Documente Academic
Documente Profesional
Documente Cultură
A) the use of the Internet, the Web, and mobile apps to transact business.
B) the use of any Internet technologies in a firm's daily activities.
C) the digital enablement of transactions and processes within an organization.
D) any digitally enabled transactions among individuals and organizations.
A
3. Which of the following terms can be considered synonymous with the term e-commerce?
A) e-business
B) digital commerce
C) the Internet
D) the Web
B
A) interactivity
B) social technology
C) information asymmetry
D) richness
C
A) richness
B) ubiquity
C) information density
D) personalization
A
6. Which of the following features of e-commerce technology allows users to participate in the
creation of online content?
A) ubiquity
B) global reach
C) information density
D) social technology
D
7. Which of the following is the best definition of transaction cost?
A) 310 million.
B) 3.1 billion.
C) 31 billion.
D) 310 billion.
B
A) richness
B) interactivity
C) universal standards
D) information density
C
10. Which of the following statements is true about the traditional tradeoff between the
richness and reach of a marketing message prior to the development of the Web?
12. The costs incurred by merchants in having to change product prices (such as the costs of
reentering prices into computer systems) are referred to as which of the following?
A) subscription costs
B) fixed costs
C) menu costs
D) variable costs
C
13. Which of the following refers to any disparity in relevant market information among parties
in a transaction?
A) information asymmetry
B) unfair competitive advantage
C) imperfect competition
D) dynamic pricing
A
14. Which of the following is a physical place you visit in order to transact?
A) marketspace
B) marketplace
C) social network
D) the Internet
B
15. The total number of users or customers an e-commerce business can obtain is a measure of
which of the following?
A) ubiquity
B) interactivity
C) reach
D) information density
C
16. Which of the following refers to the complexity and content of a message?
A) richness
B) reach
C) information density
D) interactivity
A
17. E-commerce is available just about everywhere and anytime. This is known as ________.
A) richness
B) information density
C) ubiquity
D) reach
C
18. Which type of e-commerce is distinguished by the type of technology used in the transaction
rather than by the nature of the market relationship?
A) consumer-to-consumer (C2C)
B) social e-commerce
C) mobile e-commerce
D) business-to-business (B2B)
C
A) Amazon
B) eBay
C) Wikipedia
D) Facebook
D
A) The average U.S. consumer spends over two hours a day using apps.
B) Users still spend less time using apps than they do using desktops or mobile Web sites.
C) Apps are easier to control and monetize than Web sites.
D) Around 280 million people worldwide launch a smartphone app more than 60 times a
day.
B
A) YouTube
B) Airbnb
C) Tumblr
D) Facebook
B
A) Airbnb
B) Facebook
C) Groupon
D) Go2Paper
D
A) Amazon
B) Groupon
C) Craigslist
D) Go2Paper
C
A) Instagram.
B) Twitter.
C) Y Combinator.
D) Pinterest.
C
26. In which year can e-commerce be said to have begun?
A) 1983
B) 1985
C) 1995
D) 2001
C
A) copyright infringement.
B) inability to retain users.
C) spam.
D) scams.
B
28. Which of the following is a characteristic of e-commerce during the Invention period?
A) mobile technology
B) earnings and profit emphasis
C) disintermediation
D) extensive government surveillance
C
29. Which of the following are examples of Web 2.0 sites and applications except:
A) photo-sharing sites.
B) blogs.
C) wikis.
D) auction sites.
D
33. The early years of e-commerce were driven by all of the following factors except:
34. Which business application is associated with the technological development of local area
networks and client/server computing?
A) technology driven
B) finance-driven
C) sociological
D) government-driven
A
36. The early years of e-commerce are considered:
A) the most promising time in history for the successful implementation of first mover
advantages.
B) an economist's dream come true, where for a brief time consumers had access to all
relevant market information and transaction costs plummeted.
C) a stunning technological success as the Internet and the Web increased from a few
thousand to billions of e-commerce transactions per year.
D) a dramatic business success as 85% of dot-coms formed since 1995 became flourishing
businesses.
C
CHAPTER 3:
1. During which period of time did the Institutionalization phase of Internet development take
place?
A) 1950-1960
B) 1961-1974
C) 1975-1995
D) 1995-through the present
C
A) The fundamental building blocks of the Internet were realized in actual hardware and
software.
B) Mosaic was invented.
C) The Domain Name System was introduced.
D) NSF privatized the operation of the Internet's backbone.
D
3. During which phase of the development of the Internet was the Domain Name System (DNS)
introduced?
