All of the following are techniques B2C e‐commerce companies use to attract customers, except:
All of the following are techniques B2C e‐commerce companies use to attract customers, except:
A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)?
A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)?
What is the percentage of customers who visit a Web site and actually buy something called?
What is the percentage of customers who visit a Web site and actually buy something called?
The ability to change the product to better fit the needs of the customer is called ________.
The ability to change the product to better fit the needs of the customer is called ________.
Which of the following is not related to security mechanism?
Which of the following is not related to security mechanism?
Digital products are best suited for B2C e‐commerce because they:
Digital products are best suited for B2C e‐commerce because they:
Paisapay is facilitated in.
Paisapay is facilitated in.
Redundant navigation refers to _________.
Redundant navigation refers to _________.
All of the following are major B2C business models except ______.
All of the following are major B2C business models except ______.
A _________ is the set of planned activities designed to result in a profit in a marketplace.
A _________ is the set of planned activities designed to result in a profit in a marketplace.
In 1961, __________ published a paper on "packet switching" networks.
In 1961, __________ published a paper on "packet switching" networks.
Materials used in the normal operation of a business but not related to primary business operations are called what?
Materials used in the normal operation of a business but not related to primary business operations are called what?
What type of ad appears on top of a web page?
What type of ad appears on top of a web page?
A _________ describes the flow of information at your e-commerce site and the infrastructure that will be used in the system.
A _________ describes the flow of information at your e-commerce site and the infrastructure that will be used in the system.
Which of the following is not a dimension of e-commerce security provided by encryption?
Which of the following is not a dimension of e-commerce security provided by encryption?
All of the following are examples of 2G wireless phone technologies except _________.
All of the following are examples of 2G wireless phone technologies except _________.
The solution for all business needs is.
The solution for all business needs is.
Internet users account for about ________ of the world's population.
Internet users account for about ________ of the world's population.
Which segment is eBay an example?
Which segment is eBay an example?
Which one of the following is not one of the major types of e-commerce?
Which one of the following is not one of the major types of e-commerce?
What Web server functionality allows it verify usernames and passwords and process certificates and encryption information?
What Web server functionality allows it verify usernames and passwords and process certificates and encryption information?
__________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server.
__________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server.
Which of the following are advantages normally associated with B2B e‐commerce?
Which of the following are advantages normally associated with B2B e‐commerce?
Which of the following is part of the four main types for e‐commerce?
Which of the following is part of the four main types for e‐commerce?
What type of ad appears under a web page?
What type of ad appears under a web page?
Which, if any, of the following types of ads are people most willing to tolerate?
Which, if any, of the following types of ads are people most willing to tolerate?
The source of revenue in a subscription revenue model is __________.
The source of revenue in a subscription revenue model is __________.
An electronic check is one form of what?
An electronic check is one form of what?
Which segment do eBay, Amazon.com belong?
Which segment do eBay, Amazon.com belong?
Which protocol permits users to transfer files from the server to their client computer, and vice versa?
Which protocol permits users to transfer files from the server to their client computer, and vice versa?
The best products to sell in B2C e‐commerce are:
The best products to sell in B2C e‐commerce are:
Which of the following is not a key element of a business model?
Which of the following is not a key element of a business model?
The most widely used encryption standard is ______.
The most widely used encryption standard is ______.
Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials?
Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials?
A perfect market is one in which __________.
A perfect market is one in which __________.
In which website Global Easy Buy is facilitated?
In which website Global Easy Buy is facilitated?
Unique value auction is mainly applies to?
Unique value auction is mainly applies to?
A strategy designed to compete in all markets around the globe is called a _________ strategy.
A strategy designed to compete in all markets around the globe is called a _________ strategy.
Industry structure is defined as __________.
Industry structure is defined as __________.
All of the following are goals of Internet 2 except ______.
All of the following are goals of Internet 2 except ______.
The area of actual or potential commercial value in which a company intends to operate is a _______.
The area of actual or potential commercial value in which a company intends to operate is a _______.
If the threat of substitute products or services is low it is a(n):
If the threat of substitute products or services is low it is a(n):
The most common type of Internet crime according to the IC3 is ______.
The most common type of Internet crime according to the IC3 is ______.
Which products are people most likely to be comfortable buying on the Internet?
Which products are people most likely to be comfortable buying on the Internet?
The threat of new entrants is high when it is:
The threat of new entrants is high when it is:
What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities?
What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities?
Which type of e‐commerce focuses on consumers dealing with each other?
Which type of e‐commerce focuses on consumers dealing with each other?
Broadband is generally considered to be any communication technology allowing streaming audio and video at or above _________.
Broadband is generally considered to be any communication technology allowing streaming audio and video at or above _________.
All of the following are technologies used to gather information about you online except ______.
