for copyright strategy in e-commerce include



a) Free distribution of limited copyrighted content for promotional purposes

b) Lawsuits against possible copyright violators

c) Technologies to prevent copying

d) All of the above



Answer: D) all of the above

Bundling is valuable for sellers when

Bundling is valuable for sellers when



a) The willingness to pay for bundles is less dispersed than the willingness to pay for components

b) It increases switching costs for existing buyers

c) It increases selling costs

d) Only a) and b) above



Answer: D) only A) and B) above

Vertical product differentiation refers to the case where

Vertical product differentiation refers to the case where



a) One version is not unanimously considered to be better than another, but rather the ranking of products depends on the subjective tastes of the customer

b) Users are unanimous in their ranking of products or services based on the gross value

c) Products are bundled

d) Products are homogeneous



Answer: b) Users are unanimous in their ranking of products or services based on the gross value

Which of these is not an economic reason for product differentiation?

Which of these is not an economic reason for product differentiation?



a) Matching consumer tastes better

b) Supporting open standards

c) Supporting price discrimination

d) Making the demand for your products less elastic



Answer: b) Supporting open standards

Which of the following is not a likely outcome of e-commerce?

Which of the following is not a likely outcome of e-commerce?



a) Lower transaction costs

b) Greater interactivity between buyers and sellers

c) Guaranteed higher profit margins

d) Better matching of buyers and sellers



Answer: c) Guaranteed higher profit margins

Stock trading by individuals became one of the earliest and most dramatic markets to be changed by the Internet and World Wide Web because

Stock trading by individuals became one of the earliest and most dramatic markets to be changed by the Internet and World Wide Web because



a) Financial claims are essentially just information, and are natural candidates for digitization

b) Much of the back office infrastructure was already electronic

c) Deregulation of financial services made new entry easier

d) All of the above



Answer: D) all of the above

Which of the following is not a reason for organizing and conducting transactions within firms rather than through markets

Which of the following is not a reason for organizing and conducting transactions within firms rather than through markets



a) Benefiting from complementarity of productive assets

b) Outsourcing some tasks or functions

c) Protecting proprietary knowledge

d) Economies of scope in coordinating provision of different services



Answer: b) Outsourcing some tasks or functions

Services become more important in e-commerce because

Services become more important in e-commerce because



a) Information is a shareable or non-rival good

b) Digital products are very durable

c) Automation based on information technology converts some variable costs of products to fixed costs

d) All of the above



Answer: D) all of the above

Digital products include

Digital products include



a) Content

b) Tokens of exchange

c) Processes and services

d) All of the above



Answer: D) all of the above

Information flows in e-commerce are different from traditional markets because

Information flows in e-commerce are different from traditional markets because



a) The costs of transmitting information are lower

b) Communications with customers can be more integrated with internal business processes such as order processing and inventory management

c) Consumers can easily identify false statements on the Internet

d) Both a) and b)



Answer: D) both a) and b)

Which of the following statements is least accurate?

Which of the following statements is least accurate?



a) Online exchanges and similar intermediaries provide matching services

b) Matching can involve buyers and sellers, or other forms of interaction

c) Online matching does not work because the information is unreliable

d) Online matching can involve sophisticated processes and institutions



Answer: c) Online matching does not work because the information is unreliable

Which of the following statements is most accurate?

Which of the following statements is most accurate?



a) Reputation is less important in e-commerce than in traditional market transactions

b) Intermediaries are irrelevant for providing reputation in markets

c) E-commerce reputations are affected by the rapid spread of information online

d) None of the above statements is accurate



Answer: c) E-commerce reputations are affected by the rapid spread of information online

Value chains are

Value chains are



a) A stylized listing of the sequence of activities performed by a firm

b) Sometimes reconfigured or reshaped as a result of e-commerce

c) Sometimes broadly defined to include activities that take place outside the boundaries of

the firm

d) All of the above



Answer: D) all of the above

Conversion rate is a measure of the:

Conversion rate is a measure of the:



A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

B) percentage of visitors who become customers.

C) percentage of existing customers who continue to buy on a regular basis.

D) percentage of shoppers who do not return within a year after their initial purchase.



Answer: B) percentage of visitors who become customers

Recency refers to the:

Recency refers to the:



A) percentage of customers who do not return during the next year after an initial purchase.

B) time elapsed since the last visit made by a customer.

C) percentage of existing customers who continue to buy on a regular basis.

D) percentage of customers who return to the site within a year to make additional purchases.



Answer: B) time elapsed since the last visit made by a customer

Acquisition rate is a measure of the:

Acquisition rate is a measure of the:



A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

B) percentage of visitors who become customers.

C) percentage of existing customers who continue to buy on a regular basis.

D) percentage of shoppers who do not return within a year after their initial purchase.



Answer: A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

Purchasing an online ad on a CPA basis means that the advertiser:

Purchasing an online ad on a CPA basis means that the advertiser:



A) pays for impressions in 1,000 unit lots.

B) pays a pre-negotiated fee for each click an ad receives.

C) pays only for those users who perform a specific action, such as registering, purchasing, etc.

D) exchanges something of equal value for the ad space.



Answer: C) pays only for those users who perform a specific action, such as registering, purchasing, etc.

Hits are a measure of the:

Hits are a measure of the:



A) number of times an ad is clicked.

B) number of times an ad is served.

C) number of HTTP requests.

D) number of pages viewed.



Answer: C) number of HTTP requests.

Impressions are a measure of the:

Impressions are a measure of the:



A) number of times an ad is clicked.

B) number of times an ad is served.

C) number of http requests.

D) number of pages viewed.



Answer: B) number of times an ad is served.

A ________ is a repository of customer information that records all of the contacts a customer has with a firm, and generates a customer profile that is available to appropriate individuals in the firm.

A ________ is a repository of customer information that records all of the contacts a customer has with a firm, and generates a customer profile that is available to appropriate individuals in the firm.



A) customer service chat system

B) CRM system

C) data warehouse

D) transactive content system



Answer: B) CRM system

A web beacon is:

A web beacon is:



A) a cookie that carries a virus.

B) an executable cookie.

C) an automated applet for performing web searches.

D) a tiny graphics file embedded in an e-mail or web page.



Answer: D) a tiny graphics file embedded in an e-mail or web page.

All of the following statements about cookies are true except:

All of the following statements about cookies are true except:



A) cookies can be used to create cross-site profiles of users.

B) the data typically stored in cookies includes a unique ID and e-mail address.

C) cookies make shopping carts possible by allowing a site to keep track of a user's actions.

D) the more cookies are deleted, the less accurate ad server metrics become.



Answer: B) the data typically stored in cookies includes a unique ID and e-mail address.

The richness made possible by e-commerce technologies does which of the following?

The richness made possible by e-commerce technologies does which of the following?



A) It reduces the cost of delivering marketing messages and receiving feedback from users.

B) It allows consumers to become co-producers of the goods and services being sold.

C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

D) It enables worldwide customer service and marketing communications.



Answer: C) It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

Which of the following statements about the Internet's impact on marketing is not true?

Which of the following statements about the Internet's impact on marketing is not true?



A) The Internet has broadened the scope of marketing communications.

B) The Internet has decreased the impact of brands.

C) The Internet has increased the richness of marketing communications.

D) The Internet has expanded the information intensity of the marketplace.



Answer: B) The Internet has decreased the impact of brands.

Which of the following statements about native advertising is not true?

Which of the following statements about native advertising is not true?



A) Native advertising is controversial.

B) Native advertising is a new form of advertising found only online.

C) Native advertising is growing rapidly, especially on social networks.

D) Consumers look at native ads much more frequently than display ads.



Answer: B) Native advertising is a new form of advertising found only online.

Which of the following statements about a free pricing strategy is false?

Which of the following statements about a free pricing strategy is false?



A) Free products and services can knock out potential and actual competitors.

B) The free pricing strategy was born in the early days of the Web.

C) It is difficult to convert free customers into paying customers.

D) Free products and services can help build market awareness.



Answer: B) The free pricing strategy was born in the early days of the Web.

Which of the following statements about Canada's anti-spam law is not true?

Which of the following statements about Canada's anti-spam law is not true?



A) Canada's law is based on an opt-in model.

B) The law has no impact on companies located within the United States.

C) The first phase of the law went into effect in 2014.

D) The law applies to e-mail, texts, and social media messaging.