A) Commercialization phase
B) Institutional phase
C) Innovation phase
D) Consolidation phase
B
4. Which of the following is not one of the basic technological foundations of the Internet?
A) client/server computing
B) FTP
C) TCP/IP
D) packet switching
B
5. The process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the destination
point is called:
A) routing.
B) the Transmission Control Protocol.
C) packet switching.
D) the File Transfer Protocol.
C
6. Which of the following is the core communications protocol for the Internet?
A) Telnet
B) FTP
C) TCP/IP
D) TLS
C
10. The ________ allows a natural language expression, such as Google.com to represent a
numeric IP address.
A) a domain name.
B) a uniform resource locator.
C) an IP address.
D) a file path.
B (URL)
12. Which of the following is not an advantage of client/server computing over centralized
mainframe computing?
13. ________ is a model of computing in computer processing, storage, software, and other
services are provided as a shared pool of virtualized resources over the Internet.
A) Client/server computing
B) P2P computing
C) Mobile computing
D) Cloud computing
D
A) IMAP
B) FTP
C) HTTP
D) SSL
A
A) A public cloud is typically used by companies with stringent privacy and security
requirements.
B) Dropbox is an example of a public cloud.
C) Hybrid clouds offer both public and private cloud options.
D) A private cloud hosted internally or externally.
A
A) Telnet
B) FTP
C) HTTP
D) SSL
A
18. ________ is a utility program that allows you to check the connection between your client
and a TCP/IP network.
A) Ping
B) Telnet
C) Tracert
D) Finger
A
19. Which of the following technologies has enabled the Internet to grow exponentially to
support millions of users, without overloading the network architecture?
A) fiber optics
B) Wi-Fi
C) IPv6
D) client/server computing
D
20. Which of the following are specialized computers that interconnect the thousands of
computers that make up the Internet in order to transmit message parcels along available
communication paths and on to their destinations?
A) routers
B) Web servers
C) IP servers
D) packet servers
A
21. Which of the following is a set of rules for transferring data?
A) protocol
B) packet
C) router
D) IP address
A
22. Which of the following is not a basic type of cloud computing service?
A) IaaS
B) PaaS
C) SaaS
D) FiOS
D
23. Which of the following are central directories that list all domain names currently in use for
specific domains?
A) Web servers
B) root servers
C) client servers
D) DNS servers
B
24. Which of the following was the original purpose of the Internet?
25. Which of the following is a utility program that allows you to track the path of a message
you send from your client to a remote computer on the Internet?
A) Telnet
B) Ping
C) IMAP
D) Tracert
D
26. Who wrote the first paper on packet switching networks?
A) J.C.R. Licklider
B) Ray Tomlinson
C) Leonard Kleinrock
D) Vint Cert
C
27. Which of the following organizations coordinates the Internet's systems of unique
identifiers, such as IP addresses and top-level domain systems?
A) IETF
B) IAB
C) W3C
D) ICANN
D
30. The layer of Internet architecture that ties the applications to the communications network
and includes such services as security and authentication is called the:
32. When talking about the physical elements of the Internet, the term redundancy refers to:
34. Which of the following organizations involved with Internet governance has the United
States recently announced it would give up control over?
A) ICANN
B) IGF
C) NTIA
D) IANA
D
35. Internet traffic is predicted to do which of the following over the next five years?
A) decrease
B) double
C) triple
D) quadruple
C
36. Which of the following is not a concern about IoT?
38. The first Web browser to make it possible to view documents on the Web with colored
background, images, and animations was:
A) Netscape Navigator.
B) Mosaic.
C) Mozilla.
D) Internet Explorer.
B
A) .com
B) company.com
C) www
D) http
A
40. You could expect to find all of the following services in a Web server software package
except:
A) security services.
B) FTP.
C) search engine.
D) an RSS aggregator.
D
41. Which of the following is currently the most popular Web browser?
A) Internet Explorer
B) Safari
C) Chrome
D) Firefox
A
42. The concept behind document formatting had its roots in which of the following?
A) XML
B) SGML
C) HTML
D) GML
D
A) a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer.
B) use of CSS3.
C) ability to access built-in functionality of mobile devices, such as GPS and swiping.
D) support for digital rights management.
D
44. Which of the following is a Web application that enables Internet users to communicate with
each other, although not in real time?
A) mobile messaging
B) online forum
C) SMS messaging
D) VoIP
B
A) KakaoTalk
B) WhatsApp
C) Viber
D) Feedly
D
CHAPTER 4:
1. What are the two most important management challenges in building a successful e-
commerce presence?
