Read 'Chapter 1: Growth Of E-Commerce' & answer the following question(s): |
1. | Which of the following is not true about e-commerce? |
| |
| |
| |
| |
2. | The objectives of EC do not include |
| |
| |
| |
| |
3. | In the internetworked E-business enterprise, an extranet refers to: |
| |
| |
| |
| |
4. | In an electronic payment system the bill is sent to the customer by: |
| |
| |
| |
| |
5. | Telecommunication companies include all except: |
| |
| |
| |
| |
6. | M-commerce relies on the use of wireless communications to allow managers and corporations to place orders and conduct business using handheld computers, portable phones, laptop computers connected to a network, and other mobile devices. T F |
| |
| |
Read 'Chapter 2: The World Wide Web' & answer the following question(s): |
7. | There are three basic categories of electronic commerce applications: business-to-consumer, business-to-business, and consumer-to-consumer. In B2C applications, companies may offer: |
| |
| |
| |
| |
8. | Which of the following is true about Business-to-Business (B2B) e-Commerce? |
| |
| |
| |
| |
9. | In C2C applications: |
| |
| |
| |
| |
10. | ______________________ is not a resource that e-commerce systems rely on. |
| |
| |
| |
| |
11. | ________________ is not an Internet computer suffix. |
| |
| |
| |
| |
12. | Most e-commerce applications are ________________ systems that respond to a multitude of events – from a new customer's first website access, to payment and delivery processes, and to innumerable customer relationship and supply chain management activities. |
| |
| |
| |
| |
13. | ______________________ was the ancestor of the Internet. It was developed by the U.S. Department of Defense. |
| |
| |
| |
| |
14. | ___________________ is not a Web browser. |
| |
| |
| |
| |
Read 'Chapter 3: The Access Provider Industry' & answer the following question(s): |
15. | Typical electronic applications include all except: |
| |
| |
| |
| |
16. | __________________ relationship management occurs when a firm obtains detailed information about a customer's behavior, preferences, needs, and buying patterns and uses that information to set prices, negotiate terms, tailor promotions, add product features, and otherwise customize its entire relationship with that customer. |
| |
| |
| |
| |
17. | Which of the following will never lend themselves to electronic commerce? |
| |
| |
| |
| |
18. | ___________________ is not used for online security. |
| |
| |
| |
| |
Read 'Chapter 4: Intranets And Extranets' & answer the following question(s): |
19. | Which is the standard page description language for Web pages? |
| |
| |
| |
| |
20. | A(n) ___________________ is used to connect users to databases. |
| |
| |
| |
| |
21. | An internal organizational Internet that is guarded against outside access by a firewall is a(n): |
| |
| |
| |
| |
22. | Popular business uses of the Intranet include: A. B. C. D. |
| |
| |
| |
| |
23. | A secure network that uses the Internet as its main backbone network to connect the intranets of a company's different locations, or to establish extranet links between a company and its customers, suppliers, and other business partners is called a(n): |
| |
| |
| |
| |
24. | The benefits of Intranets do not include: |
| |
| |
| |
| |
Read 'Chapter 5: Marketing And Advertising' & answer the following question(s): |
25. | Advertising is used to accomplish the following goals except for: |
| |
| |
| |
| |
26. | Which one of the following is not a form of search-related advertising spending on the Internet? |
| |
| |
| |
| |
27. | __________________ are bits of information stored on a client computer. |
| |
| |
| |
| |
Read 'Chapter 6: EDI' & answer the following question(s): |
28. | __________________________ is a set of standards for structuring information that is to be electronically exchanged between and within businesses, organizations, government entities and other groups, including inventory data. |
| |
| |
| |
| |
29. | EDI should be viewed as: |
| |
| |
| |
| |
30. | The factors affecting data flow in the EDI system do not include: |
| |
| |
| |
| |
31. | Extensible Markup Language (XML) does not have |
| |
| |
| |
| |
Read 'Chapter 7: Electronic Banking' & answer the following question(s): |
32. | _____________ cards are by far the most popular form of consumer electronic payment online. |
| |
| |
| |
| |
33. | Which of the following has the advantages of being independent and portable? |
| |
| |
| |
| |
34. | Internet payments for items costing from a few cents to approximately a dollar are called __________________. |
| |
| |
| |
| |
Read 'Chapter 8: Network Security' & answer the following question(s): |
35. | Which of the statements is false regarding password policy? |
| |
| |
| |
| |
36. | ______________ includes the ability to infect the system with a virus or plant Trojan horses or back-doors. |
| |
| |
| |
| |
37. | An attacker that is able to read or copy confidential information has: |
| |
| |
| |
| |
38. | The Security Analyst Tool for auditing networks is known as: |
| |
| |
| |
| |
39. | _____________ is not a tool used to implement the security plan: |
| |
| |
| |
| |
40. | A program that replicates itself but does not infect other programs is a: |
| |
| |
| |
| |
41. | ________________ is software that is installed onto your computer, usually without your knowledge, to record your online activity for third parties. |
| |
| |
| |
| |
42. | Which one of the following is not a common type of network topologies: |
| |
| |
| |
| |
43. | ____________________________ is not a way to reduce risk related to software bugs |
| |
| |
| |
| |
Read 'Chapter 9: Taxation Of E-Commerce' & answer the following question(s): |
44. | A(n) __________________ statement is a statement that is false and that injures the reputation of another person or company. |
| |
| |
| |
| |
45. | ______________________ are levied on the products or services that the company sells or uses. |
| |
| |
| |
| |
Read 'Chapter 10: Assurance Services' & answer the following question(s): |
46. | Assurance services for electronic commerce do not include: |
| |
| |
| |
| |
47. | To become Web trust certified the CPA should have competence in the following areas except: |
| |
| |
| |
| |
Read 'Chapter 11: Establishing a Presence on the Web and Business Online Strategies' & answer the following question(s): |
48. | Domain names for entities located outside North America end in: |
| |
| |
| |
| |
49. | Building an e-commerce website can be done in a number of ways. A small company with limited capital may choose which of the following as a cost effective alternative? |
| |
| |
| |
| |
50. | Apply one of the key e-commerce success factors of retailing on the Web to the following statement: “A company's prices don't have to be the lowest on the Web if they build a reputation for high quality, guaranteed satisfaction, and top customer support while shopping and after the sale.” |
| |
| |
| |
| |