Answer: B) The law has no impact on companies located within the United States.


Which of the following statements about CAN-SPAM is not true?

Which of the following statements about CAN-SPAM is not true?



A) CAN-SPAM went into effect in January 2004.

B) CAN-SPAM prohibits unsolicited e-mail (spam).

C) CAN-SPAM prohibits the use of deceptive subject lines and false headers.

D) Large spammers are among CAN-SPAM's biggest supporters.



Answer: B) CAN-SPAM prohibits unsolicited e-mail (spam).

Which of the following is not a primary source of ad fraud?

Which of the following is not a primary source of ad fraud?



A) browser extensions that insert ads into a premium publisher's website and then list the ads as available on a programmatic ad exchange

B) ad targeting firms that create bots that imitate the behavior of real shoppers and then charge advertisers

C) botnets hired by publishers to click on web pages to create phony traffic

D) native advertising that is displayed on a social media site



Answer: D) native advertising that is displayed on a social media site

Which of the following is not true about search engine advertising?

Which of the following is not true about search engine advertising?



A) Spending on search engine advertising constitutes over 45% of all online advertising spending.

B) The top three search engine providers supply over 95% of all online searches.

C) The click-through rate for search engine marketing has been steady over the years.

D) Search engine advertising is the fastest growing type of online advertising.



Answer: D) Search engine advertising is the fastest growing type of online advertising.

In modeling online consumer behavior, the concept of "consumer skills" refers to the:

In modeling online consumer behavior, the concept of "consumer skills" refers to the:



A) education level of the consumer.

B) communication skills of the consumer.

C) knowledge consumers have about how to conduct online transactions.

D) product evaluation skills of the consumer.



Answer: C) knowledge consumers have about how to conduct online transactions.

Which of the following is not a major trend in e-commerce payments in 2016-2017?

Which of the following is not a major trend in e-commerce payments in 2016-2017?



A) Mobile retail payment volume decreases.

B) PayPal remains the most popular alternative payment method.

C) Google refocuses Google Wallet solely on sending and receiving money.

D) Payment by credit and/or debit card remains the dominant form of online payment.



Answer: A) Mobile retail payment volume decreases.

PayPal is an example of a(n):

PayPal is an example of a(n):



A) online stored value payment system.

B) digital checking system.

C) accumulating balance system.

D) digital credit card system.



Answer: A) online stored value payment system

All of the following statements about Apple Pay are true except which of the following?

All of the following statements about Apple Pay are true except which of the following?



A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.

B) Apple Pay is based on Touch ID biometric fingerprint scanning.

C) Apple Pay can be used for mobile payments at the point of sale at a physical store.

D) Apple Pay relies on NFC chip technology.



Answer: A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.

Which of the following statements is not true?

Which of the following statements is not true?



A) Most states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.

B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.

C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices.



Answer: C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

What is the first step in developing an e-commerce security plan?

What is the first step in developing an e-commerce security plan?



A) Create a security organization.

B) Develop a security policy.

C) Perform a risk assessment.

D) Perform a security audit



Answer: C) Perform a risk assessment

Which of the following statements is not true?

Which of the following statements is not true?



A) Apple's Touch ID stores a user's actual fingerprint.

B) Biometric devices reduce the opportunity for spoofing.

C) A retina scan is an example of a biometric device.

D) Biometric data stored on an iPhone is encrypted



Answer: A) Apple's Touch ID stores a user's actual fingerprint.

Which of the following statements is not true?

Which of the following statements is not true?



A) A VPN provides both confidentiality and integrity.

B) A VPN uses both authentication and encryption.

C) A VPN uses a dedicated secure line.

D) The primary use of VPNs is to establish secure communications among business partners.



Answer: C) A VPN uses a dedicated secure line.

An intrusion detection system can perform all of the following functions except:

An intrusion detection system can perform all of the following functions except:



A) examining network traffic.

B) setting off an alarm when suspicious activity is detected.

C) checking network traffic to see if it matches certain patterns or preconfigured rules.

D) blocking suspicious activity.



Answer: D) blocking suspicious activity

Proxy servers are also known as:

Proxy servers are also known as:



A) firewalls.

B) application gateways.

C) dual home systems.

D) packet filters.



