+ All Categories
Home > Documents > Test Bank

Test Bank

Date post: 02-Dec-2014
Category:
Upload: le-kien-truc
View: 46 times
Download: 12 times
Share this document with a friend
145
Chapter 1 Overview of Electronic Commerce 1-According to Peter Drucker, e-commerce is profoundly changing markets, industry structures, products and services, consumer segmentation, consumer values and consumer behavior; jobs, and labor markets. True False 2-By purchasing a textbook from Amazon.com and having the merchandise physically delivered, Amazon.com would be considered a click-and-mortar organization because pure EC did not occur. True False 3-In the field, a sales representative writes notes with a mobile handwriting-recognition computer immediately after a sales call. This can be viewed as an EC activity. True False 4-In addition to EC being conducted via the Internet, EC can be conducted over local area networks (LANs). True False 5-An example of business-to-consumer (B2C) is when Dell provides customer service online by collaborating electronically with its partners. True False 6-An internal corporate network that uses Internet tools, such as Web browsers, is known as an intranet. True False 7-An extranet is a network that uses the Internet to link together multiple intranets. True False
Transcript
Page 1: Test Bank

Chapter 1 Overview of Electronic Commerce

1-According to Peter Drucker, e-commerce is profoundly changing markets, industry

structures, products and services, consumer segmentation, consumer values and consumer

behavior; jobs, and labor markets.

True False

2-By purchasing a textbook from Amazon.com and having the merchandise physically

delivered, Amazon.com would be considered a click-and-mortar organization because pure

EC did not occur.

True False

3-In the field, a sales representative writes notes with a mobile handwriting-recognition

computer immediately after a sales call. This can be viewed as an EC activity.

True False

4-In addition to EC being conducted via the Internet, EC can be conducted over local area

networks (LANs).

True False

5-An example of business-to-consumer (B2C) is when Dell provides customer service online

by collaborating electronically with its partners.

True False

6-An internal corporate network that uses Internet tools, such as Web browsers, is known

as an intranet.

True False

7-An extranet is a network that uses the Internet to link together multiple intranets.

True False

Page 2: Test Bank

8-Purchasing a Dell computer online for use at home is an example of e-tailing.

True False

9-Networked computing connects multiple computers and other electronic devices that are

located in various locations by telecommunications networks, including wireless ones.

True False

10-When Dell purchases Godiva chocolates as gifts for its employees and has Godiva mail

them directly to the recipient Dell is engaged in B2B2C.

True False

11-Peer-to-peer (P2P) technology can be used in C2C, B2B, and B2C.

True False

12-The final participants in B2B transactions are consumers.

True False

13-Doing your banking on an Internet-enabled cell phone is an example of m-commerce.

True False

14-Despite the many e-tailing EC companies that have failed in the past, the dot-com

failure rate has recently declined sharply.

True False

15-Since 2001, no other company has had more of an impact on EC than MySpace.

True False

Page 3: Test Bank

16-Wikipedia.com, a Web site that allows people to work together online and share

information, is an example of Web 2.0.

True False

17-The digital economy refers to an economy based on digital communication networks,

computers, software, and other related information technologies that provide a global

platform over which people and organizations interact, communicate, collaborate, and

search for information.

True False

18-Economic, legal, societal, and technological factors have created a highly competitive

business environment in which customers are becoming less powerful.

True False

19-Strong competition and increased power of consumers are two of the major market

pressures in today's business environment.

True False

20-Business models are a subset of a business plan or business case and refer to methods of

doing business by which a company can generate revenue.

True False

21-A business model outlines how the organization or the EC project will generate revenue

through sales, transaction fees, advertising fees, affiliate fees, or other revenue sources.

True False

22-A value proposition refers to the tangible and intangible benefits that a company can

derive from using EC making it an important part of the marketing plan.

True False

Page 4: Test Bank

23-Affiliate marketing is an EC business model of word-of-mouth marketing in which

customers promote a product or service to friends or other people.

True False

24-Social networks, such as Facebook, YouTube, and MySpace, are Web sites that connect

people with specific interests by providing free services such as photo sharing, e-mail, and

blogging.

True False

25-Many companies used a corporate portal, which is a gateway for customers, employees,

and partners to reach corporate information and communicate with the company.

True False

26-Dell's cornerstone business model is based on the concept of:

selling directly to

small and medium

sized businesses.

build-to-order which allows

customers to configure their

own customized systems.

rapid business

growth and

threatening

competitors.

e-collaboration with a

few select business

partners.

27-________ refers to the buying and selling of goods and services; servicing of customers;

collaborating with business partners; and conducting electronic transactions within an

organization.

Partial EC E-business Pure EC E-commerce

28-EC can take several forms depending on the degree of digitization of the following three

dimensions:

the product or

service sold, the

process, and the

delivery method.

the marketing channel,

the agent, and the

collaboration method.

the payment method,

the delivery method,

and the production

method.

the business process,

the collaboration, and

the transaction.

Page 5: Test Bank

29-Purely physical companies are referred to as ________ companies, whereas companies

that are engaged only in EC are considered ________ companies.

virtual; pure play click-and-mortar; click-and-brick brick-and-mortar; virtual pure play; virtual

30-The ways in which EC is done include:

the Internet, value-added networks, on

local area networks using intranets, or on

a single computerized machine.

the Internet

and extranets.

the Internet,

extranets, and

private networks.

the Internet and

private

networks.

31-________ are systems where only routine transaction processing and information flow

take place between two or more organizations using a standard protocol, such as electronic

data interchange (EDI).

Intrabusiness EC E-CRM Interorganizational information systems B2B

32-A business such as Apple Computers making online transactions with its trading

partners is an example of:

e-CRM EDI B2B B2C

33-EC applications are supported by infrastructure and by each of the following support

areas EXCEPT:

People Marketing and advertisement Mobile devices Public policy

34-Intrabusiness EC is usually performed over intranets and/or ________.

P2P networks exchanges mobile networks corporate portals

35-A technology that is used to electronically transfer routine documents, such as invoices

and purchase orders, and for financial transactions is ________.

Exchange-to-exchange Electronic data interchange Electronic funds transfer Peer-to-peer

Page 6: Test Bank

36-Challenges that Boeing faced with its global collaboration for the design and assembly

process of its new Dreamliner passenger plane included each of the following EXCEPT:

Information security Lag time Teams working across various time zones Data management

37-A large number of EC companies, especially e-tailing and B2B ones, failed from 1999 to

2005 for each of the following reasons EXCEPT:

The companies failed to ensure

they had sufficient inventory and

a distribution setup to meet

initial demand.

The companies

lacked financial

skills.

The companies had

little marketing

experience.

The companies failed to

register with search

engines, such as

Google.

38-________ refers to the second-generation of Internet-based services that let people

collaborate and share information online in new ways, such as social networks and wikis.

Virtual Web Social Web Web 2.0 Media Web

39-Which of the following is not a characteristic of the Digital Revolution?

A high rate of

obsolescence.

Intelligent search agents to

help manage information

overload.

Fraud and other

cybercons carried out

via the Internet.

Many business processes

are expedited by up to

50 percent.

40-Because the rate of change and the level of uncertainty are expected to accelerate,

organizations are

considering less

information when

making decisions.

operating under increasing

pressures to produce more

products, faster, and with

fewer resources.

unable to react quickly

enough to threats and

opportunities.

making fewer

decisions and/or

decisions less

frequently.

41-According to the Business Environment Impact Model, ________ provide support to

organizations' activities and to actual performance, countering business pressures.

core competencies and critical response

activities

missions and

strategies EC and

IT

markets and

government

Page 7: Test Bank

42-A ________ is a company's method of doing business to generate revenue to sustain

itself.

marketing strategy business model business plan value chain

43-According to the ________ revenue model, companies receive commissions for referring

customers to others' EC Web sites.

affiliate fees advertising fees subscription fees transaction fees

44-According to the ________ revenue model, customers page a fixed amount, usually

monthly, to receive some type of service.

transaction fees affiliate fees subscription fees advertising fees

45-Large private organizational buyers and government agencies make large-volume or

large-value purchases through ________, also known as reverse auctions.

name-your-own-price

models

viral

marketing

online direct

marketing electronic tendering

systems

46-According to the ________ model, an organization can increase brand awareness or

even generate sales by Web-based word-of-mouth marketing or promoting a product or

service to other people.

electronic tendering

systems viral

marketing

name-your-own-price

models

online direct

marketing

47-Online group purchasing organizations are known as:

e-co-ops SMEs exchanges barters

48-Major barriers to EC include all of the following EXCEPT:

implementation difficulties lack of technology lack of potential customers cost

49-Which of the following is a technological limitation of EC?

Page 8: Test Bank

Difficulty

obtaining venture

capital.

Security and privacy

concerns that deter

customers from buying.

Unresolved taxation,

public policy, and legal

issues.

Order fulfillment

requirements of large-

scale B2C.

50-A job opening in the Sales Department posted on the company's Intranet by the Human

Resources Department is an example of:

B2E B2S E2C B2B

51-Boeing designing a product together with a business partner is this type of interaction:

B2B2C Nonbusiness EC B2B. Collaborative Commerce

52-A corporation uses the Internal Revenue Service's Web site to learn how to pay its

estimated quarterly income taxes. This is an example of:

G2G E2E. G2C G2B

53-The second-generation of Internet-based services that lets people collaborate and share

information online is known as Web 2.0. An example of this is:

mp3.com DoubleClick Evite blogging

54-The digital enterprise shifts the focus from managing individual information resources

such as devices, applications, and data to ________ that define the business and ultimately

deliver value to customers and end users.

transforming revenue

models

developing

models

organizing supply

chains orchestrating the services and

workflows

55-Many companies employ a(n) ________, which is a gateway for customers, employees,

and partners to reach corporate information and to communicate with the company.

corporate portal intranet social network extranet

Chapter 2 E-Marketplaces

Page 9: Test Bank

1-The functions and efficiency of an e-market are the same as that of a physical

marketplace.

True False

2-The emergence of electronic marketplaces has resulted in lower information search costs

for buyers and lower transaction and distribution costs for sellers.

True False

3-Although both marketplaces and marketspaces can sell physical products, the

marketspace also can sell digital products, which are goods that can be transformed to

digital format and delivered instantly over the Internet.

True False

4-Front end refers to the activities that support online order fulfillment, inventory

management, purchasing from suppliers, payment processing, packaging, and delivery.

True False

5-In marketing, an intermediary is a third party that operates between sellers and buyers.

Intermediaries of all kinds offer their services on the Web.

True False

6-WebMD, which is the largest U.S. medical services company, is known mainly for its

webmd.com consumer portal, but its core business is being an e-intermediary.

True False

7-The major B2B e-marketplaces are electronic storefronts, Internet malls, and exchanges.

True False

Page 10: Test Bank

8-A portal is an information gateway that attempts to address information overload by

enabling people to search and access relevant information from disparate IT systems and

the Internet, using advanced search and indexing techniques, such as Google's desktop.

True False

9-Intermediaries are human or electronic agents that play an important role in EC by

providing value-added services such as making payment arrangements to buyers and

sellers.

True False

10-Travelers using airline Web sites to book their flights directly without the use of travel

agents is resulting in the reintermediation of travel agents.

True False

11-Search engines not only "search and match," but also have capabilities that can be used

to perform routine tasks that require intelligence.

True False

12-An electronic shopping cart is an order-processing technology that allows customers to

accumulate items they wish to buy while they continue to shop.

True False

13-Shopping carts for B2B are fairly simple, but a shopping cart for B2C may be more

complex.

True False

14-An auction is a competitive process and market mechanism that uses a competitive

process by which a seller solicits consecutive bids from buyers or a buyer solicits bids from

sellers.

True False

Page 11: Test Bank

15-Negotiation and bargaining are two types of auctions where prices are not fixed, but

rather are allowed to fluctuate as market supply and demand change.

True False

16-Reverse auctions are bidding or tendering systems in which the buyer places an item for

bid on a request for quote (RFQ) system; then potential suppliers bid on the job, with the

price reducing sequentially, and the lowest bid wins.

True False

17-E-auctions are becoming less important selling and buying channels for companies and

individuals.

True False

18-The major limitations of e-auctions are insufficient security, risk of fraud, and a limited

pool of participants.

True False

19-A limitation of e-bartering for businesses is that excess capacity items such as office

space, storage, factory space; idle facilities; and labor cannot be bartered.

True False

20-Online negotiation can be facilitated by computer technology for the negotiation process

and software agents for searches and comparisons.

True False

21-Due to the lack of hurdles, the adoption and growth of m-commerce has been

widespread.

True False

Page 12: Test Bank

22-The Internet economy's low barriers to entry are both an opportunity and a threat to

businesses.

True False

23-Strong competition for commodity-type products, such as toys and CDs, was a major

contributor to the collapse of many dot-com companies, which suggests that a company

needs to use innovative strategies to survive and prosper in the Internet economy.

True False

24-Because the strength of each of Porter's five forces varies considerably from industry to

industry, it would be a mistake to draw general conclusions about the impact of the

Internet on long-term industry profitability.

True False

25-Because of intense competition on the Web, new companies cannot establish good

corporate images quickly as Amazon.com had done when it had few online competitors.

True False

26-Fundamentally, the success of the pure-play jewelry e-tailer Blue Nile was due to the

company's use of Internet technologies to:

offer lower prices than competitors eliminate intermediaries go public provide quality ratings

27-Traditional and electronic markets have three main functions, which include each of the

following EXCEPT:

matching

buyers and

sellers.

transforming raw

materials into

finished products.

providing an institutional

infrastructure, such as a legal and

regulatory framework that

enables the efficient functioning

of the market.

facilitating the exchange of

information, goods,

services, and payments

associated with market

transactions.

28-Digital products have different cost curves than those of regular products because:

Page 13: Test Bank

in digitization, all

of the costs are

variable.

in digitization, most of

the costs are variable

and fixed costs are low.

in digitization, most of

the costs are fixed, but

variable costs are high.

in digitization, most of

the costs are fixed, and

variable costs are very

low.

29-The portion of an e-seller's business processes through which customers interact,

including the seller's portal, electronic catalogs, a shopping cart, a search engine, and a

payment gateway is referred to as the ________ of the business.

front end infrastructure intermediary back end

30-All the activities that are related to order aggregation and fulfillment, inventory

management, purchasing from suppliers, accounting and finance, insurance, payment

processing, packaging, and delivery are done in what is termed the ________ of the

business.

front end back end intermediary infrastructure

31-The major ________ e-marketplaces are storefronts and Internet malls.

B2C B2B2C B2B C2B

32-An electronic storefront includes several mechanisms that are necessary for conducting

the sale. The most common mechanisms include each of the following EXCEPT:

a search engine an electronic catalog; a supply chain a payment gateway

33-________ are online markets owned and operated by a single company and may be

either sell-side or buy-side.

Commercial portals Private e-marketplaces B2B marketplaces E-malls

34-A(n) ________ is a single point of access through a Web browser to help users find

relevant and accurate business information and reduce information overload.

intermediary browser search engine information portal

Page 14: Test Bank

35-Finding relevant and accurate information is often time-consuming and requires access

to multiple systems causing organizations to lose a lot of productive employee time. One

solution to this problem is the use of:

intermediaries. portals. browsers. intranets.

36-A type of broker that helps consumers compare different stores is a:

shopping facilitator. metamediary. search agent. virtual mall.

37-Human or electronic intermediaries attempt to address each of the following limitations

of direct interaction EXCEPT:

lack of privacy for those wanting to remain

anonymous.

contract

risk. product

distribution.

search

costs.

38-The elimination of various types of agents that mediate between buyers and sellers, such

as travel and insurance agents, is referred to as:

remediation automation e-distribution disintermediation

39-A mode is purchasing where prices are negotiated or discounted is ________, which

refers to nonfixed prices, such as those in auctions or stock markets.

pre-shopping dynamic pricing commodity pricing negotiation

40-Although used occasionally in B2C commerce, customized catalogs are especially useful

in B2B e-commerce for each of the following reasons EXCEPT:

e-catalogs can show

only the items that the

employees in a specific

organization are

allowed to purchase.

e-catalogs can show

the buyer's ID

number for the item,

model, or SKU

number rather than

the seller's ID

numbers.

Intranets, in

particular, can

deliver customized

catalogs to different

business customers.

E-catalogs can be

customized to show the

same item to different

customers at different

prices, reflecting discounts

or purchase-contract

agreements.

41-To be successful and useful, large e-catalogs need a(n) ________.

Page 15: Test Bank

search engine data mining technology enhanced viewing capability directory

42-A ________ has capabilities that can be used to perform routine tasks that require

intelligence such as providing customers with assistance based on their movements on a

Web site.

intelligent engine search engine software engine software agent

43-Popular search engines include all of the following EXCEPT:

Google Lycos AltaVista MSN

44-A(n) ________ is an order-processing technology that allows customers to accumulate

items they wish to buy while they continue to shop.

merchant server e-fulfillment agent electronic shopping cart intelligent agent

45-The most common and traditional form of auctions in which one seller entertains bids

from many buyers is referred to as:

e-auctions. forward auctions double auction. reverse auctions.

46-An auction in which there is one buyer and many potential sellers; or in which a buyer

places an item for bid on an RFQ system and the lowest bid wins is referred to as all of the

following EXCEPT:

tendering system. forward auctions. bidding system. reverse auctions.

47-What is a benefit of e-auctions to sellers?

Anonymity. The optimal price is

determined by the market.

Convenience since the bidding can

occur anywhere and any time.

High stickiness to

the Web site.

48-Organizations are embracing mobilized computing technologies for several reasons

EXCEPT:

The prices of notebook computers, Wireless security It improves the Wireless telecom

Page 16: Test Bank

wireless handhelds, and smart

phones continue to fall and their

capabilities continue to increase.

problems have been

solved with

encryption.

productivity of

workers in the

field.

support for

mobility is

growing quickly.

49-EC competition is very intense because online transactions enable each of the following

EXCEPT:

Higher prices

because of a

greater number

of potential

buyers.

Setting up a Web site is

relatively easy and

inexpensive, and doing so

reduces the need for a sales

force and brick-and-mortar

stores.

For buyer, e-markets

reduce the cost of

searching for product

information; e.g., sellers,

models, prices, frequently

to zero.

Product or service

differentiation and

personalization.

50-Which of the following statements about differentiation and personalization is not

correct?

Consumers like

differentiation and

personalization and are

frequently willing to pay

more for them.

Products must be

differentiated for

perfect

competition.

Price cutting in

differentiated markets

does not impact

market share very

much:

Differentiation reduces

the substitutability

between products,

benefiting sellers who use

this strategy.

51-It can be said that competition between companies is being replaced by competition

between ________.

digital products and services networks industries differentiated products and services

52-The Internet has influenced industry structures in each of the following ways EXCEPT:

Industries are

more efficient

overall.

Increases differences

among competitors whose

offerings are kept

proprietary.

A flood of new entrants has

come into many industries

because of reduced barriers

to entry.

There has been a shift

in bargaining and

buyer power to end

users.

53-Impacts of e-marketplaces on B2C direct marketing include all of the following

EXCEPT:

The existence of e- EC enables Brand images The administrative work

Page 17: Test Bank

marketplaces has

increased the

promotion of products

and services through

direct marketing.

customization of

products and services,

which is changing

marketing and sales

activities both in B2C

and in B2B.

for new

companies have

become more

difficult to

establish.

related to physical delivery,

especially across

international borders, can be

reduced significantly, cutting

the cycle time by more than

90 percent.

54-One of the major benefits of e-markets is the improvement in supply chains with the

creation of a(n) ________.

logistics chain customized chain hub-based chain support chain

55-________ provides customers with exactly what they want, when and where they want it.

Effective communication between the supply chain and the factory floor is needed to make

it happen

Build-to-order

manufacturing Demand-driven

manufacturing

Real-time

manufacturing

Virtual

manufacturing

Chapter 3 Retailing in Electronic Commerce

1-The amount and percentage of goods and services sold on the Internet is increasing

rapidly, despite the failure of many dot-com companies.

