| Question 1 |
In the __________ stage of business-to-consumer electronic commerce, dissemination of promotional and marketing material, like providing electronic brochures, takes place.
Question options:
|
| e-transaction |
|
| e-subscription |
|
| e-information |
|
| e-integration |
| Question 2 | |
With respect to typical revenue models for electronic commerce businesses, Symantec and Norton are using a(n) __________ revenue model.
Question options:
|
| licensing |
|
| brokerage |
|
| subscription |
|
| affiliate marketing |
| Question 3 | |
A way to ensure that a company's site is on the first page users see when looking for a specific term is using __________ advertising.
Question options:
|
| search |
|
| viral |
|
| buzz |
|
| stealth |
| Question 4 | |
E-filing is an example of a __________ tool.
Question options:
|
| government-to-government |
|
| consumer-to-consumer |
|
| government-to-citizen |
|
| consumer-to-business |
| Question 5 | |
Which of the following is a disadvantage of e-tailing?
Question options:
|
| It requires additional time for products to be delivered. |
|
| It is limited by physical store and shelf space restrictions. |
|
| It complicates the process of comparison shopping. |
|
| It restricts companies to effectively compete on price. |
| Question 6 | |
In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A(n) __________ grid, consisting of a large number of computers, can help overcome these problems.
Question options:
|
| dedicated |
|
| trusted |
|
| edged |
|
| clustered |
| Question 7 | |
Which of the following statements is true about the platform as a service model?
Question options:
|
| The customer is provided with the basic capabilities of processing, storage, and networking. |
|
| Only the basic capabilities of processing, storage, and networking are provided. |
|
| The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. |
|
| The customer can run his or her own applications that are typically designed using tools provided by the service provider. |
| Question 8 | |
The suffix ".org" is reserved for:
Question options:
|
| educational institutions. |
|
| non-profit organizations. |
|
| commercial organizations. |
|
| governmental entities. |
| Question 9 | |
The protocol used by the Internet is called the:
Question options:
|
| Dynamic Host Configuration Protocol (DHCP). |
|
| Transmission Control Protocol (TCP). |
|
| Address Resolution Protocol (ARP). |
|
| Trivial File Transfer Protocol (TFTP). |
| Question 10 | |
Which of the following is likely to have the suffix ".edu" after the domain name in its URL?
Question options:
|
| Harvard Business School |
|
| The Federal Reserve |
|
| UNICEF |
|
| Yahoo! |
| Question 11 | |
EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy?
Question options:
|
| The public is wary of sharing confidential information after a recent spate of credit card scandals. |
|
| Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts. |
|
| The company has limited access to funds and is looking to keep its costs low. |
|
| A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain. |
| Question 12 | |
With regard to the World Wide Web, Web pages are stored on Web:
Question options:
|
| consortiums. |
|
| rings. |
|
| servers. |
|
| consoles. |
| Question 13 | |
Under the __________ computing model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.
Question options:
|
| grid |
|
| distributed |
|
| cluster |
|
| utility |
| Question 14 | |
Which of the following statements is true about electronic commerce?
Question options:
|
| Business-to-business is by far the largest form of electronic commerce in terms of revenues. |
|
| All forms of electronic commerce involve business firms. |
|
| Electronic commerce is limited to transactions between businesses and consumers. |
|
| Electronic commerce between businesses and their employees is impossible. |
| Question 15 | |
Provoking bidders to leave a legitimate auction to buy the same item at a lower price outside the auction space, where return policies and buyer protection do not apply, is called:
Question options:
|
| bid luring. |
|
| bid shielding. |
|
| bid skimming. |
|
| rafter bidding. |
| Question 16 | |
Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that the:
Question options:
|
| product is designed to avoid obsolescence. |
|
| product is designed in such a way as to extend its life span. |
|
| product is designed to last only for a certain life span. |
|
| companies have already decided when to launch their next product. |
| Question 17 | |
Which of the following statements is true about servers?
Question options:
|
| They are optimized for visualization and rendering of three-dimensional models. |
|
| They are used to provide services to users within large organizations or to Web users. |
|
| They are used primarily to assist in solving massive scientific problems. |
|
| They are primarily used as the main, central computing system for major corporations. |
| Question 18 | |
Which of the following occurred in the 1946-1958 generation of computing?
Question options:
|
| The internetworking era ended. |
|
| The mainframe era began. |
|
| The mainframe era ended and the personal computer era began. |
|
| The interpersonal computing era ended and the internetworking era began. |
| Question 19 | |
Within the context of different types of e-auction fraud, bid shielding is sometimes called:
Question options:
|
| reverse bidding. |
|
| bid skimming. |
|
| shill bidding. |
|
| bid luring. |
| Question 20 | |
__________ is used to transmit voice and video communication over the Internet.
Question options:
|
| Edge computing |
|
| IP routing |
|
| Distributed computing |
|
| IP convergence |