Answer: C) dual home systems

A digital certificate contains all of the following except the:

A digital certificate contains all of the following except the:



A) subject's private key.

B) subject's public key.

C) digital signature of the certification authority.

D) digital certificate serial number.



Answer: A) subject's private key

All of the following statements about PKI are true except:

All of the following statements about PKI are true except:



A) the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.

B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.

C) PKI guarantees that the verifying computer of the merchant is secure.

D) the acronym PKI stands for public key infrastructure.



Answer: C) PKI guarantees that the verifying computer of the merchant is secure.

All of the following statements about public key cryptography are true except:

All of the following statements about public key cryptography are true except:



A) public key cryptography uses two mathematically related digital keys.

B) public key cryptography ensures authentication of the sender.

C) public key cryptography does not ensure message integrity.

D) public key cryptography is based on the idea of irreversible mathematical functions.



Answer: B) public key cryptography ensures authentication of the sender.

All the following statements about symmetric key cryptography are true except:

All the following statements about symmetric key cryptography are true except:



A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.

B) the Data Encryption Standard is a symmetric key encryption system.

C) symmetric key cryptography is computationally slower.

D) symmetric key cryptography is a key element in digital envelopes.



Answer: C) symmetric key cryptography is computationally slower

Symmetric key cryptography is also known as:

Symmetric key cryptography is also known as:



A) public key cryptography.

B) secret key cryptography.

C) PGP.

D) PKI.



Answer: B) secret key cryptography

Next generation firewalls provide all of the following except:

Next generation firewalls provide all of the following except:



A) an application-centric approach to firewall control.

B) the ability to identify applications regardless of the port, protocol, or security evasion tools used.

C) the ability to automatically update applications with security patches.

D) the ability to identify users regardless of the device or IP address.



Answer: C) the ability to automatically update applications with security patches.

Angler is an example of:

Angler is an example of:



A) a worm.

B) an exploit kit.

C) phishing.

D) hacktivism.


Answer: B) exploit kit

Which dimension(s) of security is spoofing a threat to?

Which dimension(s) of security is spoofing a threat to?



A) integrity

B) availability

C) integrity and authenticity

D) availability and integrity



Answer: C) integrity and authenticity

What is the most frequent cause of stolen credit cards and card information today?

What is the most frequent cause of stolen credit cards and card information today?



A) lost cards

B) the hacking and looting of corporate servers storing credit card information

C) sniffing programs

D) phishing attacks



Answer: B) the hacking and looting of corporate servers storing credit card information

In 2016, Yahoo revealed that it had experienced which of the following?

In 2016, Yahoo revealed that it had experienced which of the following?



A) a high-profile data breach

B) a DDoS attack that shut down its website

C) a hacktivist attack to protest its employment policies

D) a browser parasite



Answer: A) a high-profile data breach

Conficker is an example of a:

Conficker is an example of a:



A) virus.

B) worm.

C) Trojan horse.

D) botnet.



Answer: B) worm

Bitcoins are an example of:

Bitcoins are an example of:



A) digital cash.

B) virtual currency.

C) a stored value payment system.

D) an EBPP system.



Answer: A) digital cash

Which of the following is an example of an online privacy violation?

Which of the following is an example of an online privacy violation?



A) your e-mail being read by a hacker

B) your online purchasing history being sold to other merchants without your consent

C) your computer being used as part of a botnet

D) your e-mail being altered by a hacker



Answer: B) your online purchasing history being sold to other merchants without your consent

Which of the following is an example of an integrity violation of e-commerce security?

Which of the following is an example of an integrity violation of e-commerce security?



A) A website is not actually operated by the entity the customer believes it to be.

B) A merchant uses customer information in a manner not intended by the customer.

C) A customer denies that he or she is the person who placed the order.

D) An unauthorized person intercepts an online communication and changes its contents.



Answer: D) An unauthorized person intercepts an online communication and changes its contents.

All of the following statements about mobile apps are true except:

All of the following statements about mobile apps are true except:



A) the average U.S. consumer now spends more time using mobile apps than watching television.

B) iOS apps are cross-platform, open-source applications.

C) over 130 billion apps have been downloaded from the Apple App Store.

D) almost all the top 100 brands have a presence in at least one of the major app stores.