True False

2-A retailer is a sales intermediary, a seller that operates between manufacturers and

customers.

True False

3-Consumer electronics, including cell phone sales, are the largest category of online retail.

True False

4-Jewelry sales over the Internet is just beginning, but could be one of the top sellers on the

Internet in the near future.

Page 18: Test Bank

True False

5-Offline transactions are somewhat influenced by research conducted online, with

approximately one-third of online shoppers reporting that they used the Internet to

research and influence their offline shopping choices.

True False

6-Evidence indicates that the basic principles that apply to retail success do not apply to e-

tail success.

True False

7-Offering quality merchandise at good prices, coupled with excellent service, and cross-

channel coordination and integration in which customers can almost seamlessly operate

between the online and physical environments of a business are also important elements in

successful e-tailing.

True False

8-Goods with the following characteristic guarantee provided by highly reliable or well-

known vendors are expected to facilitate higher sales volumes.

True False

9-A business model is an analysis of the organization's customers and, from that, a

discussion of how that organization will achieve profitability and sustainability by

delivering goods and services to those customers.

True False

10-Direct marketing describes marketing that takes place offline between manufacturers

and retailers.

True False

Page 19: Test Bank

11-Virtual or pure-play e-tailers are firms that sell directly to consumers over the Internet

without maintaining a physical sales channel.

True False

12-Specialized businesses operate in a very narrow market and would find it difficult to

survive in the physical world because they would not have enough customers or could not

hold the variety of stock.

True False

13-All click-and-mortar retailers started life as a traditional storefront with a physical

retail presence only and over time adopted an online transactional capability as well (brick

only to brick-and-click).

True False

14-In today's digital economy, click-and-mortar retailers sell via stores, through voice

phone calls to human operators, over the Internet through interactive Web sites, and by

mobile devices.

True False

15-Although there are practical advantages to being an e-tailer, such as lower overhead

costs, it has many drawbacks and barriers so the winners in many market segments will be

companies that use the click-and-mortar approach.

True False

16-Online travel services have high margins because of their multiple revenue models

including commissions, revenue from advertising, lead-generation payments, consultancy

fees, subscription or membership fees, and revenue-sharing fees.

True False

17-The job market is characterized by high volatility and unbalanced supply and demand.

True False

Page 20: Test Bank

18-In general, online real estate is replacing existing real estate agents in most markets.

True False

19-Many insurers are using a dual distribution strategy, by adding online distribution of

standard products to their traditional agency distribution system.

True False

20-From a bank's perspective, online banking offers a cheap alternative to branch banking

as well as a chance to enlist customers in remote areas.

True False

21-Egghead.com realized a substantial reduction in operating costs and inventory costs by

eliminating its brick-and-mortar stores and becoming a pure-play in e-commerce.

True False

22-In implementing a successful click-and-mortar strategy, a company must make sure

that whether a customer establishes contact through face-to-face encounters with store

personnel or through the Web page, the information and service received is consistent.

True False

23-Investors in e-tailers which report small losses on each unit sold should not be

concerned because the huge volume of business available online should more than offset

these small marginal losses.

True False

24-Cybermediation occurs at Web sites that use intelligent agents to facilitate

intermediation.

True False

Page 21: Test Bank

25-Channel conflict occurs when adding an online distribution channel causes problems

with existing distribution channels.

True False

26-Amazon.com experienced all of the following EXCEPT:

Amazon.com have

trended upward, driven

largely by product

diversification and its

international presence.

Amazon.com

maintained its

position as the

number one e-

tailer in 2006.

Despite increasing a sales and net

profits, in percentage terms, Amazon

has seen a drop in profitability in

2006, attributed to huge spending on

further developing its technology

infrastructure and its investment in

the Amazon Prime discount shipping

program.

The

company's

financial

success has

been assured.

27-According to data from eMarketer, approximately ________ shop online and/or

research offline-sales online.

three in four Internet

users age 25 and over

two in five Internet

users age 18 and over. three in four Internet

users age 14 and over

two in five Internet

users age 30 and over

28-All of the following categories have already been selling well online EXCEPT:

pet supplies computer hardware and software travel new cars

29-Important trends in B2C EC include all of the following EXCEPT:

many offline transactions

are now heavily

influenced by research

conducted online.

online advertising

will increasingly

use rich media.

the Internet will influence

approximately 25 percent

of all retail sales by 2010.

the use of cell

phones to shop

online is increasing

rapidly.

30-With all else being equal in the online environment, goods with any of the following

product characteristics are expected to facilitate greater online sales EXCEPT:

Relatively expensive

items.

Frequently purchased

items.

Digitized

format.

High brand

recognition.

Page 22: Test Bank

31-Marketing that takes place without the help of intermediaries is called:

direct marketing. pure-play e-tailing e-malls. disintermediation

32-Dell's strategy is best described as:

a click-and-mortar

strategy. direct marketing from a

manufacturer.

a brick-and-mortar

strategy.

a shared service mall

strategy.

33-Sears marketing strategy would best be described as:

a shared service mall

strategy.

direct marketing from a

manufacturer.

a brick-and-mortar

strategy. a click-and-mortar

strategy.

34-In direct marketing:

customers are contacted directly

without the help of

intermediaries.

shipments are made

directly from the seller to

the customer.

sales are

made in

malls only.

electronic

distributors must

be used.

35-An online seller of travel services that generates revenue by charging fees for its services

is an example of a(n):

market maker. transaction broker. viral marketer. content disseminator.

36-A marketer that uses e-mail to advertise to potential customers is called a:

viral marketer. transaction broker. content disseminator. market maker.

37-A company that creates and manages many-to-many markets is called a:

transaction broker. content disseminator. market maker. viral marketer.

38-In an e-market, Federal Express is an example of a(n):

viral marketer. content disseminator. service provider. intermediary.

Page 23: Test Bank

39-All of the following are potential sources of revenue for online independent travel agents

EXCEPT:

direct marketing revenues. advertising fees. transaction fees. subscription fees.

40-Which of the following is true of virtual banks?

Stringent regulations

have eliminated fraud

risk in virtual banks.

Virtual banks have

proven very successful

and profitable.

Virtual banks combine

online and traditional

branch banking services.

Virtual banks

have no physical

location.

41-________ are customers who are willing to shop online because they dislike going to

grocery stores.

Time-starved customers New technologists Shopping avoiders Leading edgers

42-________ are extremely busy customers willing to shop online in order to free up time.

Time-starved customers Leading edgers New technologists Shopping avoiders

43-________ are those who are young and comfortable with technology.

Shopping avoiders Leading edgers New technologists Time-starved customers

44-All of the following are examples of interactive entertainment EXCEPT:

adult sites purchasing theatre tickets online. Internet gaming. fantasy sports games.

45-________ are gateways to storefronts and e-malls.

Shopping portals Shopping browsers Intelligent search engines Shopbots

46-Software tools that scout the Web for stores that sell similar items at low prices are

called:

Shopbots. Intelligent search engines. Shopping portals. Shopping browsers.

Page 24: Test Bank

47-________ are sites that evaluate and verify the trustworthiness of e-tailers

Shopping portals Trust verification sites Business rating sites. Shopbot sites

48-The TRUSTe seal is an example of:

a business rating. a B2B exchange. an intermediary. a trustmark.

49-Charles wants to buy a John Lennon lithograph over the Internet, but he is unwilling to

pay for it until he inspects it to ascertain authenticity. The auction site through which he

purchases the painting agrees to hold his money until he tells them to release it to the seller.

This is an example of:

an escrow service. a warranty. a trustmark. a verification.

50-A software agent that surveys user's reading interests, then uses machine learning to

find new Web pages and news articles using neural-network-based collaborative filtering

technology is called:

an aggregator portal. a real-time agent. a learning agent. the sponsorship model.

51-A traditional brick-and-mortar store with a mature Web site uses a click-and-mortar

strategy to do all of the following EXCEPT:

speak with one

voice.

leverage each channel's advantages

for all customers.

empower

customers. reduce refunds and

exchanges.

52-The original click-and-mortar strategy used by Toys R Us failed, as did the original toy

venture of Amazon.com. Afterwards, Toys R Us sold toys online through Amazon.com.

This is an example of:

disintermediation. an alliance of a pure-player with a

traditional retailer. reintermediation.

channel

conflict.

53-DeFreshFish has been in business for ten years selling custom fishing lures to local

fishermen through its store in a shopping mall. The company's owners are considering

opening a Web site and selling their products internationally. One new risk they will face in

going from a brick-and-mortar strategy to a click-and-mortar strategy is:

Page 25: Test Bank

the risk associated with

trying to comply with

conflicting rules and

regulations in many different

locales.

the risk that

costs will

erode their

profit margin.

the risk that their

products will not

meet the needs of

their target market.

the risks associated with

shifting their cost structure

from mostly fixed costs to

mostly variable costs.

54-The single factor that will determine which intermediaries continue to exist and which

are replaced is:

the length of the

relationship between the

intermediary and its

customers

the ability of the

intermediary to match

up buyers and sellers

the profitability

of the

intermediary

the addition of value-

added services by the

intermediary

55-An e-tailer uses cookies to identify returning customers and to provide suggested

products for purchase based on prior shopping behavior. This is an example of:

advertising supported model. channel cooperation. personalization. on-demand delivery.

Chapter 4 Consumer Behavior

1-Netflix implemented intelligent agents in its movie recommendation service called

Cinematch to help customers select movies they would like to watch and to better manage

its inventory.

True False

2-Finding and retaining customers is a major critical success factor for most offline and

online businesses.

True False

3-One of the keys to building effective customer relationships is an understanding of

intelligent agents.

True False

Page 26: Test Bank

4-The purpose of a consumer behavior model is to help firms understand how a consumer

makes a purchasing decision to be able to influence that decision through advertising,

special promotions, or other marketing method.

True False

5-Individual buyers do most of the actual shopping in cyberspace in terms of dollar volume

of sales.

True False

6-Purchases by governments, private corporations, resellers, and other organizational

buyers often are used to create other products or services by adding value to them.

True False

7-Personal characteristics of customers, such as age and income, are independent variables,

which are uncontrollable variables for EC companies.

True False

8-Customers rarely browse online stores if they do not intend to buy.

True False

9-According to Internet statistics, 67 percent of consumers abandoned their shopping carts

because of the lack of satisfactory product information.

True False

10-The two most cited reasons for abandoning a shopping cart and not making the

purchase are shipping charges and security concerns.

True False

11-Social factors such as customer endorsement strategies and word-of-mouth are

independent variables that play an important role in EC shopping and purchases.

Page 27: Test Bank

True False

12-Prices, advertising, promotions, and logistics are intervening variables that can be

controlled by vendors.

True False

13-Buying decisions are the dependent variables because these decisions depend on the

independent and intervening variables.

True False

14-An objective of conducting market research is to understand the relationships between

dependent and intervening variables so that vendors can make informed decisions on the

intervening variables.

True False

15-In the consumer decision-making process, the buyer is the person who ultimately makes

the buying decision.

True False

16-When Chaplin's auto lease is about to expire, he decides it is time to buy a new car. This

imbalance between a desired state and an actual state is called need identification.

True False

17-In the decision-making process, virtual catalogs and links to external sources support

the evaluation and selection phase of that process.

True False

18-Mass marketing is an approach to marketing that treats each customer in a unique way

such as fitting advertising to the customer's profile and needs.

True False

Page 28: Test Bank

19-Selling as many products as possible to one customer over a long period of time and

across different product lines to maximize customer value is known as relationship

marketing.

True False

20-Segmentation refers to the matching of services, products, and advertising content to

individuals and their preferences.

True False

21-A user profile defines customer preferences, behaviors, and demographic traits of a

particular customer.

True False

22-A cookie is a data file that is placed on a user's hard drive by a remote Web server only

when the user's gives full consent to collect information about the user's activities at a site.

True False

23-Attracting and retaining loyal customers is the most important issue for e-tailers

because customer loyalty can lower marketing and advertising costs, transaction costs,

customer turnover expenses, and failure costs such as warranty claims.

True False

24-Building consumer trust in EC can be achieved through integrity, which is a user's

confidence in the ability of the online store to fulfill its promises such as a money-back

guarantee.

True False

25-Clickstream data provide a trail of a user's activities in a Web site including a record of

the user's browsing patterns of every page of every Web site the user visits, how long the

Page 29: Test Bank

user remained on a page, and even the e-mail addresses of mail that the user sends and

receives.

True False

26-According to the EC consumer behavior model, personal characteristics and

environmental characteristics are classified as:

intervening variables dependent variables decision variables independent variables

27-The major environmental variables influencing EC purchasing are:

age, gender,

ethnicity, education,

and lifestyle.

price, social,

cultural, ethnicity,

and lifestyle.

social, cultural,

community, regulatory,

political, and legal.

price, brand, frequency

of purchase, and

tangibility.

28-Pricing, technical support, and logistics support are several of the ________ that can be

controlled by EC vendors and sellers

independent variables decision variables intervening variables dependent variables

29-Because online buyer's decisions depend on numerous independent and intervening

variables, decisions made by customers are classified as:

intervening variables independent variables dependent variables decision variables

30-Banner advertising on Web sites helps trigger a realization that there is a gap between

reality and a desired state, which occurs in the ________ stage of the EC purchase decision-

making process.

information

search

evaluation, negotiation, and

selection need

identification

purchase, payment, and

deli

31-Marketing and advertising approaches has evolved from mass marketing to market

segmentation to one-to-one marketing. This evolution occurred because:

the marketing

focus shifted from

concerns about

privacy had

companies sought to

decrease the number the Internet enabled companies to

better communicate with

Page 30: Test Bank

customers to

products.

diminished. of marketing

campaigns. customers and understand their

needs and buying habits.

32-The core of the "new marketing model" consists of:

customer

relationships.

online marketing

channels.

four P's–product, place, price, and

promotion.

customer

profiles.

33-Personalization and user profiling strategies include each of the following EXCEPT:

Segmenting the

market based on

demographics.

Building from

previous

purchases or

purchase patterns.

Using questionnaires to

collect information

directly from the user.

Placing cookies on a user's

hard drive to collect

information with or without

the user's knowledge.

34-The two key factors limiting the use of personalization to more precisely target

marketing efforts to individual customers are:

lack of customer loyalty

and service customization

costs.

communication costs

and filtering costs. privacy and

trust issues.

matching profiles with

product offerings and

delivering those offerings.

35-By increasing customer loyalty, EC companies can achieve each of the following benefits

EXCEPT:

lower warranty

claims costs. lower resistance to

competitors.

lower transaction

costs.

lower marketing and

advertising costs.

36-What has been the impact of the introduction of EC on customer loyalty in general?

Loyalty has decreased

because of customers'

ability to shop, compare,

and shift vendors.

There has been little

change in loyalty

because the impacts

have cancelled each

other out.

It is not known

whether loyalty has

increased or

decreased.

Loyalty has increased

because of targeted

relationship

marketing.

37-According to research, customer satisfaction with an Internet store:

Page 31: Test Bank

is higher for new

customers than

former customers.

depend on two types of

factors: information

quality and customer

service quality.

drops dramatically when certain

Web site features fail to perform

properly, such as the content's

reliability, loading speed, or

usefulness.

cannot be

predicted.

38-Issues related to trust in EC include all of the following EXCEPT:

Trust is particularly

important in global

EC transactions due

to the difficulty of

taking legal action

in cases of a dispute

or fraud.

If people do not trust

the security of the EC

infrastructure, they

will not feel

comfortable about

using credit cards to

make EC purchases.

As a result of trust-

transference programs

through portal affiliation,

seal of approval programs,

online shopping

communities, and customer

endorsements, customers are

fully confident in online

purchasing transactions.

When parties trust

each other, they have

confidence that

transaction partners

will keep their

promises. However,

both parties in the

transaction assume

some risk.

39-Procter & Gamble (P&G) used the Internet in the new product development of

Whitestrips, a teeth-brightening product. Based on this experience, P&G:

could not

determine the

target market

segments for the

Whitestrips.

reduced the time-to-

market from concept to

market launch by

approximately two

years.

decided to add

Internet research

to its traditional

marketing test

model.

learned that the cost of online

surveys were about the same as

similarly sized telephone

surveys, but online surveys

expedited research

considerably,

40-All of the following are correct about market research methods EXCEPT:

It is important first to

understand how

groups of consumers

are classified or

segmented.

Markets can be segmented to

increase the percentage of

responses and to formulate

effective marketing strategies

that appeal to specific

consumer groups.

Market segmentation is

done with the aid of

tools such as data

modeling and data

warehousing.

Direct mail

marketing

methods are

usually cost-

effective.

41-Social class, lifestyle, personality, and activities are descriptors used in ________ market

segmentation.

geographic demographic cognitive, affective, behavioral psychographic

Page 32: Test Bank

42-To avoid getting false information from participants of online surveys, marketers learn

about customers by observing their behavior using each of the following EXCEPT:

Transaction logs that

record user activities at

a company's Web site.

Spyware that gathers user

information through an Internet

connection without the user's

knowledge.

Data mining to

analyze

clickstream data.

Cookies that allow

a Web site to store

data on the user's

PC.

43-According to Inmon, B2C clickstream data can reveal information each of the following

EXCEPT:

Which ads and

promotions were

effective and which

were not.

What goods the

customer wanted to

but could not find.

Whether there are too

many products for the

customer to wade

through.

What goods the

customer examined

but did not purchase.

44-Web analytics and mining tools and services:

simply report

which pages

were clicked and

how long a

visitor stayed

there.

provide most

companies with

knowledge about how

to use clickstream data

effectively.

offer advanced functions that help

marketers decide which products to

promote, and merchandisers

achieve a better understanding of

the nature of demand.

are used to

redesign Web

sites quickly

and on the fly.

45-Once a company knows a consumer's preferences, the company can predict, without

asking the consumer directly, what other products or services that consumer might enjoy

through ________.

active web bugs collaborative filtering spyware personalization

46-Limitations of online research methods are all of the following EXCEPT:

E-mail surveys have

the lowest response

rate.

The ethics and

legality of Web

tracking.

Loss of respondents

because of equipment

problems.

Focus group responses

lose eye contact and body

language.

Page 33: Test Bank

47-Online methods of bringing new customers to a B2B site when a B2B vendor wants to

grow by adding new customers or products include all of the following EXCEPT:

by contacting all of its targeted

customers individually to attract

them to an electronic exchange.

through an

affiliation

service.

through direct

mail campaigns

through Web advertising

such as using an ad server

network provider.

48-The Internet introduced the concept of ________, which has enabled marketers and

advertisers to interact or communicate directly with customers and consumers can interact

with marketers/advertisers.

one-to-one marketing direct marketing advertising channel interactive marketing

49-The term ________ refers to the number of times users call up a page that has a banner

on it during a specific period.

click through ad view unique visit conversion rate

50-The major disadvantage of banners is ________.

their

cost

the limited amount of time

the banner is present to the

visitor

the limited amount of

information can be placed on

the banner

viewers have become

immune to banners and

seldom notice them

51-A(n) ________ is a type of pop-up ad that appears after a user clicks a link and remains

while content is loading to capture the user's attention for a short time, either as a

promotion or a lead-in to the site's homepage or to advertise a product or a service.

keyword banner interstitial banner exchange CPM

52-The risks of e-mail advertising management include all of the following EXCEPT:

spam fraud e-mail hoaxes measuring e-mail advertising effectiveness

53-A(n) ________ is an HTML coding statement that describes the content of a Web page

and is used by search engines to index the site's content so that it can be found.

meta-tag domainer advertorial associated ad display

Page 34: Test Bank

54-Advertising in chat rooms, blogs, or social networks can achieve each of the following

EXCEPT:

They improve a

company's search

engine ranking.

Advertising can

become more thematic

than on static Web

sites.

Advertising can be

easily targeted to

customer interests.

They can be used as one-to-

one connections between a

company and its customers.

55-________ is an advertising strategy that uses word-of-mouth marketing in which

customers promote a product or service by telling others about it.