All of the following are technologies used to gather information about you online except ______.
Malicious hackers who act with the intention of causing harm are __________.
Malicious hackers who act with the intention of causing harm are __________.
Which of the following is a useful security mechanism when considering business strategy and IT?
Which of the following is a useful security mechanism when considering business strategy and IT?
The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _________.
The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _________.
Which of the following is not considered to be one of the three phases of e-commerce?
Which of the following is not considered to be one of the three phases of e-commerce?
All of the following are wireless Internet access network technologies except ________.
All of the following are wireless Internet access network technologies except ________.
How the transactions occur in e‐commerce?
How the transactions occur in e‐commerce?
All of the following are steps in the systems development life cycle except ______.
All of the following are steps in the systems development life cycle except ______.
Which products are people most likely to be more uncomfortable buying on the Internet?
Which products are people most likely to be more uncomfortable buying on the Internet?
If you need to transfer money to another person via the internet, which of the following methods could you use?
If you need to transfer money to another person via the internet, which of the following methods could you use?
Which of the following refers to creating products tailored to individual customers?
Which of the following refers to creating products tailored to individual customers?
All of the following are tools for optimizing a Web site's location in search engine listings except ________.
All of the following are tools for optimizing a Web site's location in search engine listings except ________.
All of the following are factors in optimizing Web site performance except _________.
All of the following are factors in optimizing Web site performance except _________.
The idealistic market envisioned at the outset of the development of e-commerce is called a ______.
The idealistic market envisioned at the outset of the development of e-commerce is called a ______.
The dominant Web server software is __________.
The dominant Web server software is __________.
The _________ business model involves an independently owned vertical digital marketplace for direct inputs.
The _________ business model involves an independently owned vertical digital marketplace for direct inputs.
When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.
When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.
Which of the following is an example of a portal?
Which of the following is an example of a portal?
What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment?
What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment?
Which type of add appears on a web page?
Which type of add appears on a web page?
Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?
Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?
Which of the following is not one of the stages of the development of the Internet?
Which of the following is not one of the stages of the development of the Internet?
Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues?
Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues?
The primary source of financing during the early years of e-commerce was _______.
The primary source of financing during the early years of e-commerce was _______.
Which form of e‐marketplace brings together buyers and sellers from the same industry?
Which form of e‐marketplace brings together buyers and sellers from the same industry?
Which type of products is lesser purchased using eCommerce?
Which type of products is lesser purchased using eCommerce?
Which of the following is not a limitation of the current Internet?
Which of the following is not a limitation of the current Internet?
The dimension of e-commerce that enables commerce across national boundaries is called _______.
The dimension of e-commerce that enables commerce across national boundaries is called _______.
In the e-commerce security environment, which of the following constitutes the inner-most layer?
In the e-commerce security environment, which of the following constitutes the inner-most layer?
Most individuals are familiar with which form of e‐commerce?
Most individuals are familiar with which form of e‐commerce?
A situation where there are no differences among products or services, and the only basis of choosing products is price is known as _________.
A situation where there are no differences among products or services, and the only basis of choosing products is price is known as _________.
The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a ________.
The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a ________.
The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is ________.
The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is ________.
A business cannot be all things to all people. Instead, a business must:
A business cannot be all things to all people. Instead, a business must:
What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
Compared to Internet users, the number of cell phone subscribers is _________.
Compared to Internet users, the number of cell phone subscribers is _________.
Which of the following statements accurately reflect the impact of technology?
Which of the following statements accurately reflect the impact of technology?
Which of the following connections allows the fastest download speeds?
Which of the following connections allows the fastest download speeds?
Which of the following is a method of transferring money from one person's account to another?
Which of the following is a method of transferring money from one person's account to another?
If it is easy for competitors to enter the market, the threat of new entrants is considered:
If it is easy for competitors to enter the market, the threat of new entrants is considered:
Which of the following was the first commercial Web browser?
Which of the following was the first commercial Web browser?
Amazon.com is well‐known for which e‐commerce marketing technique?
Amazon.com is well‐known for which e‐commerce marketing technique?
Which of the following describes e‐commerce?
Which of the following describes e‐commerce?
Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?
Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?
A business competing in a commodity like environment must focus on which of the following?
A business competing in a commodity like environment must focus on which of the following?
Which of the following is a new and disruptive Web feature or service?
Which of the following is a new and disruptive Web feature or service?
Which of the following is not a horizontal portal?
Which of the following is not a horizontal portal?
A worm is designed to spread _________.
A worm is designed to spread _________.
All of the following are major categories of computer viruses except _________.
All of the following are major categories of computer viruses except _________.
Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet?
Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet?
Which of the following is not a widely used midrange or high-end e-commerce suite?
Which of the following is not a widely used midrange or high-end e-commerce suite?
What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?
What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?
What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left?
What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left?