A) developing a clear understanding of business objectives and knowing how to choose the
right technology to achieve those objectives
B) having an accurate understanding of your business environment and an achievable
business plan
C) building a team with the right skill sets and closely managing the development process
D) identifying the key components of your business plan and selecting the right software,
hardware, and infrastructure for your site
A
2. In order from beginning to end, the major steps in the SDLC are:
3. ________ are the types of information systems capabilities needed to meet business
objectives.
A) Information requirements
B) System functionalities
C) System design specifications
D) Physical design specifications
B
4. Which of the following basic system functionalities is used to display goods on a Web site?
A) product database
B) digital catalog
C) shopping cart system
D) customer database system
B
5. Which system functionality must your Web site have in order to be able to personalize or
customize a product for a client?
A) an ad server
B) a site tracking and reporting system
C) an inventory management system
D) customer on-site tracking
D
6. Which of the following are the two main components of a systems design?
A) shopping cart
B) product database
C) on-site blog
D) site tracking and reporting system
C
9. Which of the following is not one of the basic business objectives for an e-commerce site?
A) display goods
B) execute a transaction
C) provide production and supplier links
D) optimize system architecture
D
10. All of the following are basic information requirements for a product database except:
A) product descriptions.
B) stock numbers.
C) customer ID numbers.
D) inventory levels.
C
11. Which of the following typically includes a data flow diagram to describe the flow of
information for an e-commerce site?
A) physical design
B) logical design
C) testing plan
D) co-location plan
B
12. Which of the following details the actual hardware components to be used in a system?
A) architecture plan
B) system functionalities plan
C) logical design
D) physical design
D
13. Which of the following verifies that the business objectives of the system as originally
conceived are in fact working?
A) system testing
B) acceptance testing
C) unit testing
D) implementation testing
B
14. Which of the following involves testing a site program's modules one at a time?
A) system testing
B) acceptance testing
C) unit testing
D) implementation testing
C
15. Most of the time required to maintain an e-commerce site is spent on:
A) debugging code.
B) responding to emergency situations.
C) general administration and making changes and enhancements to the system.
D) changes in reports, data files, and links to backend databases.
C
16. All of the following are simple steps for optimizing Web page content that can reduce
response times except:
17. Which of the following is the minimum system architecture requirement for an e-commerce
Web site that processes orders?
A) single-tier architecture
B) two-tier architecture
C) three-tier architecture
D) multi-tier architecture
B
18. 23) All of the following offer Web site building tools except:
A) Weebly.
B) Google Sites.
C) WordPress.
D) Apache.
D
19. All of the following are major players in hosting/co-location/cloud services except:
A) GoDaddy.
B) WordPress.
C) Rackspace.
D) CenturyLink.
B
20. Which form of testing compares a control page with one that is very different?
A) template test
B) new concept test
C) funnel test
D) system test
B
A) unit testing
B) system testing
C) acceptance testing
D) A/B testing
D
22. When using multivariate testing, if you wish to test two different versions of an image, a
button, and a piece of text, how many combinations will you need to test?
A) 2
B) 4
C) 6
D) 8
D
23. The process of comparing a Web site with that of its competitors in terms of response
speed, quality of layout, and design is known as:
A) split testing.
B) funnel testing.
C) benchmarking.
D) system testing.
C
24. Which of the following is used to process certificates and private/public key information?
A) HTTP
B) Secure Sockets Layer/Transport Layer Security
C) File Transfer Protocol
D) data capture tools
B
25. Which of the following would you use to verify that links on Web pages are valid?
A) HTTP
B) FTP
C) data capture tools
D) site management tools
D
26. Which of the following type of application server monitors and controls access to a main
Web server and implements firewall protection?
A) proxy server
B) list server
C) groupware server
D) mail server
A
27. Which of the following technologies is used to separate the design and presentation of
content from the content creation process?
A) a product catalog.
B) marketing software.
C) a shopping cart.
D) credit card processing.
B
A) WebSphere
B) Apache
C) MySQL
D) PHP
A
31. Which of the following is a standard that makes it possible to access data from any
application regardless of the database and operating system software being used?
A) CGI
B) ODBC
C) MySQL
D) HTTP
B
33. Which of the following types of sites typically needs a high percentage of secure pages?
A) Web services
B) customer self-service
C) trading
D) publishing/subscription
C
34. Which of the following is not a main factor in determining the overall demand on an e-
commerce site?
35. All of the following are steps one can take to right-size a Web site's hardware platform and
meet demands for service except: