Ashworth Semester Exam BU48S eBusiness Strategy

BU48S : eBusiness Strategy

Question 1

__________ strategy is concerned primarily with how to compete within individual markets.

Operational

Corporate-level

Differentiation

Business unit

 

Question 2

There are several ways of attaining __________, including having a strong and unique brand, a large and loyal customer base, and low-cost production facilities.

lower transaction costs

a competitive advantage

economies of scale and scope

increased customer value

 

Question 3

Important factors in the __________ environment are interest and exchange rates, evolution of stock markets and, more generally, economic growth rates.

economic

social

political and legal

natural

 

Question 4

Kotler proposes a number of different requirements that any type of market segmentation should fulfill. They include all of the following EXCEPT:

substantial.

differentiable.

actionable.

identifiable.

 

Question 5

The __________ illustrates how information captured in the physical value chain can be used to develop new markets.

virtual value chain

value network

ICDT model

internal value chain

 

Question 6

Doing this to the disruptive innovator means that a company tries to out-substitute the substitution.

Defending

Straddling

Migrating/harvesting

Leapfrogging

 

Question 7

Potential adopters usually come to the __________ for advice and information about innovations.

innovators

early adopters

early majority

brand leaders

 

Question 8

_________ management focuses on logistics and support functions. This business includes the building and management of physical facilities, such as manufacturing or assembly plants, retail outlets and truck fleets, for high-volume production and transportation processes.

Logistics

Customer relationship

Infrastructure

Production

 

Question 9

A __________ is a website that displays content that users can incorporate as is, or modify at will.

wiki

blog

media platform

desktop application

 

Question 10

__________ takes place when hackers misrepresent their true identity or misrepresent themselves by using fake email addresses.

Phishing

Malicious code

Cyber-vandalism

Spoofing