Page 1
1. What is an example of mobile entertainment that you might utilize via your smartphone?
Music and video
Mobile games
Mobile gambling
All of the above
2. Key factors of the services provided through L-commerce include all of the following except
navigation and tracking.
mapping.
transactions.
timing.
3. Goods that can be transformed to digital format and delivered over the Internet are referred to as
storefronts.
digital goods.
intermediaries.
auction items.
4. One of the characteristics of Web 2.0 in the travel industry is
standardization.
segmentation.
personalization.
intermediation.
5. All of the following are true about a general-purpose pure-play e-tailer except
it sells directly to consumers over the Internet.
it has a physical location.
it has the advantage of low overhead and streamlined processes.
it may lack infrastructure to support online activities.
6. A company that creates and manages many-to-many markets is called a
market maker.
transaction broker.
content disseminator.
viral marketer.
7. The _____ was invented by Netscape to use standard certificates for authentication and data encryption to ensure
privacy or confidentiality.
certificate authority
public key infrastructure
secure socket layer
digital envelope
8. Access to a network should be based on
the policy of least privilege, where access to network resources is blocked and permitted only when needed to conduct
business.
the policy of acceptable use, where access is restricted by the firewall.
role-specific security protocols, where access is limited by a user's level of trust.
the policy of need to know, where access by all nonemployees is blocked.
9. All of the following are important security functions of proxy servers except
improving network performance.
helping control inbound traffic to a network.
helping control outbound traffic to a network.
hiding the IP addresses of a company's internal computers.
10. All of the following are characteristics of access control except
access control determines which persons, programs, or machines can legitimately use a network resource and which resources
he, she, or it can use.
access control lists (ACLs) define users' rights, such as what they are allowed to read, view, write, print, copy, delete, execute,
modify, or move.
all resources need to be considered together to identify the rights of users or categories of users.
after a user has been identified, the user must be authenticated.
11. _____ determines whether a buyer's card is active and whether the customer has sufficient funds.
Settlement
Payment
A lower transaction cost
Authorization
12. Direct marketers
do not use intermediaries between manufacturers and buyers.
do not operate physical stores.
are pure-play e-tailers.
sell through catalogs, the Internet, or intermediaries.
13. A key difference in competition between retailing and e-tailing is that
retailers face greater global competition.
e-tailers face fewer competitors.
retailers face fewer competitors.
e-tailers face greater local competition.
14. B2B transactions that involve communication, design, planning, and information sharing (beyond financial) among
business partners are referred to as
exchanges.
collaborative commerce.
trading communities.
public marketplaces.
15.Intellectual property includes creations of the mind, including
inventions.
literary and artistic works.
symbols, names, images, and designs used in commerce.
All of the above
16. All of the following are correct about market research methods except:
it is important to understand first how groups of consumers are classified or segmented.
markets can be segmented to increase the percentage of responses and to formulate effective marketing strategies that
appeal to specific consumer groups.
direct mail-marketing methods are usually cost effective.
market segmentation is done with the aid of tools such as data modeling and data warehousing.
PAGE 2
1. (TCO 1) Compare and contrast Web 1.0 versus Web 2.0.
2. (TCO 2) Identify three factors or capabilities that the success of an e-supply chain depends on.
3. (TCO 6) Write a short essay that describes e-supply chain management in detail.
4. (TCO 6) Describe reverse-auction process and list the benefit of this process.
5. (TCO 5) List three basic functions of the e-marketplace.
6. (TCO 6) Distinguish between organizational buyers and individual consumers.