Affiliate marketing Viral marketing Ad customizing Ads as a commodity

Chapter 5 B2B E-Commerce

1-General Motors' B2B initiatives successfully enable the auto giant to reduce inventory

cost, minimize operational problems, and shorten procurement processes.

True False

2-Business-to-business e-commerce is also known B2B and refers to transactions between

businesses conducted electronically over the Internet, extranets, intranets, or private

networks.

True False

3-The major characteristic of B2B commerce is that companies attempt to electronically

automate trading, communication, and collaboration processes in order to improve them,

which cannot be done without the Internet.

True False

4-Supply chain improvements and collaborative commerce are a basic type of B2B which has

a hub manager for supply chain improvements, communicating, collaborating, and

information sharing.

Page 35: Test Bank

True False

5-B2B EC transactions that involve one seller selling to many buyers is called an exchange.

True False

6-Since business-to-consumer (B2C) transactions are segments in the supply chain, they

should be examined in light of other supply chain activities such as manufacturing,

procurement, shipments, and logistics.

True False

7-Supply chain activities usually involve communication and collaboration.

True False

8-With B2B2C, a business sells to a business, but also delivers small quantities to customers

of the buying business.

True False

9-Intermediaries in B2B commerce, which may be virtual or click-and-mortar

intermediaries, are third parties that broker transactions between buyers and sellers.

True False

10-The purchase of goods and services as they are needed, usually the purchase of

commodities at prevailing market prices, is referred to as demand buying.

True False

11-Examples of direct materials for a food processing company are computers and

communication devices.

True False

Page 36: Test Bank

12-MRO stands for "maintenance, repair, and operation" which refer to indirect or

nonproduction materials that support the production process.

True False

13-Markets that focus on providing materials or products that are used in various types of

industries are known as horizontal marketplaces.

True False

14-Purchases of goods or services that are based on short-term contracts and frequently

purchased in large quantities are known as strategic sourcing.

True False

15-Joining a public e-marketplace provides a business with greater buying and selling

capabilities, but the tradeoff is lower supply chain power.

True False

16-B2B can increase the efficiency and effectiveness of supply chains or dramatically

change the supply chain by eliminating one or more intermediaries.

True False

17-Companies that choose an intermediary to do their buying and selling will have high

supply chain power and buying/selling capabilities.

True False

18-Transaction fees for B2B financial services are higher than for most other methods.

True False

19-Companies will often separate B2C orders from B2B orders because those types of

orders have different order-fulfillment processes and different pricing models.

Page 37: Test Bank

True False

20-By using the Internet and automatic-response software agents for customer service,

companies have been able to reduce their customer service costs by up to fifty percent.

True False

21-Forward auctions expand online sales and offer businesses a new venue for quickly and

easily disposing of excess, obsolete, and returned products.

True False

22-Strategic sourcing requires a holistic process that automates the entire sourcing process,

including order planning, RFQ creation, bid evaluation, negotiation, settlement, and order

execution.

True False

23-A large organizations can develop an effective procurement system by creating an

internal marketplace that combines the catalogs of all its approved suppliers into a single

internal electronic catalog, which is searched for product availability and delivery times.

True False

24-With a bartering exchange, a company submits its surplus to the exchange and receives

points of credit, which the company can then use to buy items that it needs.

True False

25-In the real world, negotiations are done primarily electronically and with negotiation

support tools.

True False

26-Key business drivers for B2B are all of the following EXCEPT:

the availability of a numerous private and the need for the willingness of

Page 38: Test Bank

secure broadband

Internet platform.

public B2B e-

marketplaces.

collaborations between

suppliers and buyers. companies to incur higher

costs to improve

collaboration.

27-B2B transactions that involve communication, design, planning, information sharing,

and activites beyond financial transactions among business partners is referred to as

________.

public marketplaces trading communities exchanges collaborative commerce

28-With ________, a business sells to a business but delivers small quantities to customers

of the buying business.

B2B2C B2B B2C B2C2B

29-A(n) ________ is an online third party that brokers B2B transactions between a buyer

and seller.

vertical marketplace horizontal marketplace intermediary strategic source

30-The purchase of goods and services as they are needed, usually at prevailing market

prices is referred to as:

direct materials spot buying consolidation strategic sourcing

31-Purchases of goods and services based on long-term contracts is referred to as:

direct materials spot buying consolidation strategic sourcing

32-________ can be supported more effectively and efficiently through direct buyer—seller

offline or online negotiations, which can be done in private exchanges or private trading

rooms in public exchanges.

Strategic purchases B2C commerce MRO Spot buying

33-What are the two types of materials and supplies that are traded in B2B?

Page 39: Test Bank

Direct and

indirect.

Horizontal and

vertical.

Digital and

physical.

Commodities and

nonproduction.

34-Nonproduction materials such as equipment and tools that support production are

called:

operational materials direct materials virtual materials indirect materials

35-Indirect materials are typically used in ________ activities.

intermediary maintenance, repair, and operation (MRO) sales and marketing supply chain

36-The ________ consists of a number of interrelated subprocesses that extend from the

acquisition of materials from suppliers to packaging it and moving it to distributors and

retailers.

vertical market horizontal market production chain supply chain

37-Companies that use an intermediary to do their buying and selling tend to be:

low on supply chain

power and low on

buying/selling

capabilities

high on supply chain

power and high on

buying/selling

capabilities

low on supply chain

power and high on

buying/selling

capabilities

high on supply chain

power and low on

buying/selling

capabilities

38-The major B2B services include each of the following EXCEPT:

Financial Travel and hospitality Stock trading Retail

39-Which of the following is not one of the major benefits of B2B?

Expedites

processing and

reduces cycle time.

Increases production

flexibility, permitting

just-in-time delivery.

Increases

opportunities for

collaboration.

Enables customized online

catalogs with the same

prices for different

customers.

40-________ occurs when B2B eliminates a distributor or a retailer.

Page 40: Test Bank

Disintermediation Collaboration Just-in-time delivery Purging

41-In a sell-side e-marketplace, a business sells products and services to business customers,

frequently over ________.

an exchange an intranet a web service an extranet.

42-Companies will usually separate B2C orders from B2B orders because B2C and B2B

orders have different ________.

marketing

processes

accounting

processes order-fulfillment processes and

different pricing models

buying and delivery

processes

43-By using the Internet and automatic-response software agents, GE reduced the cost of

customer service calls from $5.00 per call when done by phone to ________ per

electronically answered call.

$1.00 $0.50 $2.50 $0.20

44-Some of the benefits of a(n) ________ are that distributors can check inventory, make

transactions, and look up the status of their orders significantly reducing the number of

phone calls, e-mails, and incorrect product shipments.

electronic data

interchange

custom

catalog extranet-based order-entry

tool

intranet-based order-entry

tool

45-In selling directly, manufacturers may encounter a similar problem to that of B2C,

namely ________ with the regular distributors, including corporate dealers.

multichannel distribution direct sales conflict channel conflict indirect competition

46-One of the major problems facing direct sellers is ________.

how to manage the supply

chain how to find

buyers

how to find

suppliers

how to advertise in traditional

channels

Page 41: Test Bank

47-The Cisco Connection Online (CCO) Web site receives over 2 million hits per month for

technical assistance, ordering, order checking, or software downloads. This online service

had been so well received that nearly ________ percent of all customer service inquiries

and ________ percent of software updates are delivered online.

15 / 25 45 / 55 25 / 35 85 / 95

48-Companies use ________ to sell their unneeded assets for quick disposal or to easily

dispose of excess, obsolete, and returned products.

private auctions forward auctions reverse auctions liquidation

49-Benefits of using a third-party hosting company for conducting B2B auctions instead of

developing an auction site in-house include all of the following EXCEPT:

No redeployment of

corporate resources.

No additional resources are needed such as

hardware, bandwidth, engineering resources,

or IT personnel.

No

hiring

costs.

Time-to-market

of several

weeks.

50-A company-based acquisition site that uses e-procurement methods such as reverse

auctions, negotiations, or group purchasing, to overcome the manual searching of e-stores

and e-malls is referred to as a(n):

aggregated catalog buy-side e-marketplace intermediary desktop procurement method

51-Benefits of e-procurement over traditional procurement methods include all of the

following EXCEPT:

Streamlining

invoice

reconciliation and

dispute resolution.

Lowering purchase prices

through product standardization,

reverse auctions, volume

discounts, and consolidation of

purchases.

Increasing the

productivity of

purchasing

agents.

Increasing the skill

requirements and

training needs of

purchasing agents.

52-Major implementation challenges that companies must consider when planning e-

procurement initiatives include all of the following EXCEPT:

Increasing the number of

regular suppliers and

Providing interfaces between

e-procurement and integrated

Reviewing and

changing the

Coordinating the

buyer's information

Page 42: Test Bank

integrating with their

information systems and

possibly with their

business processes.

enterprisewide information

systems, such as ERP or

supply chain management.

procurement

process itself.

system with that of

the sellers.

53-Because conducting reverse auctions in B2B can be a fairly complex process, a(n)

________ may be essential.

open RFQ online directory third-party intermediary software agent

54-The aggregation of suppliers' catalogs on the buyer's server to make it easier to

centralize and control all procurement is called a(n):

bartering

exchange

sell-side e-

marketplace

buy-side e-

marketplace internal procurement

marketplace

55-In general, the benefits of contract-management software include all of the following

EXCEPT:

Reduces

contract-related

risks.

Reduces contract

negotiation time and

efforts.

Provides more

efficient approval

processes.

Enables standardization of

contracts throughout the

enterprise.

Chapter 6 Public B2B Exchanges

1-Public exchanges are many-to-many marketplaces that are open to all interested sellers

and buyers and usually run by third parties.

True False

2-One major characteristic of all exchanges is that they are electronic trading-community

meeting places for a single seller and many buyers, and possibly for other business partners.

True False

3-In electronic exchanges and traditional open-air marketplace, buyers and sellers can

interact and negotiate prices and quantities.

Page 43: Test Bank

True False

4-Dynamic pricing refers to the rapid movement of prices over time and possibly across

customers as a result of supply and demand matching, as in auctions.

True False

5-MSN or Yahoo! are types of exchanges that generate revenue through membership fees.

True False

6-Thomas Register is basically a directory for buyers using search engines because it does

not offer any opportunity for trade or transactions on its site.

True False

7-Alibaba China is China's largest online marketplace for both domestic and international

trade among businesspeople and a trusted community of members who regularly meet,

chat, search for products, and do business online.

True False

8-To increase their financial viability, third-party exchanges try to partner with large

sellers or buyers, financial institutions that provide payment schemes, or logistics

companies to cut costs or increase market liquidity.

True False

9-Market liquidity refers to the degree to which a product or service can be bought or sold

in a marketplace without significantly affecting its price.

True False

10-Agentrics is the world's largest B2C exchange for retailers, such as Sears and Best Buy,

whose objective is to simplify and automate supply chain processes.

True False

Page 44: Test Bank

11-Two major models of third-party exchanges are supplier aggregation and buyer

aggregation.

True False

12-For all types of e-marketplaces, the most important key to the success of any third-party

exchange is the critical mass of buyers and sellers.

True False

13-A consortium trading exchange (CTE) or consortia is most appropriate for fragmented

markets with large numbers of both buyers and sellers.

True False

14-The Global Transportation Network (GTN) provides participating carriers and

customers with significant cost savings because it frees individual carriers from the huge

capital costs of advanced technologies.

True False

15-Purchasing-oriented (procurement) consortia have not yet been a successful or popular

B2B consortium model.

True False

16-Because of their large number of buyers and sellers, B2B exchanges and other e-

marketplaces do not face anti-trust or other competition laws.

True False

17-A B2B consortium has the potential to reduce prices of individual products, thus

enabling and encouraging consortium members to buy more.

True False

Page 45: Test Bank

18-Dynamic trading is trading that occurs in situations in which prices are determined by

supply and demand, therefore changing continuously.

True False

19-The strategy of providing comprehensive, quality e-service for business partners is

called customer relationship management (CRM).

True False

20-Because of the complexity in building large e-marketplaces and exchanges, it is usually

performed by a major B2B software company, such as Ariba or IBM, and a management

consulting company, such as PricewaterhouseCoopers, usually participates.

True False

21-Company-centered networks may be a waste of money because they are used by only

one buyer (buyer's industrial network) or by only one seller (seller's industrial network),

and they may not be open to all.

True False

22-Most exchanges have the same log-on procedures, same sets of rules for fulfilling

orders,and similar business models for charging for their services.

True False

23-Public exchanges have difficulty attracting buyers and sellers because of the transaction

fees, reluctance to share information, and the availability of too many exchanges.

True False

24-In B2B exchanges, software agents can facilitate management of multiple trading

partners and their transactions across multiple virtual industry exchanges.

True False

Page 46: Test Bank

25-Good management and effective operations and rules are critical to the success of B2B

exchanges because good governance provides the rules for the exchange, minimizes

conflicts, supports decision making, and tries to induce the necessary liquidity.

True False

26-Before the Internet, the trading process for raw and partially processed chemicals,

plastics, and fuel oil was each of the following EXCEPT:

disintermediated fragmented slow expensive

27-ChemConnect is an example of a successful e-exchange with:

many buyers and one

seller.

few buyers and few

sellers.

many buyers and few

sellers. many buyers and many

sellers.

28-A third party that operates an exchange and in many cases, also owns the exchange is

known as a(n):

intermediary negotiator agent market maker

29-In the context of EC, ________ are electronic trading-community meeting places for

many sellers and many buyers, and possibly for other business partners.

B2C portals social networks exchanges

30-From 2001 to 2006, a majority of e-exchanges:

increased in size due to

mergers of small e-

exchanges.

devised new methods to

increase revenues and

profits.

folded due to a lack of

customers, cash, or

both.

expanded by

adding business

partners.

31-An exchange whose members are in one industry or industry segment and that trades

only in materials/services unique for that industry is referred to as a(n):

lateral exchange horizontal exchange vertical exchange commodity exchange

Page 47: Test Bank

32-An exchange that handles materials used by companies in different industries is

referred to as a(n):.

lateral exchange vertical exchange horizontal exchange commodity exchange

33-Light bulbs and office supplies might be purchased in a(n) ________ by both an

automaker and a steelmaker.

commodity exchange vertical exchange lateral exchange horizontal exchange

34-In ________, the prices are usually dynamic and are based on changes in supply and

demand.

vertical sourcing spot sourcing horizontal sourcing strategic sourcing

35-In ________, the prices are usually negotiated or fixed.

spot sourcing horizontal sourcing strategic sourcing vertical sourcing

36-Spot sourcing of direct materials takes place:

in vertical

exchanges.

in horizontal

exchanges.

only in virtual

exchanges.

on exchanges which operate without

a market maker.

37-In spot-sourcing, prices are:

dynamic and set based on

supply and demand.

based solely on the cost

structure of the seller.

fixed and set by

contract

set by the

market maker

38-In an exchange where plastic components are bought and sold, the market maker

collects money from the buyer, and releases it to the seller once successful delivery is

completed. This is an example of:

maintaining exchange

policies.

maintaining exchange

infrastructure.

matching buyers and

sellers. transaction

facilitation.

Page 48: Test Bank

39-In an exchange where plastic components are bought and sold, the market maker

purchases a new server that will be used to conduct auctions. This is an example of:

transaction

facilitation.

matching buyers and

sellers. maintaining exchange

infrastructure.

maintaining exchange

policies.

40-A market maker evaluates an exchange between a buyer in the United States and a

seller in Spain to ensure that import laws for the U.S. are followed. This is an example of

the market maker:

matching buyers

and sellers.

transaction

facilitation. maintaining exchange policies

and infrastructure.

interfering with

exchange policies.

41-In the consortia model:

a dominant player in the

industry establishes the

exchange and invites

others to join.

several industry players

come together to

establish the exchange

for the benefit of all.

a neutral third party

establishes and

manages the

exchange.

the public is invited

to join the exchange

as a way to offset

expenses

42-The exchange model in which a third party sets up the exchange and promises to run it

efficiently and without bias is called the:

industry giant model. co-op model. neutral entrepreneur model. consortia model.

43-An exchange charges an annual fee of $25,000 for all parties who want to trade in the

exchange. The revenue model in use by this exchange is the:

transaction fee model. membership fee model. advertising fee model. fee for service model.

44-A market maker charges a percentage on every buy and sell made in the exchange. The

revenue model in place in this exchange is the:

advertising fee model. fee for service model. transaction fee model. membership fee model.

45-A market maker bills a buyer for reviewing several seller contracts and making a

recommendation on what to buy and from whom. The revenue model being used in this

example is the:

Page 49: Test Bank

membership fee model. advertising fee model. fee for service model. transaction fee model.

46-All of the following are potential sources of revenue for an exchange EXCEPT:

advertising fees. membership fees. fees for services rendered. shipping and handling fees.

47-When membership fees are the basis for revenue generation in an e-exchange, it has

been shown that:

low membership fees often

result in losses to the

exchange,; however, high

fees discourage

participation.

when fees are very low,

the exchange sees

greater utilization which

leads to greater revenue

and profit.

the higher the

fees charged,

the greater the

total profit.

there should be a fee

for every service

provided; there should

be no free services for

members.

48-The concept of liquidity for a B2B exchange is the:

ease with which orders can be

placed, processed, and shipped

using the exchange.

number of buyers

and sellers in a

market.

ease with which

information flows between

exchange members.

amount of

available cash

on hand.

49-The exchange model in which RFQs are aggregated then linked to a pool of suppliers

who are notified automatically of the RFQ is the ________ model.

reverse auction buyer aggregation supplier aggregation seller aggregation

50-Markets in which several large sellers sell to a large number of buyers are called:

differentiated

markets. seller-concentrated

markets.

fragmented

markets.

buyer-concentrated

markets.

51-Attracting large business sellers to public exchanges is often difficult for all of the

following reasons EXCEPT:

competitors who are also

exchange member may

gain access to confidential

information.

advertising costs in

public exchanges

are very expensive.

it is sometimes

difficult to recruit

large suppliers.

they are required to pay

transaction fees even when

they engage in transactions

with existing customers.

Page 50: Test Bank

52-In dealing with exchange members, the management of the exchange should:

leave the management of

day-to-day operations of

the exchange to the

members.

strive to maximize

exchange revenues

through charging the

highest possible fees.

take special care of

the companies that

share ownership in

the exchange.

make certain that the

exchange is neutral in

its dealings with all

members.

53-The most attractive industries for a vertical exchange are characterized by:

a few very large

players that totally

dominate the industry.

stagnant

technology. many fragmented

buyers and sellers.

a market in which a small number of

very large orders account for more

than half the total market volume per

year.

54-Brand building is important in B2B exchanges because:

information flow is poor in

most exchanges, making

trust of suppliers very

important.

it is easy for

exchange members

to change to another

exchange.

exchange members

typically buy only

the best brands of

product.

exchange members

typically buy products

at the lowest cost

unless branded.

55-Using tunneling technology to improve security of communication over the Internet is

called:

local area network

(LAN)

Internet protocol

(IP)

electronic data interchange

(EDI). virtual private network

(VPN).

Chapter 7 E-Supply Chains

1-Although a company's success is clearly dependent on finding and retaining customers,

its success may be far more dependent on what is behind the Web page than on what is on

the Web page.

True False

Page 51: Test Bank

2-It has been well known for generations that the success of many private, public, and

military organizations depends on their ability to manage the flows of materials,

information, and money, which is referred to as the product life cycle.

True False

3-Supply chain problems can cause delays, products not being where they are required at

the right time, customer dissatisfaction, lost sales, and high expenses that result from fixing

the problems once they occur.

True False

4-The term supply chain comes from the concept of how systems and processes within an

organization are linked together.

True False

5-A supply chain involves activities that take place during the entire product life cycle,

"from dirt to dust."

True False

6-A supply chain can be broken into three major parts: upstream, internal, and

downstream.

True False

7-The downstream part of the supply chain includes the activities of a company with its

suppliers, which can be manufacturers, assemblers, or both, or service providers, and their

connections with their suppliers.

True False

8-In the internal part of the supply chain, the major concerns are production management,

manufacturing, and inventory control.

True False

Page 52: Test Bank

9-In the upstream supply chain, attention is directed at distribution, warehousing,

transportation, and after-sale service.

True False

10-SCM aims to minimize inventory levels, optimize production and increase throughput,

decrease manufacturing time, optimize logistics and distribution, streamline order

fulfillment, and overall reduce the costs associated with these activities.

True False

11-A major requirement for any medium- to large-scale company that is moving to EC

implies an integration between all the activities conducted on the Web and the

ERP/MRP/SCM solutions–in other words, creating an e-supply chain and managing it.

True False

12-E-supply chain management is the collaborative use of technology to enhance B2C

processes and improve speed, agility, real-time control, and customer satisfaction.

True False

13-The success of an e-supply chain depends on managing information with strict policies,

discipline, and daily monitoring.

True False

14-The success of an e-supply chain depends on an e-supply chain that is loosely integrated

both within a company and across an extended enterprise made up of suppliers, trading

partners, logistics providers, and the distribution channel.

True False

15-Companies can use replenishment information to reduce inventories and eliminate

stocking points.

True False

Page 53: Test Bank

16-By combining bar coding and wireless technologies, automobile dealers are able to scan

in goods as they arrive electronically and place them in inventory up to 10 percent faster

than previously.

True False

17-At hospitals and supermarkets, inventory reorder points have been automated so that

when inventory gets down to a certain point the system will automatically notify a human

of the exact amount to reorder.

True False

18-Functional products are staple products, such as groceries or gasoline, that have stable

and predictable demand. For these products, an effective supply chain emphasizes speed,

responsiveness, and flexibility rather than low costs.

True False

19-Pure EC companies may be likely to have more supply chain problems because they

may not have a logistics infrastructure and may be forced to use external logistics services.

True False

20-A major limitation of RFID currently is the restriction of the environments in which

RFID tags are easily read.

True False

21-RuBee relies on low-frequency magnetic waves to track products and transfer

information. It is becoming a replacement for RFID because RuBee overcomes many of

RFID's limitations.

True False

22-With vendor-managed inventory, retailers make their suppliers responsible for

determining when to order and how much to order. The retailer provides the supplier with

real-time information such as point-of-sale data, inventory levels, and a threshold below

which orders are replenished.

Page 54: Test Bank

True False

23-The goal of collaborative planning, forecasting, and replenishment (CPFR) is to

streamline product flow from manufacturing plants to retailers.

True False

24-Studies have shown that electronic-based collaboration and product lifecycle

management (PLM) can reduce product costs and travel expenses by 50 percent, as well as

significantly reduce costs associated with product-change management.

True False

25-As with any IT project, management needs to be able to justify the development and use

of a corporate portal by comparing its cost with its benefits. The challenge is that despite

the tangible benefits from investment in portal technology, such as include increased

revenues and customer loyalty, most of the benefits of portals are intangible.

True False

26-A company's internal operations and its relationships with suppliers and other business

partners are frequently:

replaced by

customer-facing

applications.

much more complex than

customer-facing

applications such as

taking an order online.

much less complex than

customer-facing

applications such as

taking an order online.

as complex as

customer-facing

applications such as

taking an order online.

27-For a manufacturer, the supply chain ends:

when the customer

decides he/she is

satisfied with a product

when the supplier delivers raw

materials and component parts to

the manufacturer.

when the

customer buys

the product.

when the product

is used up and

disposed of.

28-The use of Web technologies to manage warehousing and transportation processes is

called:

collaborative planning e-replenishment. downstream processing e-logistics

Page 55: Test Bank

29-The e-SCM process that includes integrated production and distribution processes is:

collaborative planning e-logistics e-procurement supply chain replenishment.

30-The last fifteen orders from a manufacturer to its suppliers range from $100,000 to

$8,740,000. This is an example of:

supply inadequacy. demand manipulation. order instability. the bullwhip effect.

31-B2B systems which are used for communication, design, planning, information sharing,

and information discovery are called:

collaborative

commerce.

electronic data

systems.

information aggregation

systems.

electronic bartering

systems.

32-All of the following would be considered c-commerce EXCEPT:

connecting

suppliers.

communication and

collaboration with

suppliers.

aggregating catalogs

on a central server.

sharing on-demand training

courses across many locations

simultaneously.

33-RFID can provide immediate, short-term, and long-term value to organizations. An

example of immediate value from RFID is when:

an RFID tag tells

customer service

which factory made

the faulty product

returned by a

customer.

an RFID tag sends a

report to the supplier

every time one of its

component parts is used

in the manufacturing

process.

an RFID tag reveals the

supplier of a faulty

component without the

need for quality control

to research component

order records.

an RFID tag tells

inventory control

every time a roll of

wire moves out of the

warehouse and onto

the factory floor.

34-A major block in the widespread implementation of collaborative commerce is:

the theory of collaborative

commerce hasn't been proven

effective in real-world

applications.

the technology

needed isn't

available.

the lack of

universally

accepted

standards.

collaborative

commerce is

extremely expensive.

Page 56: Test Bank

35-Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the

flow of materials along the supply chain. This is an example of:

reducing design cycle time. CPFR. APS. reducing product development time.

36-The purpose of CPFR is to:

optimize the flow

of materials along

the supply chain.

minimize

quality

problems in

supplies.

eliminate

intermediaries.

ensure that members of the supply

chain will have the right amount of

raw materials and finished goods

when they need them.

37-________ is a business strategy that enables manufacturers to control and share

product-related data as part of product design and development efforts.

Product lifecycle

management

Advanced planning and

scheduling

Internal

commerce

Collaborative

planning

38-All of the following are true about product lifecycle management (PLM) EXCEPT:

The demand for PLM in

limited because it does

not apply to products

that have short life cycles

or are complex.

PLM tools are

offered by

SAP, Matrix

One, EDS, and

IBM.

PLM is a big step for an

organization because it

requires integrating

different processes and

systems.

PLM can have

significant beneficial

impacts in cycle time,

design reuse, and

engineering.

39-Today, many business experts agree with each of the following EXCEPT:

The supply chain needs

to be operationally

integrated so that

inventory activities link

seamlessly to

manufacturing

activities.

Supply chain

integration has

reduced the

intensity of

competition in

most industries.

The insightful way to

view contemporary

business is that

competition exists

between or among supply

chains rather then

individual companies.

Supply chains from the

suppliers' suppliers to

the customers' customers

should be jointly

planned and designed

for overall optimality by

all of the supply chain

partners.

Page 57: Test Bank

40-When planning, designing and implementing integrated supply chain operations,

management requires a holistic focus that takes account all of the following primary

factors EXCEPT:

location and

revenues.

culture, including performance

measurement, monitoring, and

incentives.

strategy, structure,

and people.

IT and business

processes.

41-Software that helps integrate different types of information systems among

collaborating companies is called:

browser technology. middleware. collaborative software. extranet technology.

42-Collaborative workflow applications:

have predefined

workflows, but can be

redefined quickly

when needed.

are business process

automation tools that

place system controls in

the hands of users.

address mission-

critical, transaction-

oriented, high volume

processes.

address project-

oriented and

collaborative

processes.

43-Software applications that address project management concerns are examples of:

administrative workflow

applications.

portal

applications. collaborations workflow

applications.

production workflow

applications.

44-Addressing mission-critical, high-volume transaction processes is the goal of:

collaborative workflow

applications. production workflow

applications.

administrative workflow

applications.

portal

applications.

45-The steps required to approve an expense report is an example of:

administrative workflow

applications.

production workflow

applications

collaborative workflow

applications.

portal

applications.

46-________ is the transfer of documents and computer files while videoconferencing.

Interactive whiteboarding CPFR Web conferencing Data conferencing

Page 58: Test Bank

47-The primary benefits of workflow management systems include all of the following

EXCEPT:

fewer chances for delay or

misplaced work.

less management

intervention. increased data

security.

cycle time

reduction.

48-When large suppliers or buyers are involved, a workflow system:

will fail because of

system

incompatibilities.

may be helpful for

supply chain

improvements.

is needed for

collaborative

efforts only.

is needed for both the

collaborative efforts and for

supply chain and production

improvements.

49-Groupware is appropriate in all of the following situations EXCEPT:

For groups to share

ideas and opinions.

For networked

environments. For people working on

different tasks or projects.

For people in the

same room.

50-________ means that the communication and collaboration are done in real time.

Bi-synchronous Asynchronous Synchronous Multi-Synchronous

51-All of the following are types of communication and collaboration done in real time

EXCEPT:

instant messaging blogging webinars VoIP

52-The growth in electronic meeting systems has been driven by all of the following

EXCEPT:

Acceptance of virtual meetings as

a respected way of doing

business.

Shorter

cycle times.

Improvements in

supporting technology.

Reductions in the price

of the technology.

53-The major benefit of group decision support systems is:

Page 59: Test Bank

in conducting

virtual meetings.

in passive listening while

information is distributed.

in faster decision making

with greater agreement.

in easier

decision

making.

54-Corporations are moving their phone systems to ________ to cut costs and boost

efficiency.

VoIP RTC video kiosks GDSS

55-All of the following apply to instant video EXCEPT:

The idea is for a kind of video

chat room that allows users to

chat in real time and see the

person(s) they are

communicating with.

It is the natural

result of wanting

to link people via

both voice and

audio.

The highest quality

approach is to add

video cameras to the

participants'

computers.

It evolved from the

spread of instant

messaging and

Internet telephony.

Chapter 8 Innovative EC Systems

1-Wikis are used for informal organizational training because it reduces the cost and time

of training.

True False

2-E-government applies only to the interaction of the government with its business

suppliers.

True False

3-The government-to-citizens (G2C) category includes all of the interactions between a

government and its citizens that can take place electronically.

True False

4-Two major areas of G2C activities are "tourism and recreation" and "research and

education."

Page 60: Test Bank

True False

5-Current voting technologies are being implemented in various countries because of the

security provided by these technologies.

True False

6-The Government Paperwork Elimination Act and the Memorandum on E-Government

ordered the top 500 forms used by citizens to be online by December 2000.

True False

7-The smart card system is part of a nationwide electronic benefits transfer system in the

U.S. for Social Security and welfare payments and other benefit payments.

True False

8-Social networks, such as MySpace, Facebook, and YouTube, are rarely used by political

candidates to reach voters because there are too few users of those networks who actually

vote.

True False

9-Forward auctions are buy-side auction systems used by the government to buy large

amounts of MROs and other materials directly from suppliers.

True False

10-Electronic filing of business taxes is available in over 100 countries, from Thailand to

Finland to the United States.

True False

11-The U.S. Navy's Lifelines system is an example of G2E EC.

True False

Page 61: Test Bank

12-The e-government transformation process from traditional delivery to full

implementation is a quick process.

True False

13-G2B is easier to implement than G2C.

True False

14-One of the most important issues in implementing e-government is its adoption and

usage by citizens.

True False

15-The topic of e-learning is gaining much attention, especially because world-class

universities such as MIT, Harvard, and Stanford in the United States and Oxford in the

United Kingdom are implementing it.

True False

16-At Cisco, e-learning helped reduce employee training time and costs by almost 25

percent.

True False

17-One disadvantage of e-learning is the lower content retention rate compared to

traditional in-person training.

True False

18-An important advantage of e-learning is that it can provide a fear-free and privacy-

protected environment in which students can put forth any idea without fear of looking

stupid.

True False

Page 62: Test Bank

19-A drawback of e-learning is that no online course can deliver real-time information and

knowledge in the way a "live" instructor can.

True False

20-Unlike educational institutions, only a small number of business organizations are using

e-learning on a large scale.

True False

21-The dynamic approach to publications personalizes content in real time and transmits it

on the fly in the format best suited to the user's location, tastes, and preferences. This

approach also is called just-in-time (JIT).

True False

22-One of the seven principles for building effective blogs is to think of a blog as a database

instead of a newspaper-like collection of posts.

True False

23-Senior executives and companies are using the blogosphere to build trust-based

relationships, polish corporate reputations, promote social causes, and accomplish other

professional goals.

True False

24-Knowledge portals are single-point-of-access software systems intended to external use

only provide easy and timely access to knowledge and to support communities of

knowledge workers who share common goals.

True False

25-P2P signifies a shift in peer-networking emphasis from hardware to applications

because easier configuration and control over applications enable even non—technical

people to join the user community.

True False

Page 63: Test Bank

26-________ are a popular online publishing technology for creating a Web page that can

be edited by anyone with a standard Web browser.

P2P Wikis Point-casts Blogs

27-All of the following are examples of e-government EXCEPT:

a state purchasing officer

places an online order for

office supplies from an e-

catalog sent to her by a

national office supply

store.

a company sells

army and navy

surplus supplies

at auction over

the Internet.

an unemployed worker

consults a Web site

operated by the state

employment department to

learn about job openings in

his city.

a contractor submits

an application for a

building permit

using a city hall

Web site.

28-An example of G2C is:

a road contractor uses

the Internet to submit a

closed bid on a paving

contract.

a regional hospital

conducts an online

reverse auction for

cleaning supplies.

an employee at the Chamber

of Commerce gets local

demographic data from a

U.S. Census site.

a driver applies for

and pays for the

renewal of his auto

tag online.

29-Chaplin reports quarterly sales revenue from his business to city hall over the Internet.

He pays his local business tax with a credit card. This is an example of:

e-government G2C e-commerce e-Procurement G2B e-commerce

30-A government agency uses an online reverse auction to satisfy the tendering system

requirements specified by law. This is an example of:

e-Procurement G2B e-commerce G2C e-commerce e-government

31-Government-to-employee applications can lead to significant efficiency improvements

for all of the reasons EXCEPT:

Many military

employees are stationed

in remote locations that

Most government

employees use

handheld digital

Governments employ

large numbers of people

that need to be paid and

Employees of federal and

state governments often

work in a variety of

Page 64: Test Bank

are best served via the

Internet. devices. trained. geographic locations.

32-All of the following are problems in implementing e-Government EXCEPT:

it is difficult to protect

personal data collected

through an e-

Government site.

businesses have been

more receptive to

G2B than

individuals to G2C.

transformation is

typically very

slow

the technology needed to

implement stage 6 of the

Deloitte transformation

process does not exist yet.

33-One of the most important issues in implementing e-government is:

providing for secure

payments. its adoption and

usage by citizens.

the use of encryption and

digital signatures.

designing feature-rich

Web sites.

34-All of the following are advantages of e-learning EXCEPT:

it costs less to deliver education

online than in a traditional

classroom.

college professors are

anxious to develop new

online courses.

knowledge

retention is

higher.

learning time

is reduced.

35-All of the following are potential drawbacks of e-learning EXCEPT:

assessment issues

remain to be

resolved.

knowledge retention is

lower than in traditional

classrooms.

instructors must

be retrained.

protecting the intellectual

property of content

developers.

36-Most universities use e-learning:

exclusively in

reaching students who

couldn't otherwise

attend classes.

as a supplementary

channel to traditional

classrooms.

only when forced by

administrators to use it as a

way to recruit distant

students or reduce costs.

as a total

replacement for

traditional

classrooms.

37-The business forces that are driving the transition from traditional education to online

learning are all of the following EXCEPT:

limited supply of faculty with competition and cost network technological

Page 65: Test Bank

specialized expertise. pressures. connectivity. change.

38-Which of the following is an example of edutainment?

Two or more

students sharing

music over the

Internet.

A community college

providing an online

college course on

digital media.

An online science fiction

game whose object is to

blast as many aliens as

possible in a 60 second

round.

An online game that uses

colorful characters to

teach young children

about numbers.

39-One of the facilitators of e-learning is ________ technology such as wikipedia.org.

Macromedia Blackboard WebCT Web 2.0

40-________ is the electronic delivery of newspapers, magazines, books, videos, music, and

other digitizable information over the Internet.

Blogging Online publishing Social networking Webinar

41-More and more people are willing to pay for digital music, as shown by the success of

________.

Apple's iTunes Napster Kazaa P2P

42-________ is commonly used to broadcast public lectures and e-seminars, promote the

work of new or unknown musicians, and broadcast international entertainment activities.

Podcasting Webcasting Dynamic publishing File sharing

43-A podcast is distinguished from other digital audio formats by:

its use of unpaid

subscriptions.

the iPod

hardware

required to hear

it.

its lack of

proprietary

content.

its ability to be downloaded

automatically, using software capable

of reading feed formats such as RSS.

Page 66: Test Bank

44-The exclusively online publication of Stephen King's e-book Riding the Bullet in March

2000:

as disrupted by hackers

who breached security,

then distributed free copies

of the book.

was an unqualified success and

established electronic publishing

as a legitimate competitor for

traditional publishers.

produced

very few

sales.

was a failure

because the cost

of the book was

too high.

45-A type of e-book referred to as the ________ is a truly multimedia, online-only book that

has hyperlinks, three-dimensional text and display, graphics, audio, and video. It supports

nonlinear exploration of topics.

download Rubics-cube hyperlink

book

online reference book

model.

interactive, build-your-own

decision book

46-The primary advantage that e-books offer publishers is:

the ease of updating

books in real-time.

the ability to

reach many

readers.

lower production,

marketing, and delivery

costs.

the ease of customizing

textbooks and trade books.

47-Which of the following statements about blogs is not true?

Blogs became very popular after

the September 11, 2001 terrorist

attacks when people were looking

for as many sources of

information as possible and for

personal connections to the

tragedy.

The most

common types of

blogs are

professional

blogs,

Blogs are limited to

one-way

communication.

A blog is a personal

Web site, open to the

public, in which the

owner expresses his

or her feelings or

opinions.

48-Risks in corporate blogging include all of the following EXCEPT:

the risk of disciplinary

action against abusive

bloggers.

the risk of

revealing trade

secrets.

the risk of

lawsuits

the risk making statements that are

or could be construed as libel or

defamation.

49-A major purpose of an organizational knowledge base is to support and allow ________.

Page 67: Test Bank

organizational capital knowledge sharing responsible blogging e-learning

50-The tasks of KM include each of the following EXCEPT:

enhancing a knowledge

environment in order to

conduct more effective

knowledge creation,

transfer, and use.

managing knowledge

as an asset so as to

increase the effective

use of knowledge

assets over time.

restricting

knowledge access to

prevent its transfer

between individuals.

creating knowledge

repositories where

knowledge can be

stored and retrieved

easily.

51-Knowledge is of limited value if:

company databases are not

accessible to decision

makers.

users contribute their

own specialized content. it is not

shared.

companies protect it to

maintain competitive

advantage.

52-________ involves using various computer-based tools and techniques to analyze

transaction data and generate new ideas.

Knowledge management Knowledge capture Knowledge classification Knowledge creation

53-Knowledge generated in e-business contributes to the enhancement of three core

operating processes, which include all of the following EXCEPT:

customer relationship

management

supply chain

management

product development

management project

management

54-Customer-to-customer (C2C) e-commerce is conducted in various ways on the Internet,

but the best-known C2C activities are:

C2C exchanges C2C auctions Personal services Classified ads

55-P2P systems have all of the following key characteristics EXCEPT:

They provide for real-time

access to other users

through techniques such

as instant messaging and

They support cross-

networking protocols such

as SOAP or XML-RPC,

which enables a program

The users'

computers can

act as both

clients and

The overall system is

well integrated, but

lacks tools for easy

creation of content or

Page 68: Test Bank

multichannel

collaboration applications.

on one computer to

execute a program on a

server computer.

servers. for adding

functionalities.

Chapter 9 Mobile Computing and Commerce

1-Using wireless technologies, one can create EC applications that are not available with

wireline systems.

True False

2-Mobile computing refers to a computing paradigm designed for workers who travel

outside the boundaries of their organizations or for anyone on the move.

True False

3-The two solutions that were necessary for mobile wireless computing to be feasible were

computers that were small enough to be carried easily and long-life batteries.

True False

4-A laptop or notebook computer can become wireless with the addition of a cellular chip.

True False

5-Overall, PDA sales dropped in the mid-2000 because PDAs lacked features beyond

personal information management.

True False

6-The primary application of Blackberry is instant messaging.

True False

Page 69: Test Bank

7-Hardware and software designers need to consider the special requirements of mobile

devices such as small screens, reduced memory, limited bandwidth, and restricted input

capabilities.

True False

8-A Web server may need two versions of the same Web page–a normal page with full

graphics for desktop computers and a mobile page for PDAs and smartphones–and a way

to distinguish between devices requesting the Web page.

True False

9-The infrastructure to support mobile commerce is inexpensive and relatively simple to

put in place.

True False

10-Common standards for various mobile devices simplify the development of software

applications for wireless devices.

True False

11-Small handheld computing devices use a variety of interface approaches including a

touch screen, mini-joystick, jog dial, and thumb wheel.

True False

12-The Wireless Application Protocol, or WAP, is a suite of network protocols designed to

enable different kinds of wireless devices to access WAP-readable files on an Internet-

connected Web server.

True False

13-The WAP gateway is a server that is responsible for translating information requests

from the device into an HTTP request that the Web server can understand.

True False

Page 70: Test Bank

14-Micropayments for small-purchase amounts of less than $10 have become widespread in

EC, in part because of the widespread use of all types of mobile devices.

True False

15-Increased use of voice-support services exploits the built-in audio capabilities of many

mobile devices and reduces their dependence on unsatisfactory input solutions, such as

handwriting recognition, keypads, or virtual touch-screen keyboards.

True False

16-The highest level of voice support services is a voice portal, which is a Web site with an

audio interface that can be accessed through a telephone call.

True False

17-WiFi is a set of telecommunications standards that enables wireless devices to

communicate with each other over short distances, but which suffers from interference and

security problems.

True False

18-The most popular Wi-Fi standard is 802.11b, which is inexpensive and offers sufficient

speed for most devices, but has interference problems.

True False

19-A common type of personal area network (PAN) is Bluetooth-enabled headsets that

people use with their cell phones.

True False

20-Increasingly, 802.11b is being used in commercial environments where cost is not a

major issue and where laptop computers can take advantage of the 54 Mbps transfer rate.

True False

Page 71: Test Bank

21-WiMax is an IEEE 802.16 wireless standard for making broadband network access

widely available for data and voice over a medium-sized area, and whose impact on e-

commerce is still unclear.

True False

22-Even though micro-payment technology has wide-ranging applications, such as making

payments to parking garages and public transportation, two factors limiting the success of

micro-payment applications are transaction costs and nonpayment risks.

True False

23-The two greatest opportunities in B2B mobile commerce are to use wireless

communication to share information along the supply chain and to make electronic

payments.

True False

24-In Las Vegas, the Luxor pre-registers guests when their airplane lands and they turn on

their cell phones. Also, the hotel can determine when guests leave the hotel, luring them

back to gamble with mobile incentives and pitches. This is an example of Global

Positioning Systems (GPS).

True False

25-Several key ethical issues in m-commerce include isolation, loss of privacy, and potential

health damage from cellular radio frequency emissions.

True False

26-M-commerce transactions and activities require ________ and ________.

hardware and software

infrastructures; infrastructure

support

cell phones;

portable computers

smartphones;

switches

wired networks;

access points

27-Infrastructures that support the wireless connection are:

Page 72: Test Bank

PDAs,

smartphones, and

portable

computers.

WAP gateways,

GPS locators,

and GPS

satellites.

network access points, mobile

communications server switches,

and cellular transmitters and

receivers.

web servers, mobile

devices, and

microbrowsers.

28-Components of a wireless infrastructure that support delivery of services over a wireless

connection are:

WAP gateways,

GPS locators,

and GPS

satellites.

network access points, mobile

communications server switches,

cellular transmitters, and

receivers.

PDAs,

smartphones, and

portable computers.

web servers, mobile

devices, and

microbrowsers.

29-Characteristics of mobile devices that create special requirements that hardware and

software designers need to anticipate when designing mobile computing systems include all

of the following EXCEPT:

restricted input capabilities small screens broad bandwidth reduced memory

30-The exchange of updated information with other computing devices is called:

data transferring synchronization. marking docking

31-A suite of network protocols designed to enable different kinds of wireless devices is

called:

Wireless Application

Protocol.

a mobile application user

interface.

wireless

middleware.

a mobile operating

system.

32-The application logic in a handheld PDA, smart phone, Palm or Wintel notebook is

called:

a mobile application user

interface.

wireless

middleware.

a mobile operating

system.

Wireless Application

Protocol.

33-________ enables the determination of the location of an enabled device.

WAP GPS SMS PDA

Page 73: Test Bank

34-Rick sends a message from a delayed flight to his friend on her cell phone that he will be

arriving late. The service that allows the sending and receiving of such short text messages

on mobile phones is called:

SMS LOL TMG MSG

35-Micropayments are electronic payments:

that are less than

$100.00.

that are less than

$1.00. that are less than

$10.00.

from a mobile

device.

36-A ________ is suitable for mobile users who need to make very short-range device-to-

device wireless connections within a small space, such as a single room, and most

commonly with Bluetooth.

wireless area network local area network Wi-Fi area network personal area network

37-Most WLANs run on a telecommunications standard known as ________, which is more

commonly called ________.

IEEE 802.11; Bluetooth WLAN; hotspot IEEE 802.16; WiMax IEEE 802.11; Wi-Fi

38-The IEEE standard ________ offers bandwidth transfer rates of 200 to 540 Mbps,

which makes it impractical because it exceeds the limits of most broadband connections

used by homes and small businesses.

802.11b 802.11n 802.11g 802.16

39-All of the following about wireless wide area networks (WWAN) are true EXCEPT:

Most

WWANs are

cellular phone

networks.

When a device is

turned on, a SIM

card inside the

device identifies

itself to the

WWAN.

At the center of each cell is a

base station transceiver or cell

tower that is used to send and

receive signals to and from

mobile devices operating within

the cell.

The single WWAN

network standard insures

compatibility of handsets

within and between

countries.

Page 74: Test Bank

40-The major attributes that enable development of new applications that are possible only

in a mobile environment include all of the following EXCEPT:

Ubiquity Security Personalization Localization

41-The development of m-commerce is being driven by the following technological,

business, social, and economic factors EXCEPT:

The improved

price/performance of

mobile services.

The widespread

availability of more

powerful wireless

devices.

The growth of a

handset culture and

mobile workforce.

The transition to a

manufacturing

economy.

42-As in e-commerce, m-commerce B2C applications are concentrated in each of the

following areas EXCEPT:

retail shopping for

products and services telecommunications

targeted

advertising

providing content for a fee

through mobile portals

43-The major enterprise mobile applications are all of the following EXCEPT:

logistics and

supply chain

e-mail and cell phone

contacts research and

development

customer relations and sales

force automation

44-By enabling sales force employees to record orders in real time, the organization

benefits through each of the following EXCEPT:

lower clerical and

administrative

overhead.

fewer data

entry errors.

more extensive collaboration

and sharing of customer

leads.

improved manufacturing

and delivery scheduling,

45-Mobile access supports the two functions of sales force mobilization and field service,

which extends the reach of ________ to both employees and business partners on a 24/7

basis to any place where recipients are located.

customer relationship

management

vendor

management

supply chain

management

inventory

management

Page 75: Test Bank

46-One way to share information with supply chain partners is wireless ________, which is

the science of measuring physical phenomena such as temperature, volume, or an on/off

condition at a remote point and transmitting the value to a distant recorder or observer.

telemetry RFID mobilization osmosis

47-WiMax and 3G wireless mobile technologies offer telemedicine application

opportunities that include all of the following EXCEPT:

Real-time

consultation

between a patient in

one location and a

medical specialist in

another.

Wearable heart monitors

linked to a cell phone can

automatically contact

doctors or family

members at the first sign

of health problems.

Prescriptions can be

transferred

electronically to the

appropriate pharmacy

for a no-wait pick-up

by the patient.

Reduced threat of

malpractice suits

because there is no

hands-on interaction

between the remote

physician and the

patient.

48-All of the following are barriers to location-based m-commerce EXCEPT:

Consumers see constant

location data

transmissions as a

violation of privacy.

Wireless

bandwidth is

limited.

There are presently not

enough location-based

systems to make this a

viable technology.

The accuracy of location

technologies is often less

than consumers expect.

49-The services provided through location-based m-commerce focus on key factors which

include all of the following EXCEPT:

Geocaching, or

determining the

topography of an area.

Timing, or determining

the precise time at a

specific location

Tracking, or

monitoring the

movement of a person

or thing.

Navigation, or plotting

a route from one

location to another.

50-A(n) ________ is a computer system capable of integrating, storing, editing, analyzing,

sharing, and displaying spatial information.

geographical information system on-star system l-commerce system global positioning system

51-You are walking near a coffee shop and suddenly your cell phone beeps with a message:

"Come inside and get a free biscotti with any purchase." This is an example of:

Page 76: Test Bank

location-based

advertising

m-

commerce

customer relationship

management

permission

marketing

52-________ refers to the integration of computers and wireless communications in order

to improve information flow.

Remote telemetry E-911 Telematics Mobility

53-Many experts believe that the next major step in the evolution of computing will be

________ in which almost every object will have processing power and a wired or wireless

connection to a network.

universal computing mobile computing persistent computing pervasive computing

54-All of the following about RFID are true EXCEPT:

An RFID tag can hold 20

times the amount of

information a bar code can

hold, and the tag can be

read through cardboard,

wood, and plastic at a range

of up to 100 feet.

An RFID tag

includes an

antenna and a chip

with information

about the item.

An RFID tag remains

inactive until radio frequency

energy from the tag's radio

transmitter hits its antenna,

giving the chip enough power

to emit a 96-bit string of

information.

An RFID

reader contains

a radio

transmitter and

receiver.

55-One initiative underway that could lead to widespread support for the introduction of

RFID is the ________, which identifies the manufacturer, producer, version, and serial

number of each item and does not require line-of-sight contact to be read.

Smart Product Network Electronic Product Code Universal Product Code Sensor Network

Chapter 10 Dynamic Trading

1-The Internet provides an infrastructure for executing auctions with many more

participating sellers and buyers than with offline auctions, but administrative costs are

higher.

True False

Page 77: Test Bank

2-In some types of auctions, sellers offer product; and in other types of auctions, buyers

post their product needs.

True False

3-Dynamic pricing refers to a transaction in which the price is not fixed, but fluctuates

based on current supply-and-demand relationships.

True False

4-Reverse auctions have two major purposes: liquidation and market efficiency.

True False

5-B2B reverse auctions are gaining popularity as an online mechanism for buying goods

and services.

True False

6-A popular type of auction model where there is one buyer and many potential sellers is

the "name-your price" model that was pioneered by eBay.com.

True False

7-An auction that takes place between sellers and buyers in one industry or for one

commodity is called a vertical auction because activity goes up and down the supply chain

in a single industry, rather than horizontally between members of supply chains in

different industries.

True False

8-Specialized sites for vertical auctions are referred to as auction vortals.

True False

9-Through e-auctions, sellers can gain more customer dollars by offering items directly

rather than through an expensive intermediary or by using an expensive physical auction.

Page 78: Test Bank

True False

10-A major benefit of e-auctions is the reduced rate of fraud because of the openness of the

transaction.

True False

11-The "name-your-own-price" model is based on the fundamental concept of the

downward-sloping supply curve in which prices vary based on supply.

True False

12-Entering a high bid without ever planning to pay for the auction item is called sniping.

True False

13-In addition to auctions, dynamic prices can be determined by online negotiation, which

is the back-and-forth process of bargaining until a buyer and seller reach a mutually

agreeable price.

True False

14-Barter agents are software that can support the back-and-forth process of online

negotiation.

True False

15-Double-auction markets tend to generate competitive outcomes because a double

auction is an interactive market in which both buyers and sellers are competitive.

True False

16-Prices paid in online auctions are lower when auctions are an alternative selling channel

rather than an exclusive selling arrangement.

True False

Page 79: Test Bank

17-Negotiating prices transfers the burden of determining prices to the market itself so the

resulting negotiated prices will always be fair and effective.

True False

18-Bid shielding is a type of e-auction fraud where sellers place phantom bidders to bid up

the price of items they are selling and hide (shield) low bids by actual potential buyers.

True False

19-Specialized authentication services are very effective and widely used to determine

whether an item is genuine and described correctly as a way to protect against counterfeit

products.

True False

20-Third-party escrow services are used for products valued at more than $200 to protect

both the buyer and seller when either the buyer or seller feels the need for additional

security.

True False

21-When a company decides to use auctions as a sales channel, one of the strategic issues in

B2B is the potential conflict with existing distributors and distribution channels. Therefore,

some companies use auctions only to liquidate obsolete, used, refurbished, or damaged

products.

True False

22-The process of building auction applications is easy because of intelligent agents and

other building tools.

True False

23-WineryExchange successfully auctioned grapes to wineries, which ended the tradition of

sales being based on established relationships between grape growers and wineries.

True False

Page 80: Test Bank

24-Privacy is one of the benefits of mobile auctions because the Internet cell phone is more

private than a PC.

True False

25-Auctions may be used as a strategic tool by both online and offline companies.This type

of strategic alliance will be very popular due to its win win possibilities.

True False

26-Auctions are all of the following EXCEPT:

They are a

marketing

channel.

They are an established method

of commerce for generations. They are suitable for

most consumer goods.

They are a market

mechanism.

27-Dynamic pricing refers to :

prices that are determined

by market forces.

prices that are regulated by

government agencies.

prices that

maximize revenue.

prices that are

negotiated.

28-________ work best with many buyers and many sellers.

Forward auctions Dynamic exchanges Reverse auctions Bartering

29-The ________ auction model is popular in B2B.

one buyer, many potential

sellers one-buyer, one-

seller

one seller, many potential

buyers

many buyers, many

sellers

30-Two purposes of a type of ________ auctions are liquidation and market efficiency.

one buyer, many potential

sellers

many buyers, many

sellers

one-buyer, one-

seller one seller, many potential

buyers

Page 81: Test Bank

31-Reverse auctions are a type of ________ auctions.

one-buyer, one-

seller one buyer, many potential

sellers

many buyers, many

sellers

one seller, many potential

buyers

32-The "name-your own-price" model pioneered by Priceline.com is a type of ________

auction.

many buyers, many

sellers one buyer, many potential

sellers

one seller, many potential

buyers

one-buyer, one-

seller

33-Auctions done in exchanges or double auctions are ________ auctions.

many buyers, many

sellers

one-buyer, one-

seller

one seller, many potential

buyers

one buyer, many potential

sellers

34-A(n) ________ takes place between sellers and buyers in one industry or for one

commodity, such as flowers, cars, or cattle.

vertical auction exchange open auction negotiation vortal

35-All of the following are potential benefits from auctions to sellers EXCEPT:

sellers are always

anonymous.

sellers can liquidate large

quantities of obsolete

items very quickly.

sellers receive valuable

price sensitivity

information.

auctions can broaden the

customer base and

reduce cycle time.

36-In electronic auctions, near-perfect market information is available about prices,

products, current supply and demand, and so on. This feature provides benefits to

________.

sellers buyers buyers and sellers companies and individuals

37-Benefits of electronics auctions (e-auctions) to sellers include all of the following

EXCEPT:

Anonymity Lower transaction and

administrative costs

Larger reach and

increased revenues

Removal of expensive

intermediaries

Page 82: Test Bank

38-________ refers to the tendency of customers to stay at Web sites longer and come back

more often.

Loyalty Frequent purchase Stickiness High repeat

39-Limitations of e-auctions include all of the following EXCEPT:

Risk of fraud Higher order fulfillment costs Long cycle time Dynamic pricing

40-Research has shown that e-commerce sites that use an auction model tend to:

reach critical mass more quickly

than catalog-order-based.

become

liquid.

fail more often than

other models.

reach critical mass more

slowly than other models.

41-The first step in the auction process is:

preparing the

bids.

arranging

financing. searching and

comparing.

registration and participants'

profiles.

42-Jackie uses a software system to place bids automatically on her behalf until her

predetermined maximum price is reached. The software bids in such a way as to minimize

the final bid. This is referred to as:

sniping. bidding agents. proxy bidding. pricing agents.

43-Compared to competitive markets, auction prices are often ________ when there are

multiple bidders.

the same higher lower dynamic

44-Compared to competitive markets, auction prices are often ________ when there are

very few bidders.

lower higher dynamic the same

Page 83: Test Bank

45-The most serious disadvantage of e-auctions is:

logistics. payment delays. the risk of fraud. unreliable auction software.

46-The practice by sellers of having associates place fake bids in an auction as a way to

drive up the selling price is called:

bid shielding. bid fixing. shilling. sniping.

47-Bidders sometimes use phantom bidders to drive bid prices up rapidly at the beginning

of an auction, thus discouraging bidding from legitimate bidders. At the last minute, the

phantom bidders pull out, which awards the item to a very low bidding customer. This

practice is called:

shilling. sniping. bid fixing. bid shielding.

48-John wants to know if the first edition novel he just purchased through an e-auction is

actually a first edition. The auction host helps him locate an expert that will tell him

whether the novel is a genuine first edition or a fake. This is an example of:

certification. authentication. verification. integrity.

49-A major shortcoming with authentication services is:

it is impossible to tell

whether many items

are reproductions or

genuine.

dishonest

authenticators are the

primary sources of

fraud on the Internet.

most auction sites

forbid the use of

authentication

services.

two different authenticators

may come up with different

opinions regarding the

authenticity and description

of a given item.

50-Many companies use intermediaries or trading assistants instead of implementing e-

auctions themselves for each of the following reasons EXCEPT:

To avoid tax

and legal

fees.

The company name is

not widely recognized.

To bring many

more buyers to the

auction.

Costs of auction intermediaries or

assistants are less than the costs of

physical auctions.

51-Each of the following is one of the three major categories of auction rules EXCEPT:

Page 84: Test Bank

timing rules clearing rules bidding rules information-revelation rules.

52-Each of the following is true about auction rules EXCEPT:

Rules eliminate

conflicts with existing

distributors and

distribution channels.

Auction rules vary from

country to country due to

legal considerations.

Rules are intended to

smooth the auction

mechanism and to

prevent fraud.

The success of

auctions depends on

complying with

auction rules.

53-The process of building auction applications is complex for all of the following reasons

EXCEPT:

auctions must be

integrated with the

back-end offices.

the number of

needed features can

be very large.

auctions must be integrated with

the legacy systems of

participating companies.

auctions must

provide payment

systems.

54-Many auction sites are implementing ________ because of the significant increase in the

number of users who browse the Internet wirelessly.

m-commerce applications instant message notification authentication vortals

55-The limitations of mobile auctions are all of the following EXCEPT:

Internet cell

phones are less

private than a PC.

Internet-enabled

phones have limited

memory capacity

Wireless systems

are not as safe as

wireline ones.

Portable devices are small and

may have a problem showing

pictures of auction items.

Chapter 11 E-Commerce Security

1-Fraud refers to a business activity that relies on force or threats to deprive a person or

company of property or other assets.

True False

2-The trend in online crimes shows that most new scammers and other con artists are not

computer geniuses.

Page 85: Test Bank

True False

3-Identity theft has become the primary concern of online shoppers.

True False

4-Defending against online cons and compensating for the damages caused by identity

thieves have significantly increased the costs of EC.

True False

5-To minimize the risk of fraud from phishing and crimeware, EC retailers need to

authenticate the buyer.

True False

6-An EC security strategy consists of firewalls and other types of technology to prevent and

detect unauthorized use of the organization's brand, identity, Web site, e-mail, information,

or other asset.

True False

7-Information assurance broadly refers to the protection of information systems against

unauthorized access to information, unauthorized modification of information, and denial

of service to authorized users.

True False

8-The EC industry ranks security over convenience. So the EC industry strives to enforce

safeguards, such as passwords for credit card transactions, that make online shopping

safer even if those safeguards make it more inconvenient for customers.

True False

9-Credit card issuers want to cooperate and share leads on criminal activity with each

other and law enforcement even though prosecution with an uncertain outcome.

Page 86: Test Bank

True False

10-Most U.S. Web hosting providers log all activity so, in most cases, they can identify the

source IP address and source ISP with timestamps and other identifying information.

True False

11-Requiring stronger EC standards and information sharing by the credit card companies

would not fix the security problems facing online retailers and shoppers.

True False

12-Spammers use zombie computers to distribute spam because it is both cheaper and less

risky.

True False

13-According to the Mitre Corporation's list of Common Vulnerabilities and Exposures, two

of the top five reported vulnerabilities were within Web applications.

True False

14-The legal standard of due care requires that a company take reasonable care to defend

against risks affecting its EC business and online transactions.

True False

15-Because of the lack of source authentication and data integrity checking in DNS

operations, Internet services are vulnerable to attacks.

True False

16-Experts believe that a strict e-business risk management program that was rigorously

managed could not have prevented many of the data breaches.

True False

Page 87: Test Bank

17-EC security programs have a life cycle during which their EC security requirements

must be evaluated and adjusted annually.

True False

18-According to the CIA security triad, the success and security of EC depends on the

confidentiality, integrity, and accessibility of information and the business Web site.

True False

19-Nonrepudiation is closely associated with authentication and assures that an online

customer or trading partner cannot falsely deny their purchase or transaction.

True False

20-The FTC, SEC and other government agencies cannot impose harsh penalties on

companies whose confidential data has been breached unless a company employee caused

the breach.

True False

21-Phishing attacks rely on social engineering, which is a nontechnical attack that uses

something to trick users into revealing information or performing an action that

compromises a computer or network.

True False

22-The time-to-exploitation, which is the elapsed time between when a vulnerability is

discovered and the time it is exploited, of most sophisticated spyware and worms has

decreased from several months to a few weeks.

True False

23-Unlike denial of service (DOS) attacks, botnet attacks are less dangerous because they

cannot disrupt a web site or EC application.

True False

Page 88: Test Bank

24-The ability of a biometric system to identify a person depends on the existence of

database of enrolled users that is searched for a match based on the person's biometric

trait.

True False

25-Virtual private networks (VPNs) are a special category of software that can monitor

activity across a network or on a host computer, watch for suspicious activity, and take

automated action based on what it sees.

True False

26-The incidence of online fraud and identify theft has increased for each of the following

reasons except:

Information is today's

most valuable form of

international currency.

New effective phishing

scams and schemes

being carried out by

computer experts.

Scammers outsourcing

work to programmers to

seize control of computers

or wireless networks.

Growth in EC sales

and the number of

shoppers with

higher incomes.

27-Cyber cons have a negative effect on EC because

con

artists

have

gone

low-tech.

companies cannot expand

their e-business to other

countries with

underdeveloped legal

systems.

a majority of potential

customers do not shop

online because they are too

afraid of fraud to trust

online merchants.

defending against these

cons and compensating for

damages significantly

increase the costs of EC.

28-The U.S. agencies dedicated to eliminating fraud resulting from phishing and crimeware

are:

The Group of

Eight, VeriSign,

and NameProtect.

The High-Tech Crime

Network, Anti-

Phishing Working

Group, and Internet

Research Lab.

The High-Tech Crime

Network, Anti-Phishing

Working Group, and

Federal Trade

Commission.

The Computer Security

Institute, High-Tech

Crime Network, and

Anti-Phishing Working

Group.

29-________ is a crimeware technique used to steal the identity of target companies to get

the identities of their customers.

Page 89: Test Bank

Social engineering. Phishing. Pretexting. Spamming.

30-Where do a huge majority, possibly as high as 95 percent, of hackers reside?

Turkey, China, Romania, or

Brazil.

Russia, India, Germany, or

Argentina.

In the G8

countries.

In South

America.

31-The key reasons why EC criminals cannot be stopped include each of the following

except:

Lack of cooperation

from credit card

issuers and foreign

ISPs.

Strong EC security makes

online shopping

inconvenient and

demanding on customers.

Sophisticated hackers

use browsers to crack

into Web sites.

Online shoppers do not

take necessary

precautions to avoid

becoming a victim.

32-It is currently known that if a front-end application such as a Web site is effectively

secured, then

the data itself

is secured by

firewalls.

the data itself is secure

because web applications

are not targeted by

attackers.

the data itself may not be

secure because the

application may not

function as planned.

the data itself may not

be secure because back-

end databases may not

function as

planned.

33-A vulnerability

is the estimated cost, loss,

or damage that can result if

a threat exploits a

vulnerability.

is a

software

bug.

is the probability

that a weakness will

be known and used.

is a weakness in software or

other mechanisms that a hacker

can use directly to gain access to

a system or network.

34-The underlying reasons why a comprehensive EC security strategy is needed include all

of the following except:

Managers

treating EC

security as a

process.

The shift

toward profit-

motivated

crimes.

The Internet was designed

for maximum efficiency

without regard for its

security or users with

malicious intent.

Many companies fail to

implement basic IT security

management best practices,

business continuity plans, and

disaster recovery plans.

Page 90: Test Bank

35-The protection of information systems against unauthorized access to or modification of

information that is stored, processed, or being sent over a network is referred to as

________.

Information defense. Information security triad. Information integrity. Information assurance.

36-The success and security of EC depends on the ________ of information and the

business Web site.

authentication,

authorization, and

nonrepudiation

encryption,

functionality, and

privacy

confidentiality, integrity,

and availability

quality,

reliability, and

speed

37-The basic security concepts relating to customers and other users are:

authorization,

nonrepudiation, and

information assurance.

information assurance,

confidentiality, and

authentication.

authentication,

authorization, and

nonrepudiation.

confidentiality,

integrity, and

availability.

38-Digital signatures or digital certificates:

are used to validate the sender and time

stamp of the transaction so it cannot be

later claimed that the transaction was

unauthorized or invalid.

have been

compromised by

phishers and

spammers.

provide complete

confidence that the

transactions are secure.

a

and

b

39-The most cost-effective approach to EC security is to develop and implement a strategy

that

requires digital

signatures or digital

certificates for all

transactions.

depends on the

trust and

confidence of

customers.

proactively meets

regulatory, financial,

marketing and

operational requirements.

protects against

unauthorized transactions

and overrides of

accounting controls.

40-To be effective, an acceptable use policy (AUP) needs

to specify rules for to inform all users of their to be written by to be incorporated

Page 91: Test Bank

firewalls, access control

lists, monitoring, and

intrusion detection

systems.

responsibilities when using

company networks, computer

equipment, wireless devices, and

customer data.

the company's

legal department.

into business

projects and

proposals.

41-In 2005, human error was responsible for almost ________ percent information security

breaches in organizations.

40 10 20 60

42-Which of the following statements about hardware and software security defenses is

false?

After the EC security

program and policies are

defined and risk assessment

completed, then the software

and hardware needed to

support and enforce them can

be put in place.

Hardware and software

security defenses protect

against irresponsible

business practices or

corrupt management.

If firewalls and

antivirus software are

not upgraded and

monitored

constantly, they will

not remain useful.

There is no

single hardware

or software

solution for all

companies.

43-Social engineering attacks are:

no longer considered to be

serious Internet threats due

to the increased security of

MySpace, LinkedIn, and

YouTube.

are a combination

of technical and

nontechnical

attacks.

take advantage of Web

2.0 applications like

social networking sites,

blogs, wikis and RSS

feeds.

an example of

technical attacks

requiring software or

systems knowledge.

44-A technique known as web page hijacking

downloads what appears to

be an "important

document," but which

contains a trojan, a

program that gives the

sender control of the

infected machine.

enables a malicious Web

master to displace the

pages of an EC Web site in

the Search Engine Results

Pages (SERPS) to redirect

customers to another site.

enables online

gambling that are

actually fronts for

international money

laundering operations.

causes a high

volume of

search engine

traffic similar to

a denial of

service attack.

45-A botnet is:

Page 92: Test Bank

a piece of software

code that inserts

itself into a host or

operating system to

launch DOS

attacks.

a collection of a few

hundred hijacked Internet

computers that have been

set up to forward traffic,

including spam and viruses,

to other computers on the

Internet.

a piece of code in a

worm that spreads

rapidly and exploits

some known

vulnerability.

a coordinated network

of computers that can

scan for and

compromise other

computers and launch

DOS attacks.

46-Which technologies are designed and used to secure EC communications across a

network?

PINs, cryptocards,

and point-of-sale

systems.

Plastic cards with magnetic

strips, intrusion detection

systems, and progressive

tokens.

AUPs, ACLs,

and network

login IDs.

Access control lists,

tokens, passwords, and

biometric systems.

47-Public key infrastructure (PKI) is an authentication method

that encrypts and

decrypts large

amounts of data

effectively.

that is based on the Data

Encryption Standard, which is

the standard symmetric

encryption algorithm supported

by U.S. government agencies.

that uses

encryption keys

ranging from 64

bits to 128 bits.

that has become the

cornerstone for secure

e-payments and

intranet applications.

48-Secure Socket Layer (SSL), which is also known as Transport Layer Security (TLS):

is designed to

handle all steps in

the validation of

credit card

numbers.

has been

replaced by

certificate

authorities.

is one of the major

generally accepted

protocols for securing e-

commerce used by

Microsoft and Netscape.

was invented by Microsoft to

use standard certificates for

authentication and data

encryption to ensure privacy or

confidentiality.

49-Access to a network ought to be based on:

the policy of least privilege

where access to network

resources are blocked and

permitted only when needed

to conduct business.

role-specific security

protocols where

access is limited by a

user's level of trust.

the policy of need-to-

know where access

by all non-employees

is blocked.

the policy of

acceptable use

where access is

restricted by the

firewall.

Page 93: Test Bank

50-Which of the following does not correctly describe what firewalls protect against?

Some programs have

bugs or special

features that create

application

backdoors, which

allowing for remote

access.

Spammers often use SMTP

session hijacking to redirect e-

mail through the SMTP server

of an unsuspecting host, which

helps hide their identity.

Remote logins occur

when an unauthorized

users connects to a PC

and gains control of it.

Macros are the

electronic

equivalent of

junk mail.

51-Firewalls that filter requests from the Internet to a private network based on the IP

address of the computer sending or receiving those requests are called:

packet-filtering routers. application-level proxies. bastion gateways. IP blockers.

52-All of the following are important security functions of proxy servers except:

They improve

network

performance.

They hide the IP addresses

of a company's internal

computers.

They help control

outbound traffic to a

network.

They help control

inbound traffic to a

network.

53-The advantages of virtual private networks (VPN) for data communications include all

of the following except:

They can reduce

communication costs

dramatically because

VPN equipment is

cheaper than other

remote solutions.

They are less

expensive than

private leased lines

because they use the

public Internet to

carry information.

They ensure the

confidentiality and

integrity of the data

transmitted over the

Internet without

requiring encyption.

Remote users can use

broadband connections

rather than make long

distance calls to access

an organization's

private network.

54-A host-based intrusion detection system (IDS):

Resides on the server that is

being monitored where it

can detect whether critical

or security-related files have

been tampered with or

whether a user has

attempted to access files that

he or she is not authorized to

Consists of information

system resources–

firewalls, routers, Web

servers, database

servers, and files that

look like production

systems, but do no real

work.

Can perform certain

actions when an

attack occurs, such

as terminating

network connections

based on security

policies.

Uses rules to

analyze suspicious

activity at the

perimeter of a

network or at key

locations in the

network

Page 94: Test Bank

use.

55-In the United States, which the federal laws place legal limits on monitoring activity?

The Wiretap

Act and

CFAA

The Wiretap Act and the

Pen Register, Trap, and

Trace Devices statute

The Computer Fraud and

Abuse Act (CFAA) and the

First Amendment.

The USA

PATRIOT Act

and CFAA

Chapter 12 Electronic Payment Systems

1-E-payment systems that require the payer to install specialized security software have

proven more likely to succeed.

True False

2-The success of an e-payment method depends on its interoperability with existing

enterprise systems and applications.

True False

3-To succeed, special e-payment methods, such as e-cash, have to maintain anonymity.

True False

4-E-payment methods that can address the lower or higher end of the price continuum is

unlikely to be widely accepted because of cost and security issues.

True False

5-Credit cards and charge cards are e payment instruments that allow the holder to make

purchases up to a fixed limit and charges interest each month on unpaid balances.

True False

6-In the settlement process, the systems must determine whether a buyer's card is active

and whether the cardholder has sufficient funds available for the purchase.

Page 95: Test Bank

True False

7-With a debit card, the money for a purchased item comes directly out of the holder's

checking account with the actual transfer of funds from the holder's account to the

merchant's taking place within one to two days.

True False

8-The processing of card payments has two major phases: identification and settlement.

True False

9-In the authorization process, the systems determines whether a buyer's card is active and

the customer has sufficient available credit line or funds.

True False

10-For a given type of payment card and processing system, the processes and participants

are essentially the same for off-line (card present) and online (card not present) purchases.

True False

11-CyberSource and VeriSign are payment processing services that provide connectivity

among merchants, customers, and financial networks that enable authorization and

payments.

True False

12-In the online world, merchants are not held liable for fraudulent transactions.

True False

13-Recent surveys by CyberSource indicate that fraudulent card transactions are a

growing problem for online merchants in spite of their increasing efforts to combat fraud

despite improved anti-fraud measures.

True False

Page 96: Test Bank

14-Because of their visibility and large sales volumes, larger firms were more susceptible to

fraud than smaller firms were.

True False

15-One problem with the Address Verification System (AVS) for fraud prevention is the

number of false positives, meaning that the merchant rejects a valid order. One reason for

these rejects is simply that cardholders make mistakes in inputting their addresses or zip

codes.

True False

16-One impact of anti-fraud tools is that merchants are rejecting a significant number of

both valid and invalid orders due to suspicion of fraud.

True False

17-With virtual credit cards, the issuer must create a new credit card number for every

purchase.

True False

18-In most cases, smart cards are more secure than credit cards and can be extended with

other payment services. In the retail arena, many of these services are aimed at those

establishments where payments are usually made in cash and speed and convenience are

important.

True False

19-Stored-value cards are being marketed heavily to the those who do not have credit cards

or do not have bank accounts, specifically people with low incomes, young adults, seniors,

immigrants, minorities, and others.

True False

Page 97: Test Bank

20-Regardless of the vendor's point of view, there is substantial evidence, at least in the

offline world, that consumers are not willing to use their credit or debit cards for

micropayments under $5 to minimize security risks.

True False

21-E-checks rely on current business and banking practices and can be used by any sized

business that has a checking account, credit card, and debit card.

True False

22-From the perspective of the billing firm, two advantages of e-billing are the reduction in

expenses related to billing and processing payments and the ability for advertising

customized to each individual customer.

True False

23-EIPP is the process by which companies present invoices and make payments to one

another.

True False

24-With letters of credit, credit risk is reduced because payment is accessed via the

creditworthiness of the issuing bank.

True False

25-Research shows that state and local governments are losing more than $100 billion per

year in sales tax revenue on items purchased over the Internet.

True False

26-Factors that come into play in determining whether a particular method of e-payment

achieves critical mass include all of the following EXCEPT:

the degree of

security of the

transfer.

full traceability of

the buyers.

hardware and software

independence.

interoperability with other

enterprise systems and

applications

Page 98: Test Bank

27-A card that draws the payment amount directly from the user's checking account is

called a(n):

e-payment card. charge card credit card. debit card

28-A payment card that provides the holder with credit to make purchases up to a limit

fixed by the card company and charges relatively high interest rates on unpaid balances is

the:

e-payment card. charge card. credit card. debit card.

29-The process of determining whether a card is active and whether the customer has

sufficient funds for the purchase is called:

settlement. authorization. approval. procurement.

30-The transfer of money from the buyer's to the seller's account is called:

authorization. approval. settlement. procurement.

31-________ offer Internet Merchant Accounts, which are special accounts for credit card

authorization and payment processing.

Payment processing services Credit card associations Issuing banks Acquiring banks

32-________ are financial institutions that provides a customer with a payment card.

Acquiring banks Payment processing services Issuing banks Credit card associations

33-________ provide connectivity among merchants, customers, and financial networks

enabling authorization and payments is called the:

Credit card associations Payment processing services Acquiring banks Issuing banks

34-________ are small online payments typically under US$10:

Page 99: Test Bank

E-smart payments E-micropayments E-minipayments E-cash

35-An advantage of e-checks is that they:

operate outside the

traditional banking

industry.

involve complex

internal processing

systems.

contain much more

information then

traditional paper checks.

fit current business

practices, and so require

little process reengineering.

36-The nationwide batch-oriented electronic funds transfer system that provides for

interbank clearing of electronic payments for participating financial institutions is called

the:

Automated

Clearinghouse

Network.

electronic bill presentment

and payment network.

Receiving Depository

Financial Institution

Federal

Reserve

System.

37-Each of the following are ways to pay bills over the Internet EXCEPT:

biller direct. bill consolidator. customer service provider. online banking.

38-From the perspective of the billing firm, all of the following are advantages of e-billing

EXCEPT:

reduced processing

expense. universal

availability.

opportunity for targeted

advertising.

improved customer

service.

39-From the perspective of the customer, all of the following are advantages of e-billing

EXCEPT:

greater security than other

types of payments.

simplifies and centralizes

payment processing.

makes record

keeping easier.

lower

costs.

40-Characteristics of B2B payments include all of the following EXCEPT:

They are more likely to

involve disputes that

require significant rework

to resolve.

They require less

rigor and security

than B2C payments.

They are much

larger than payments

by individuals.

They are significantly

more complex than

payments by individuals.

Page 100: Test Bank

41-B2B payments are part of a much larger financial supply chain that includes all of the

following EXCEPT:

payment authorization. contract administration. procurement. financial reporting.

42-In financial supply chain management, the goal is to optimize all of the following

EXCEPT:

accounts receivable the physical supply chain accounts payable financial risks

43-Unlike the physical supply chain, ________ characterize the financial supply chains of

most companies.

greater accuracy efficiencies transparency inefficiencies

44-The vast majority of B2B payments are:

electronic

payments.

made using electronic funds

transfer (EFT)

made with letters of

credit. still made by paper

check.

45-Barriers inhibiting B2B electronic payment include all of the following EXCEPT:

strict standard

formats for

remittance

information.

a shortage

of IT staff.

a lack of integration of

payment and

accounting systems.

inability of trading partners to send

or receive electronic payments with

sufficient remittance information.

46-The process by which companies present invoices and make payments to one another

through the Internet is known as:

enterprise invoice presentment

and payment.

online accounts

payable.

electronic data

interchange.

online accounts

receivable.

47-For many firms, presentment and payment processes are all of the following EXCEPT:

costly. time consuming. error-prone. secure.

Page 101: Test Bank

48-According to a survey by Credit Research Foundation, the major reasons companies

turn to EIPP solutions are all of the following EXCEPT:

elimination of

billing disputes

better customer service for

billing and remittance.

improved data that can lower

invoice processing costs.

improved

cash flow.

49-________ is an EIPP many-to-many model with a third party acting as an intermediary,

collecting or aggregating invoices from multiple sellers and payments from multiple buyers.

ACH network Seller direct Buyer direct Consolidator

50-Among the forms of online B2B payments, ________ is second only to ACH in terms of

frequency of use.

letters of credit purchasing cards CTX Fedwire, or wire transfer

51-All of the following are advantages of using purchase cards EXCEPT:

purchasing departments

report productivity gains.

bills are consolidated

into a single payment.

improved

control. they are widely accepted in

international trade.

52-In global trade, a ________ is a written agreement by a bank to pay the seller, on

account of the buyer, a sum of money upon presentation of certain documents.

letter of credit micropayment bank check trade card payment

53-All of the following are benefits of letters of credit (LCs) EXCEPT:

Payment is assured

if all the terms in the

LC are complied

with.