Answer: B) iOS apps are cross-platform, open-source applications.

Cortana is a type of:

Cortana is a type of:



A) intelligent personal assistant.

B) widget.

C) gadget.

D) social network.



Answer: A) intelligent personal assistant

All of the following are characteristics of HTML5 except:

All of the following are characteristics of HTML5 except:




A) a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer.

B) use of CSS3.

C) ability to access built-in functionality of mobile devices, such as GPS and swiping.

D) support for digital rights management.



Answer: D) support for digital rights management.

Which of the following statements about fiber-optic cable is not true?

Which of the following statements about fiber-optic cable is not true?



A) It transmits more data at faster speeds than coaxial or twisted pair cable.

B) It is thinner and lighter than coaxial or twisted pair cable.

C) As of 2016, a majority of U.S. homes have fiber connections.

D) Telecommunications firms have made substantial investments in cross-country fiber optic systems in the last decade.



Answer: C) As of 2016, a majority of U.S. homes have fiber connections

Which of the following is not a limitation of the current Internet?

Which of the following is not a limitation of the current Internet?



A) the continued reliance on cables and wires for connectivity

B) limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic

C) architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance

D) the difficulty in expanding capacity by adding servers and clients



Answer: D) the difficulty in expanding capacity by adding servers and clients

Which of the following is not true about the mobile platform?

Which of the following is not true about the mobile platform?



A) Most smartphones use Intel chips.

B) The number of cell phones worldwide exceeds the number of PCs.

C) Over a third of the world's cell phones are smartphones.

D) Smartphones use flash memory chips.



Answer: A) Most smartphones use Intel chips

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.



A) Internet Engineering Steering Group (IESG)

B) World Wide Web Consortium (W3C)

C) Internet Engineering Task Force (IETF)

D) Internet Society (ISOC)



Answer: D) Internet Society

When talking about the physical elements of the Internet, the term redundancy refers to:

When talking about the physical elements of the Internet, the term redundancy refers to:



A) transmitting multiple copies of a single packet to safeguard against data loss.

B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.

C) delays in messages caused by the uneven flow of information through the network.

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs



Answer: D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

The backbone of the Internet is formed by:

The backbone of the Internet is formed by:



A) Internet Exchange Points (IXPs).

B) Tier 1 ISPs.

C) Network Access Points (NAPs).

D) Metropolitan Area Exchanges (MAEs).



Answer: B) Tier 1 ISPs

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the:

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the:



A) Network Technology Substrate layer.

B) Middleware Services layer.

C) Transport Services and Representation Standards layer.

D) Applications layer.



Answer: B) Middleware Services layer.

The Web runs in which layer of Internet architecture?

The Web runs in which layer of Internet architecture?



A) Network Technology Substrate layer

B) Middleware Services layer

C) Transport Services and Representation Standards layer

D) Applications layer



Answer: D) Applications layer

TCP/IP operates in which layer of Internet architecture?

TCP/IP operates in which layer of Internet architecture?



A) Network Technology Substrate layer

B) Middleware Services layer

C) Transport Services and Representation Standards layer

D) Applications layer



Answer: C) Transport Services and Representation Standards layer

Which of the following was the original purpose of the Internet?

Which of the following was the original purpose of the Internet?



A) to provide a network that would allow businesses to connect with consumers

B) to link large mainframe computers on different college campuses

C) to develop military communications systems that could withstand nuclear war

D) to enable government agencies to track civilian communications



Answer: B) to link large mainframe computers on different college campuses

Which of the following statements about cloud computing is not true?

Which of the following statements about cloud computing is not true?



A) A public cloud is typically used by companies with stringent privacy and security requirements.

B) Dropbox is an example of a public cloud.

C) Hybrid clouds offer both public and private cloud options.

D) A private cloud hosted internally or externally.



Answer: A) A public cloud is typically used by companies with stringent privacy and security requirements.

Where does TLS operate within TCP/IP?

Where does TLS operate within TCP/IP?



A) between the Internet Layer and the Transport Layer

B) between the Transport Layer and the Application Layer

C) between the Network Interface Layer and the Transport Layer

D) between the Internet Layer and the Application Layer



Answer: B) between the Transport Layer and the Application Layer

Which of the following is not an advantage of client/server computing over centralized mainframe computing?

