Question 1
In the __________ stage of business-to-consumer electronic commerce, dissemination of promotional and marketing material, like providing electronic brochures, takes place.
Question options:
e-transaction
e-subscription
e-information
e-integration
Question 2
With respect to typical revenue models for electronic commerce businesses, Symantec and Norton are using a(n) __________ revenue model.
Question options:
licensing
brokerage
subscription
affiliate marketing
Question 3
A way to ensure that a company's site is on the first page users see when looking for a specific term is using __________ advertising.
Question options:
search
viral
buzz
stealth
Question 4
E-filing is an example of a __________ tool.
Question options:
government-to-government
consumer-to-consumer
government-to-citizen
consumer-to-business
Question 5
Which of the following is a disadvantage of e-tailing?
Question options:
It requires additional time for products to be delivered.
It is limited by physical store and shelf space restrictions.
It complicates the process of comparison shopping.
It restricts companies to effectively compete on price.
Question 6
In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A(n) __________ grid, consisting of a large number of computers, can help overcome these problems.
Question options:
dedicated
trusted
edged
clustered
Question 7
Which of the following statements is true about the platform as a service model?
Question options:
The customer is provided with the basic capabilities of processing, storage, and networking.
Only the basic capabilities of processing, storage, and networking are provided.
The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
The customer can run his or her own applications that are typically designed using tools provided by the service provider.
Question 8
The suffix ".org" is reserved for:
Question options:
educational institutions.
non-profit organizations.
commercial organizations.
governmental entities.
Question 9
The protocol used by the Internet is called the:
Question options:
Dynamic Host Configuration Protocol (DHCP).
Transmission Control Protocol (TCP).
Address Resolution Protocol (ARP).
Trivial File Transfer Protocol (TFTP).
Question 10
Which of the following is likely to have the suffix ".edu" after the domain name in its URL?
Question options:
Harvard Business School
The Federal Reserve
UNICEF
Yahoo!
Question 11
EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy?
Question options:
The public is wary of sharing confidential information after a recent spate of credit card scandals.
Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts.
The company has limited access to funds and is looking to keep its costs low.
A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain.
Question 12
With regard to the World Wide Web, Web pages are stored on Web:
Question options:
consortiums.
rings.
servers.
consoles.
Question 13
Under the __________ computing model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.
Question options:
grid
distributed
cluster
utility
Question 14
Which of the following statements is true about electronic commerce?
Question options:
Business-to-business is by far the largest form of electronic commerce in terms of revenues.
All forms of electronic commerce involve business firms.
Electronic commerce is limited to transactions between businesses and consumers.
Electronic commerce between businesses and their employees is impossible.
Question 15
Provoking bidders to leave a legitimate auction to buy the same item at a lower price outside the auction space, where return policies and buyer protection do not apply, is called:
Question options:
bid luring.
bid shielding.
bid skimming.
rafter bidding.
Question 16
Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that the:
Question options:
product is designed to avoid obsolescence.
product is designed in such a way as to extend its life span.
product is designed to last only for a certain life span.
companies have already decided when to launch their next product.
Question 17
Which of the following statements is true about servers?
Question options:
They are optimized for visualization and rendering of three-dimensional models.
They are used to provide services to users within large organizations or to Web users.
They are used primarily to assist in solving massive scientific problems.
They are primarily used as the main, central computing system for major corporations.
Question 18
Which of the following occurred in the 1946-1958 generation of computing?
Question options:
The internetworking era ended.
The mainframe era began.
The mainframe era ended and the personal computer era began.
The interpersonal computing era ended and the internetworking era began.
Question 19
Within the context of different types of e-auction fraud, bid shielding is sometimes called:
Question options:
reverse bidding.
bid skimming.
shill bidding.
bid luring.
Question 20
__________ is used to transmit voice and video communication over the Internet.
Question options:
Edge computing
IP routing
Distributed computing
IP convergence