Credit risk is reduced because

payment is accessed via the

creditworthiness of the issuing

bank.

LCs are cheap

and easy to

establish.

Political risk is reduced

if the LC is confirmed

by a bank in the seller's

country.

54-The current Internet sales tax moratorium in the United States applies to:

all retail sales all B2B clothing, food, and all sales made over the Internet if the

Page 102: Test Bank

made over the

Internet.

sales

only.

pharmaceuticals only. seller has no physical presence in the

state where the buyer lives.

55-Many B2C and B2B businesses rely on specialized third-party software and services to

calculate the taxes associated with a sale because:

of the

complexities.

they verify shipping

addresses.

tax laws rarely

change.

of government

regulations.

Chapter 13 Order Fulfillment

1-The implementation of most EC applications requires the use of support services.

True False

2-Amazon.com initially operated as a totally virtual company, but had to add physical

warehouses with thousands of employees in order to expedite deliveries and reduce order

fulfillment costs.

True False

3-Both EC and traditional retailing are based on the concept of "pull" operations that

begin with an order from a customer.

True False

4-Order fulfillment involves activities such as providing customers with what they have

ordered, delivering orders on time, and providing all related customer services.

True False

5-Front-office operations are the activities that support fulfillment of orders, such as

packing, delivery, accounting, and logistics.

True False

Page 103: Test Bank

6-Back-office operations are the operations involved in the efficient and effective flow and

storage of goods, services, and related information from point of origin to point of

consumption.

True False

7-The EC order fulfillment process begins when an order is received and verified as being a

real order.

True False

8-In B2C, customers usually validate that they will pay by prepaying using a credit card.

True False

9-When a customer returns items that have been ordered, the series of activities involved in

that return are called return logistics.

True False

10-The order fulfillment processes for B2B and B2C activities are similar.

True False

11-The major difference between e-logistics and traditional logistics is that traditional

logistics deal with the movement of large amounts of materials to a few destinations. E-

logistics shipments typically are small parcels sent to many customers' homes.

True False

12-The inability to deliver products on time is a typical problem in both off-line and online

commerce.

True False

13-The chance of supply chain problems, such as shipping the wrong items, is lower for EC

than for off-line commerce because of more advanced logistics support.

Page 104: Test Bank

True False

14-Supply chain problems, such as errors in demand forecasting, jeopardize order

fulfillment.

True False

15-Many problems along the EC supply chain stem from two sources: uncertainties in

forecasting demand and the need to coordinate several activities, internal units, and

business partners.

True False

16-Uncertainties in delivery time are a major cause of order fulfillment problems. RFID

can help by locating shipments in real time to minimize delays and enhance customer

service.

True False

17-The B2C order-taking process can be improved when it is done via EDI, EDI/Internet,

the Internet, or an extranet.

True False

18-B2C fulfillment may be more complex than that of B2B because it has at least six

dimensions of complexity rather than only two.

True False

19-High delivery costs are justified only if there is a high concentration of orders from

customers located in close proximity or if the value of the order is large enough.

True False

20-Delivery-value density is a decision support tool that helps determine whether it is

economical to deliver goods to a neighborhood area in one trip. The lower the density value,

the better.

Page 105: Test Bank

True False

21-According to researchers, culture, top management commitment, and technology

infrastructure lead to CRM success.

True False

22-The integration of ERP and CRM must include low-level data synchronization as well

as business process integration so that the integrity of business roles can be maintained

across systems and workflow tasks can pass between the systems.

True False

23-Benefits of CRM analytics lead to better customer relations in terms of sales and service,

better marketing strategies, lower inventory, and faster delivery. To derive these benefits, it

is necessary to properly collect and analyze relevant customer data.

True False

24-The primary customer-facing applications that support eCRM are self-tracking, FAQs,

and self-configuration.

True False

25-Data mining is an important analytic activity that involves sifting through an immense

amount of data to discover previously unknown patterns that can guide improvements in

order-fulfillment and CRM efforts.

True False

26-The implementation of most EC applications requires the use of all of the following

support services EXCEPT:

infrastructure and technology security manufacturing order fulfillment, delivery, and payment

27-Most EC applications are based on ________ that begin with an order, frequently a

________ order.

Page 106: Test Bank

pull operations;

standard

push operations;

customized

push operations;

standard pull operations;

customized

28-All services related to making sure a customer gets what he/she ordered within an

acceptable amount of time is called:

logistics. order fulfillment. front-office operations. back-office operations.

29-Packing, delivery, accounting and logistics are examples of:

logistics. back-office operations. front-office operations. order fulfillment.

30-Customer-facing activities or ________ are activities, such as advertising and order

taking, that are visible to customers.

back-office operations order fulfillment logistics front-office operations

31-The Council of Supply Chain Management Professionals defines ________ as "the

process of planning, implementing, and controlling the efficient and effective flow and

storage of goods, services, and related information from point of origin to point of

consumption for the purpose of conforming to customer requirements."

front-office operations back-office operations order fulfillment logistics

32-A typical EC fulfillment process involves all of the following activities EXCEPT:

Checking for in-stock

availability. Just-in-time inventory

management.

Making sure the

customer will pay.

Replenishment and

returns.

33-The administrative activities of order taking and fulfillment involve all of the following

activities EXCEPT:

sales quote. shipment release. order acknowledgment. accounts payable.

34-The major difference between e-logistics and traditional logistics is:

e-logistics deals with the traditional logistics deals traditional logistics e-logistics

Page 107: Test Bank

movement of large

amounts of materials to a

few destinations.

with movement of large

amounts of materials to a

few destinations.

applies only to

manufacturers.

outsources all

logistics

functions.

35-The inability to deliver products on time is a typical problem:

in both off-line

and e-commerce.

unique to e-

commerce.

in traditional logistics only

because the problem has been

solved in e-commerce.

in global operations, but it is

rarely a problem in domestic

operations.

36-________ are a major source of uncertainty in supply chains.

Internal manufacturing

schedules Demand

forecasts

Inventory delivery

schedules

Foreign currency

exchange rates

37-________ helps locate shipments in real time to minimize delays and enhance customer

service.

3PL RFID ERP CRM

38-Solutions to problems in the supply chain for EC companies are:

usually unique

for each EC

company.

generic across both

EC and traditional

companies.

critical during start-up but

usually become manageable and

insignificant as EC companies

mature.

so complex that most

EC companies cannot

afford to implement

them.

39-Improvements in EC order-taking:

are accomplished

solely through

implementing linkages

with payment systems.

are accomplished

solely through

improvements within

the organization.

may come from within the

organization, from

improved links with

logistics, and through

linkages with payment

systems.

are accomplished

solely through

improved links with

logistics.

Page 108: Test Bank

40-________ are useful in reducing inventory and decreasing the incidence of out-of-stocks.

Such systems also are useful in maintaining an inventory of repair items so repairs can be

expedited.

ERP

systems Warehouse management

systems

Replenishment

systems

Stockkeeping unit

systems

41-Automated warehouses for B2C companies are designed:

to facilitate the delivery

of small quantities of

product to a very large

number of customers.

to facilitate the delivery

of large quantities of

product to a small

number of customers.

to accommodate much

larger inventory levels

than traditional

warehouses.

to help transition

B2C companies

into B2B

companies.

42-________ are intermediaries that prepare goods for shipping on air carriers, trucks, or

other transport means.

Forwarders Outsourcers Expediters Shippers

43-All of the following apply to global logistics systems EXCEPT:

An increase in

global trading

created a need for

an effective global

logistic system.

The number of partners in such

situations is larger, which

increases the need for

coordination, communication,

and collaboration.

These systems are

secure when the

Internet is the

centric technology

platform.

Order fulfillment

problems tend to be

even larger in longer

supply chains that

cross country borders.

44-The second most often cited reason for customers not buying on the Web is:

not being able to see or try

on a product before buying

it.

the lack of a good

return mechanism.

concern that ordered

products won't be delivered

on time.

concerns

about fraud.

45-________ is an innovative order fulfillment strategy in which components for a product

come from two or more physical locations.

Leveraged shipments Merge-in-transit Order postponement Rolling warehouse

Page 109: Test Bank

46-A decision support tool that helps determine whether it is economical to deliver goods to

a neighborhood area in one trip is:

CRM model. ERP model. SCM analysis. delivery-value density.

47-________ recognizes that ________ are the core of a business and that a company's

success depends on effectively managing its relationships with them

Customer relationship

management; customers

Vendor relationship

management; vendor

Partner relationship

management; partners

Supplier relationship

management; suppliers

48-Major limitations of CRM include all of the following EXCEPT:

it is difficult to support

mobile employees with

some CRM applications.

it is difficult to

justify the

expense of

CRM.

it is difficult to

develop competitive

CRM applications.

it requires integration with a

company's other information

systems, which may be

difficult and expensive.

49-Metrics in customer service and CRM include all of the following EXCEPT:

site availability. on-time order fulfillment. product quality. response time.

50-Data analytics are a valuable tool because it can provide all of the following EXCEPT:

what-if scenarios. financial reporting customer segmentation groupings. profitability analysis.

51-Medium and large corporations organize and store data in a central repository called

a(n) ________ so that it will be easy to analyze later on, when needed.

knowledge system data base expert system data warehouse

52-Automating inquiry routing and answering queries requires ________ which can be

generated from historical data and from human expertise and stored for use whenever

needed.

knowledge forecasts analytics information

Page 110: Test Bank

53-To overcome the problem of finding buyers or sellers online, a company may use

________ such as B2Business.net or Yahoo! Small Business.

intelligent agents search engines directory services industry-focused newsletters

54-TRUSTe, BBBOnline, and Ernst & Young's trust service are used both in B2C and B2B

for all of the following reasons EXCEPT:

One cannot touch the

seller's products.

Trust is critical

for EC. Companies must outsource

trust services.

Buyers may not be

known to sellers.

55-The major reasons why many companies prefer to outsource some of the support

services include all of the following EXCEPT:

Lack of experience or

resources needed for many of

the support services.

The desire to

concentrate on the

core business.

For a sustainable

competitive

advantage.

The need to have

services up and

running rapidly.

Chapter 14 E-Commerce Strategy and

Global EC

1-Strategies are based on performance indexes that are used as targets and measures of

success.

True False

2-An organizational strategy is a detailed plan for how a business is going to accomplish its

mission, what its goals should be, and what plans and policies it will need to accomplish

these goals.

True False

3-Any contemporary strategy-setting process must include the Internet.

True False

Page 111: Test Bank

4-In Porter's view, the majority of the Internet's impacts on the five competitive forces

have been positive.

True False

5-Researchers have suggested that more extensive strategic information systems planning

in an uncertain environment produces greater planning success.

True False

6-No matter how large or how small the organization, the strategic planning process forces

corporate executives, a company's general manager, or a small business owner to assess the

current position of the firm, where it should be, and how to get from here to there.

True False

7-In the strategy initiation phase, the organization examines itself, its environment, and the

potential contribution that the Internet and other emerging technologies can make to the

business.

True False

8-A value proposition is actually a financial statement that summarizes the annual revenue

and profit targets.

True False

9-The two major and successful Internet-based businesses Google and eBay have similar

core competencies.

True False

10-SWOT analysis is one method for scanning the business environment to collect and

interpret relevant information about direct competitors, indirect competitors, and potential

competitors.

True False

Page 112: Test Bank

11-In the strategy implementation phase, general long-term plans are developed for

carrying out the projects that had been agreed on in the strategy formulation phase.

True False

12-Resource allocation refers to the processes of making the selected applications and

projects a reality, such as hiring staff; purchasing equipment; licensing, purchasing, or

writing software; and contracting vendors.

True False

13-Strategy assessment is the continuous evaluation of progress toward the organization's

strategic goals, resulting in corrective action and, if necessary, strategy reformulation.

True False

14-The basic method in scenario planning is that a group of analysts generates simulation

games for policy makers. The games combine projected factors about the future, such as

demographics, geography, and industrial information with plausible alternative social,

technical, economic, and political trends.

True False

15-A business plan is a tool that is an alternative to narrowly focused financial assessments

by measuring organizational performance in four areas: finance, customers' assessments,

internal business processes, and learning and growth.

True False

16-The primary reasons for writing a business plan are to acquire funding and

nonfinancial resources, to recruit senior management, and to force the business owner to

think ahead, set achievable goals, seek out and analyze competitors.

True False

17-Entrepreneurs in start-up companies use business plans to get funding from investors,

such as a venture capitalist or a bank.

Page 113: Test Bank

True False

18-The information systems strategy is set primarily by determining what information and

associated information systems are required to carry out the business strategy.

True False

19-In e-commerce, evidence shows that there is always a real advantage to being the first

mover in an industry or market segment.

True False

20-The disadvantages a brick-and-mortar company faces by creating an independent

division are that it may be very costly, risky, or both.

True False

21-Disposing of excess equipment was the motivation behind the implementation of

forward e-auctions at General Motors. This is an example of a technology-driven strategy

because GM had a specific problem that an EC application could solve.

True False

22-In a click-and-mortar business, the allocation of resources between off-line and online

activities can create difficulties, especially in sell-side projects because the two activities

could be competitors.

True False

23-Having a strong project champion on an e-commerce project is seldom important to the

success of the project because of inter-personal conflicts caused by a powerful champion.

True False

24-The purpose of GlobalNetXchange, which was founded by major retailers such as Sears,

was to reduce procurement costs and product prices for its members while making the

purchase process more efficient.

Page 114: Test Bank

True False

25-At the implementation stage, firms may need to dramatically change business processes

to accommodate the changes an EC strategy brings. In those instances, business process

reengineering (BPR) is usually necessary.

True False

26-For ________ companies, it may be even more important to change strategies quickly.

service retail traditional pure play

27-Capabilities of the Internet that have made it more difficult for companies to capture

profits include all of the following EXCEPT:

The Internet makes

information widely

available.

The Internet makes

it easier to make

secure payments.

The Internet reduces the

difficulty of purchasing,

marketing, and

distribution.

The Internet allows buyers

and sellers to find and

transact business with one

another more easily.

28-Projections of the business technological, political, economic, and other environments

are called:

competitive intelligence value propositions forecasts. SWOT analysis

29-The unique combination of resources, experiences, and expertise within a particular

firm is called their:

corporate strategy. competitive advantage. functional strategy. core competencies.

30-All of the following are elements of a company's strategy EXCEPT:

forecasts. day-to-day operations. competitor analysis. company analysis.

31-All of the following about the strategic planning process are true EXCEPT:

The process of The strategic The strategic planning process The strategic

Page 115: Test Bank

developing a

strategy maybe

even more

important than the

strategy.

planning process

is cyclical and

continuous.

forces corporate executives, a

company's general manager, or a

small business owner to assess the

current position of the firm, where it

should be, and how to achieve

objectives.

planning process

begins with

strategy

formulation.

32-A specific outcome of the strategy initiation phase is the ________, which includes the

vision, mission, value proposition, goals, capabilities, constraints, strengths, and

weaknesses of the company

functional strategy core competency company analysis value proposition

33-A specific outcome of the strategy initiation phase is a clear statement of the company's

________, which summarizes the customer segment, competitor target, and the core

differentiation of one's product from the offerings of competitors.

functional strategy core competency value proposition company analysis

34-Google's ________ is its expertise in information search technology.

core competency company analysis functional strategy value proposition

35-Many of the outcomes from the first two phases of the strategic planning process, such

as a determination of goals, competitor analysis, strategic opportunities, and risk analysis

come together in a ________.

SWOT plan technology audit value proposition business plan

36-________ is the process of making the selected applications and projects a reality by

hiring staff; purchasing equipment; licensing, purchasing, or writing software; and

contracting vendors.

Strategy assessment Project management Resource allocation Project planning

37-An analytical tool in which a company looks for points of differentiation between

competitors and itself is called:

Page 116: Test Bank

competitor analysis grid strategy assessment scenario planning SWOT analysis

38-________ is the continuous evaluation of progress toward the organization's strategic

goals, resulting in corrective action and, if necessary, strategy reformulation.

Strategy assessment Competitor analysis grid Scenario planning SWOT analysis

39-A management tool that assesses organizational progress toward strategic goals by

measuring performance in a number of different area is:

SWOT analysis. balanced scorecard. Web analytics. BCG growth-share matrix.

40-After four years in business, a magazine publisher decides to add the online distribution

of its magazine to its existing traditional publishing business. The company would need to

develop a:

business case. business strategy. business plan. business metric.

41-All of the following are situations when a business plan should be done EXCEPT:

When an existing

company is planning

to create a separate

division.

When an existing

business is

deploying a CRM

system.

When an existing

company is planning to

launch the company in a

new direction.

When a new business

is seeking start-up

funds and other

resources.

42-Which of the following about business plans and business cases is NOT correct?

One difference is that the business

plan concentrates on the viability of a

company, whereas a business case

assesses both viability of the project

and the fit of the initiative with the

firm's mission and goals.

The audiences are

the same senior

management and the

board or directors.

The content of

a business case

is similar to

that of a

business plan.

The purposes are

the same to

justify a specific

investment of

funds.

43-The risks of being a first mover include all of the following EXCEPT:

the risk that

the move

the high cost of

pioneering EC

over the long run first

movers are substantially

the chance that a second wave of

competitors will eliminate a first

Page 117: Test Bank

will be too

late.

initiatives. less profitable than

followers.

mover's lead through lower cost

and innovation.

44-Factors that determine whether a first mover succeeds or fails in the EC marketplace

include all of the following EXCEPT:

the nature of the

product.

whether the company can be the

best in the market.

the size of the

opportunity. the speed of

market entry.

45-The most efficient way to expand an organization's scope is:

by expanding the

firm's appeal to a

new set of

customers.

by increasing the

size or scale of

the business.

to introduce new products or

services into new or existing

markets without increasing

production facilities or staff.

to buy a company with

complementary

products or services.

46-Separating a company's online operations into a new company makes sense in each of

the following situations EXCEPT:

when the subsidiary can

be created without

dependence on current

operations and legacy

systems.

when the company is

unable to form new

alliances, attract new

talent, or raise

additional funding.

when a new business

model needs to be

developed apart from the

constraints of current

operation.

when the volume

of anticipated e-

business is large.

47-Rite Aid, a click-and mortar firm, enhanced its EC future by:

Creating a separate

company.

Creating an online

brand.

Forming a joint

venture. Buying an equity stake in a

existing EC company.

48-Incorrect approaches to EC strategy selection include all of the following EXCEPT:

indiscriminately funding many

projects and hoping for a few

winners.

"trend-surfing," or following

the crowd to the newest and

most fashionable idea.

betting it all in a

single, high-stakes

initiative.

using a late-

mover

strategy.

49-The most dangerous risk to a company engaged in e-commerce is:

Page 118: Test Bank

customer and business partner

risk. threat posed by hackers. negligent loss of data. business risk.

50-All of the following determine the degree of collaboration between off-line and online

activities in a business EXCEPT:

the pricing

strategy.

the use of innovative processes

that support collaboration.

the ability of top management to

introduce change properly.

corporate

culture.

51-The ________ pricing strategy means adding up all the costs involved, such as material,

labor, rent, overhead, and so forth, and adding a percentage mark-up as profit.

cost-plus revenue markup price percentage competitor model

52-Internet technologies can provide consumers with easier access to pricing information,

which increases their bargaining power. To remain competitive and profitable, sellers need

smarter pricing strategies, which include all of the following strategies EXCEPT:

greater precision in

setting prices.

more adaptability in

changing prices. reducing

prices.

new ways of customer segmentation

for differentiated pricing.

53-Implementing EC often requires significant investments in infrastructure. Therefore, a

good way to start is to undertake ________.

a multi-divisional EC

project

a large, non-trivial EC

project one or a few small EC

pilot projects

a single division EC

project

54-A ________ is a form of business alliance composed of several business partners that

share the costs and resources for the development or production of a product or service.

supply chain temporary corporation co-opetition virtual corporation

55-The most important objectives of strategic assessment are all of the following EXCEPT:

Determine if the EC

strategy and projects are

still viable in the current

environment.