Which of the following is not an advantage of client/server computing over centralized mainframe computing?



A) It is easy to expand capacity by adding servers and clients.

B) Each client added to the network increases the network's overall capacity and transmission speeds.

C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.

D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.



Answer: B) Each client added to the network increases the network's overall capacity and transmission speeds.

An IPv4 address is expressed as a:

An IPv4 address is expressed as a:



A) 32-bit number that appears as a series of four separate numbers separated by semicolons.

B) 64-bit number that appears as a series of four separate numbers separated by semicolons.

C) 64-bit number that appears as a series of four separate numbers separated by periods.

D) 32-bit number that appears as a series of four separate numbers separated by periods.



Answer: D) 32-bit number that appears as a series of four separate numbers separated by periods.

The Internet Layer of TCP/IP is responsible for which of the following?

The Internet Layer of TCP/IP is responsible for which of the following?



A) placing packets on and receiving them from the network medium

B) addressing, packaging, and routing messages

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D) providing a variety of applications with the ability to access the services of the lower layers



Answer: B) addressing, packaging, and routing messages

The Transport Layer of TCP/IP is responsible for which of the following?

The Transport Layer of TCP/IP is responsible for which of the following?



A) placing packets on and receiving them from the network medium

B) addressing, packaging, and routing messages

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D) providing a variety of applications with the ability to access the services of the lower layers



Answer: C) providing communication with the application by acknowledging and sequencing the packets to and from the application

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:



A) routing.

B) the Transmission Control Protocol (TCP).

C) packet switching.

D) the File Transfer Protocol (FTP).



Answer: C) packet switching

Which of the following occurred during the Commercialization phase of Internet development?

Which of the following occurred during the Commercialization phase of Internet development?



A) The fundamental building blocks of the Internet were realized in actual hardware and software.

B) Personal computers were invented.

C) The Domain Name System (DNS) was introduced.

D) NSF privatized the operation of the Internet's backbone.



Answer: D) NSF privatized the operation of the Internet's backbone.

Which of the following statements is not true?

Which of the following statements is not true?



A) No one academic perspective dominates research about e-commerce.

B) Economists take a purely technical approach to e-commerce.

C) There are two primary approaches to e-commerce: behavioral and technical.

D) Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.



Answer: B) Economists take a purely technical approach to e-commerce.

Which business application is associated with the technological development of local area networks and client/server computing?

Which business application is associated with the technological development of local area networks and client/server computing?



A) transaction automation (e.g., payroll)

B) desktop automation (e.g., word processing)

C) industrial system automation (e.g., supply chain management)

D) workgroup automation (e.g., document sharing)



Answer: D) workgroup automation

Above all, e-commerce is a ________ phenomenon.

Above all, e-commerce is a ________ phenomenon.



A) technology driven

B) finance-driven

C) sociological

D) government-driven



Answer: A) technology driven

Which of the following is not an element of friction-free commerce?

Which of the following is not an element of friction-free commerce?


A) Information is equally distributed.

B) Transaction costs are high.

C) Prices can be dynamically adjusted to reflect actual demand.

D) Unfair competitive advantages are eliminated



Answer: B) Transaction costs are high.

Which of the following statements is not true?

Which of the following statements is not true?



A) Information asymmetries are continually being introduced by merchants and marketers.

B) Intermediaries have not disappeared.

C) Overall transaction costs have dropped dramatically.

D) Brands remain very important in e-commerce



Answer: C) Overall transaction costs have dropped dramatically

Which of the following is not true regarding e-commerce today?

Which of the following is not true regarding e-commerce today?



A) Economists' visions of a friction-free market have not been realized.

B) Consumers are less price-sensitive than expected.

C) There remains considerable persistent price dispersion.

D) The market middlemen disappeared.



Answer: D) the market middlemen dissappeared

Which of the following is a characteristic of the Consolidation phase of e-commerce?

Which of the following is a characteristic of the Consolidation phase of e-commerce?



A) predominance of pure online strategies

B) emphasis on revenue growth versus profits

C) brand extension and strengthening becomes more important than creating new brands

D) shift to a technology-driven approach



Answer: C) brand extension and strengthening becomes more important than creating new brands