Measure the extent to

which the EC strategy and

ensuing projects are

delivering what they were

Reassess the initial

strategy in order to

learn from mistakes

and improve future

Identify what

competitors are

doing to avoid head-

on competition.

Page 119: Test Bank

supposed to deliver. planning

Chapter 15

1-From 1995 through 2000, many EC projects and start-up companies were funded with

little analysis of their business viability or finances.

True False

2-The result of the rush to invest in EC projects and start-up companies was the 2001—

2003 "dot-com bust," when hundreds of EC startups went out of business and the stock

market crashed.

True False

3-After the dot-com bust, most IT executives acquired the knowledge and tools to do ROI

calculations on proposed EC investments.

True False

4-One reason why EC justification is needed is that companies now realize that EC is not

necessarily the solution to all problems.

True False

5-According to a CIO Insight report, EC justification decreases the credibility of EC

projects.

True False

6-One basic way to categorize different EC investments is to distinguish between

investment in infrastructure and investment in specific EC applications.

True False

Page 120: Test Bank

7-Infrastructure investments are made for the short-term because of frequent technological

changes.

True False

8-Cost-benefit analysis is frequently assessed by return on investment (ROI), which is also

the name of a specific method for evaluating investments.

True False

9-All EC investments need to be formally justified to insure that they align with the

company's competitive strategy.

True False

10-Metrics are used to describe costs, benefits, or the ratio between them and need to be

defined properly with a clear way to measure them.

True False

11-Key performance indicators (KPI) are used to qualitatively track critical metrics or

success factors.

True False

12-A major difficulty in justifying EC projects is that many costs and benefits are

intangible and therefore very difficult to measure.

True False

13-Creating a competitive advantage, providing a benefit to society, and improving the

company's image are examples of tangible benefits that might be realized from an EC

project.

True False

Page 121: Test Bank

14-Cannibalization occurs when a new EC initiative produces substantial online sales, but

traditional sales fall such that no increase in total revenue occurs.

True False

15-The results of any investment justification in eCRM depend on the time frame used to

measure changes in productivity.

True False

16-Because many EC investments in eCRM take five to six years to show significant

positive results, real productivity gains often do not get measured correctly.

True False

17-In preparing the business case for EC investment, managers should examine the

potential additional revenues that are expressed in the revenue models, such as increased

revenues via products or services from a larger global market because of more effective

product marketing on the Web.

True False

18-The ROI method uses a formula that divides net revenues by the initial cost. The result

is a ratio that measures the ROI for each year or for an entire period.

True False

19-In an NPV analysis, analysts convert future values of benefits to their present-value

equivalents by discounting future cash flows at the risk-free rate set by the Federal Reserve

Bank.

True False

20-Given the diversity of activities involved in e-procurement, the metrics used to measure

the value of e-procurement must reflect how well each process is accomplished; and take

into consideration whether the company is a buyer or seller.

True False

Page 122: Test Bank

21-According to recent surveys of eCRM applications, there are been mixed payoffs, but a

majority of companies have demonstrated a significantly positive ROI for their eCRM

investments.

True False

22-Large companies often have several integrated intranet and other information systems

that determine the success of a Web portal. Thus, the justification for a Web portal must

focus on both business ROI and technology ROI.

True False

23-To comply with the Sarbanes-Oxley Act, public companies must document every

internal process and external effect that will have an impact on their financial health,

which provide a robust foundation from which to develop a budget.

True False

24-Critical elements that can affect the value of EC across cultures are perceived trust,

consumer loyalty, regulation, political influences, and even the content of online ads.

True False

25-Developing economies often face power blackouts, unreliable telecommunications

infrastructure, undependable delivery mechanisms, and a relatively few customers who

own computers and credit cards. These limitations can be overcome when predicting EC

investment payoffs by using a combination of break-even analysis and NPV.

True False

26-CIOs need to effectively communicate the value of proposed EC projects in order to

gain approval for all of the following reasons EXCEPT:

Some large companies,

and many public

organizations, mandate a

formal evaluation of

Companies now

realize that EC is

not necessarily the

solution to all

Demand for expanding

or initiating e-business

projects is no longer

strong so there are

The success of EC

projects may be

assessed in order to

pay bonuses to those

Page 123: Test Bank

requests for funding. problems. fewer requests for

funding.

involved with the

project.

27-One basic way to categorize different EC investments is to distinguish between

investments in infrastructure and investment in specific EC applications because benefits

from infrastructure investments:

have a low

return. are made for the long-

term.

depend on the EC

applications.

are very

complex.

28-The basic reasons that companies invest in IT and EC are all of the following EXCEPT:

to increase customer

satisfaction and retention.

to improve business

processes.

to reduce time-

to-market. to justify new marketing

campaigns.

29-Not all EC investments need to be formally justified. All of the following are cases where

formal evaluation may not be needed EXCEPT:

When the value of the

investment is relatively

small for the

organization.

When the EC project is

mandated and must be

done regardless of the

costs and benefits.

When the relevant data

are not available, are

inaccurate, or are too

volatile.

When competitors

have made that

type of investment.

30-Metrics are used to describe all of the following EXCEPT:

standards. the ratio of costs to benefits. costs. benefits.

31-Productivity benefits from using EC are difficult to measure because:

there is no time

lag in EC gains.

qualitative benefits

do not count.

EC gains in certain areas of the

company may be offset by losses in

other areas.

the payoffs are

too short.

32-The relationship between EC investment and organizational performance is:

shared with other investments. direct. not measurable. indirect.

Page 124: Test Bank

33-EC costs and benefits can be classified into two broad categories:

short-term and capital. tangible and intangible. direct and routine. operational and strategic.

34-The New York Metropolitan Transit Authority (MTA) did not need to open another

airport for almost two decades, even though air traffic had tripled because of productivity

gains derived from improved IT systems. IT systems added by the MTA played critical

roles in ticket reservations, passenger and luggage check-in, crew assignment and

scheduling, runway maintenance and management, and gate assignments. This case

illustrates that:

Tangible benefits can

be complex, yet

substantial.

Tangible costs can be

high, yet payoffs can be

achieved quickly.

Intangible benefits

can be complex, yet

substantial.

Intangible costs can be

high, yet payoffs can be

achieved quickly.

35-An important category of intangible benefits is ________ factors that include comfort to

employees, impact on the physical environment, changes to the power distribution in an

organization, and preventing invasion of the privacy of employees and customers.

ecosystem transactional social subsystem net-enhanced

36-In B2C, an example of a tangible EC metric from the buyer's perspective is:

ease of use of EC. profit per customer. cost/price of the product. convenience in purchasing

37-For Governments, an example of an intangible EC metric is:

lower tax

rates.

increase in participation in government

programs.

risk

reduction. reelection of

candidates.

38-The major steps in the process of justifying large-scale EC and IT projects include all of

the following EXCEPT:

Lay an appropriate

foundation for analysis

with your vendor, and

then conduct your ROI.

Document and verify all

figures used in the

calculation. Clarify all

assumptions.

Be careful not to over-

estimate cost and under-

estimate benefits (a

tendency of many

managers).

Do not leave out

strategic benefits,

including long-

term ones.

Page 125: Test Bank

39-Types of costs and cost issues that need to be considered in justifying EC investments

include all of the following EXCEPT:

initial upfront costs. the allocation of indirect costs. opportunity costs. system operating costs.

40-Traditional methods for evaluating EC investments include all of the following

EXCEPT:

Discount rate ROI NPV Break-even or payback period

41-Dan Welch, who owns three World Cup Coffee shops in Portland, Oregon, estimates

that his free Wi-Fi network has added 10 percent to his overall revenue. Welch credits Wi-

Fi consumers with spending three times as much on food compared with the average

consumer. This is an example of:

technology ROI. business ROI. technology IRR. business NPV.

42-Pouilly's Poodle Shop wants to produce monthly cash flows from its Internet Doggie-

Cam investment. The most appropriate method for assessing this investment is:

Break-even analysis. Internal rate of return (IRR). Total cost of ownership. Payoff.

43-By calculating the difference between TCO and TBO, one can compute the ________ of

an IT investment.

Internal rate of return (IRR) Total cost of ownership Payoff Break-even analysis

44-The disadvantage of the NPV method for evaluating EC and IT is:

it may be difficult to

classify outlays as expenses

or investments.

the true benefits

are difficult to

measure.

it is difficult to compare

projects of unequal lifes

pans or sizes

it assumes

reinvestment at the

same rate.

45-The following direct metrics indicate progress in e-procurement EXCEPT:

increased order

fulfillment rate.

decreased number of rejects

received from suppliers.

increased on-time

deliveries. reduced

inventory costs.

Page 126: Test Bank

46-Justifying information security projects:

should focus on

defending against

external threats such

as hackers and

malware.

is not needed because it is well-

known that preventing network

security problems is less labor

intensive than cleaning up virus

infections.

is not done

because ROI

calculators are not

available.

should be done

because employee

security training is

usually poorly done.

47-The average-cost curve (AVC) of physical products and digital products:

are different because the AVC of

digital products declines as quantity

increases forming a L-shape, while

the AVC of physical products is U-

shaped.

are both

L-

shaped.

are both

U-

shaped.

are different because the AVC of

physical products declines as

quantity increases forming a L-

shape, while the AVC of digital

products is U-shaped.

48-When computing agency cost, companies should consider:

only production-related

costs and ignore

transaction costs.

ignore production-

related costs and

transaction costs.

only transaction costs

and ignore production-

related costs.

both production-

related costs and

transaction costs.

49-Transaction costs include all of the following EXCEPT:

Search costs

incurred by buyers

and sellers in

locating each other

and specific

products and

services.

Production

costs incurred

for labor and

overhead.

Negotiation costs result from

meetings, communication-

related expenses, exchanges of

technical data or brochures,

entertainment, and legal costs.

Monitoring costs incurred

when buyers and sellers

make sure that the

exchange proceeds

according to the terms

under which the sale was

made.

50-McAfee allows users of its VirusScan virus-detection software to automatically update

the latest security patches online. This is an example of ________ to attract customers who

value this automatic update.

product or service differentiation. core competency. competitive advantage. agility.

Page 127: Test Bank

51-A Web-based seller of CDs carefully monitors the prices charged by its competitors for

identical products. This company has the ability to change a given price within three

minutes in response to changes by competitors. This is an example of EC:

competitive advantage. agility. core competency. product or service differentiation.

52-All of the following are critical success factors (CSFs) of the Old Economy EXCEPT:

Create new partnerships, stay

with core competency.

Deliver high-

value products.

Build market share to get

economies of scale.

Compete to sell

product.

53-As a company moves to incorporate an online presence with its traditional brick-and-

mortar operation, it adds the costs related to training for all personnel in the capabilities of

the EC system and a new advertising campaign to announce its new site to the costs directly

associated with building the new Web presence. In this case, training and advertising are

examples of:

direct costs. transaction costs. complementary investments. indirect costs.

54-One of the strengths of EC is the ease with which its adopters can reach a global

population of consumers. However, EC-driven businesses must consider the critical

elements affecting the value of EC across cultures. Those elements include all of the

following EXCEPT:

perceived trust. delivery delays. political influences. consumer loyalty.

55-All of the following apply to EC in developing economies EXCEPT:

The potential volume of

transactions in developed

countries can make EC

investments more attractive

for established firms than

new firms because

established firms have

already recovered the costs

of their IT infrastructures.

Developing

economies struggle

with various issues

that create too

many business and

technology risks to

justify investment

in those economies

at this time.

Developing economies

often face power

blackouts and unreliable

infrastructure and

delivery mechanisms

creating limitations that

make it difficult for firms

to predict whether EC

investments will pay off,

and when.

Developing

economies, such as

China and India,

represent a

significant

opportunity for EC

to connect

businesses to

customers, as well

as other businesses.

Page 128: Test Bank

Chpater 16

1-Unlike the brick-and-mortar marketplace, the failure rate for online companies is low.

True False

2-Online businesses may be pure play companies or click-and-mortar companies that add

online projects, such as e-procurement or selling online, as additional marketing channels.

True False

3-To create successful entrepreneurial ventures in EC, Maier suggests that starting small

with many founders is the best option.

True False

4-The first step is creating a new company is to identify a consumer or business need in the

marketplace and an innovation to address that need.

True False

5-Many good ideas and realistic initiatives have failed because of poor execution due to the

lack of sufficient business skills by the owners or principals of the business.

True False

6-As a general guideline, although virtually anything is available for sale on the Internet,

the degree of sales success is somewhat dependent on the type of item or service being

offered for sale and how it can be delivered.

True False

7-Medium and large businesses, or those seeking external funding, must have an informal

business plan.

True False

Page 129: Test Bank

8-The primary reason an entrepreneur writes a business plan is to acquire funding from a

bank, an angel investor, a venture capitalist, or the financial markets.

True False

9-Some entrepreneur may simply invest personal funds from savings, personal lines of

credit, or a house mortgage since these sources of "bootstrap funding" are typically enough.

True False

10-When the entrepreneur's personal funds are insufficient, the entrepreneur will go to

friends, family members, or to financial institutions.

True False

11-An important source of financial support or direct funding, for pre-VC firms is an

incubator.

True False

12-Venture capitalists tend to invest in companies that have identified what seems to be an

outstanding business opportunity, have taken some action to make the opportunity happen,

such as written a new software application or secured a patent , and need an infusion of

funds and management expertise to expand and launch the business.

True False

13-There is a serious downside for start-up businesses that acquire venture capital because

they lose control over the business.

True False

14-Once the company is well known and successful, it can go to a stock exchange to raise

money via an initial public offer or IPO.

True False

Page 130: Test Bank

15-Organizational transformation is a comprehensive concept that implies not only a major

change, but also a sharp break from the past.

True False

16-Business process management (BPM) systems monitor the execution of the business

processes so that managers can analyze and change processes in response to data, rather

than on just a hunch.

True False

17-Transforming an existing business to an e-business means a manager must change

business processes, but not the way people work or communicate.

True False

18-An informational Web site provides opportunities for the customers and the business to

communicate and share information.

True False

19-Selecting a domain name is an important marketing and branding consideration for a

business because it will be the business's online address and create an identity for the

business.

True False

20-Up-to-the-minute dynamic content is what attracts new and returning customers

("eyeballs") and makes them stay longer ("stickiness"), which builds customer loyalty.

True False

21-Because podcasts are audio-based media files, it enables companies to deliver audio-

specific content, including music, speeches, radio-style presentations, and more.

True False

Page 131: Test Bank

22-Amazon.com offers personalize content by tracking visitors' behavior via cookies, which

is used to generate dynamic Web pages that recommend products based on previous

purchases and recently viewed items. Amazon.com offers this personalized content because

it is very inexpensive and does not impact performance.

True False

23-Web designers execute successful site navigation through consistency and through

navigation aids such as a navigation bar, a navigation column, a site map, and search tools.

True False

24-Web site usability means that people who use the Web site can do so quickly and easily

to accomplish their tasks and may also consider such factors as cost-effectiveness and

usefulness.

True False

25-Card-not-present (CNP) transactions increase the risk and uncertainty of online

transactions, which increases transaction fees to offset the increased risks.

True False

26-When creating a new business, the first step is to:

acquire financing needed

to make the business

successful.

investigate all

existing

opportunities.

identify a consumer or

business need that isn't

presently being met.

write a

business case

or plan.

27-The principle reason for writing a business plan is to:

provide strategic

direction to

employees.

acquire

external

funding.

provide an operational

framework for the

business.

help the founders remember

what they are trying to

accomplish.

28-The key difference between an e-business plan and a traditional business plan is that the

entrepreneur must:

Page 132: Test Bank

develop a

ten-year

plan.

understand that the

Internet is a unique

sales channel.

understand all aspects of

the technology required to

implement the plan.

understand that traditional

rules do not apply when doing

business on the Internet.

29-The difference between a business plan and a business case is:

a business case

is a part of

every business

plan.

all new businesses should have a

business plan, but only existing

businesses planning a major EC

or IT initiative should develop a

business case.

all businesses need a

business case, but only

new businesses need a

business plan.

business cases are

brief and general,

while business plans

are long and

detailed.

30-A(n) ________ is a wealthy individual who contributes personal funds and possibly

expertise at the earliest stage of business development.

incubator venture capitalist angel entrepreneur

31-A(n) ________ is a company, university, or nonprofit organization that supports

promising businesses in their initial stages of development.

incubator angel entrepreneur venture capitalist

32-________ is money invested in a business by an individual or a group of individuals in

exchange for equity in the business.

start-up funding operating capital venture capital advance funding

33-The greatest difficulty in dealing with venture capital is:

finding the money a

venture capitalist will

require.

finding a willing

venture capitalist.

the loss of control a

venture capitalist

demands.

relocating the

business to an

incubator.

34-The relationship between stock price and when an investor invests is:

IPO investors will

pay the highest price

per share.

the entrepreneur will pay

the highest price per

share

the venture capitalist

will pay the highest

price per share.

the angel investor will

pay the highest price

per share

Page 133: Test Bank

35-Chaplin's Pet Store has been in business for many years. Chaplin, the present owner,

decides to open an online sales channel where he can advertise and sell the same gourmet

pet food. This is an example of adding:

a portal. a storefront. e-procurement. a reverse auction

36-Reprise Electronics, a conglomerate that manufactures and sells all kinds of electronic

goods under several brand names, currently has separate Web sites for each of its brands.

The company decides to bring all of the Web sites together through a single site that, in

addition to providing links to the brand pages, will also provide general information about

how to select electronic merchandise and informational pages about the Reprise company

today and its management team. This is an example of adding:

a reverse auction. e-procurement. a portal. a storefront.

37-In an organizational transformation:

the change may affect

only one or a few of

the functional areas

of the business.

there is a change in

outlook, but rarely a

change in procedures or

investment in

infrastructure.

there are incremental

changes to the ways

things have always

been done.

there is always a sharp

break with the past and

every aspect of the

business will probably

change.

38-A(n) ________ Web site does little more than provide information about the business

and its products.

dynamic informational transactional interactive

39-A major entertaining company has four studios that have been in the same location for

more than ten years. The company includes a page on its Web site with addresses, phone

numbers, and general e-mail addresses for each of these studios. None of this information

has changed since the Web site was developed. This is an example of ________ content.

dynamic organizational functional static

40-Secondary content that offers a coupon, rebate, or special service is called:

Page 134: Test Bank

cross-selling. up selling. comment. promotion.

41-Reviews, testimonials, expert advice, or further explanation about the product are

called:

comment. promotion. cross-selling. up selling.

42-The ________ is how Web pages are organized, labeled, and navigated to support

browsing and searching.

Web design information architecture Web site map Web layout

43-Creating content that offers upgraded or more expensive versions of the product is

called:

comment. promotion. up selling. cross-selling.

44-One of the first decisions to be made in building a Web site is:

whether to provide personalized

content who will

host it.

the domain

name

how to protect the Web site from

hackers

45-A(n) ________ is an exact duplicate of the original Web site physically located on a Web

server on another continent.

backup site a download site mirror site a hot site

46-The Web hosting option under which the business acquires the hardware, software,

staff, and dedicated telecommunications services needed to host a Web site is called:

mirror hosting self-hosting. using a storebuilder. ISP hosting.

47-The ________ is the name-based address that identifies an Internet-connected server.

URL name host name domain name IP address

Page 135: Test Bank

48-Content not available anywhere else on the Web is called:

restricted content. reserved content. premium content. commodity content.

49-The concept of consistency in Web site design includes:

making sure the

messages sent to

customers who contact

the company are

consistent.

making sure customers

are treated consistently

when they contact

customer service.

making sure Web

pages look the same

no matter which

browser a customer is

using.

making sure all

visitors consistently

find what they are

looking for.

50-All of the following are advantages of building Web sites internally EXCEPT:

it allows the

company to use in-

house expertise.

it provides the

fastest speed to

market.

it allows the company to

protect proprietary

technology.

it allows the company to exert

greater control on the process

and the resulting site.

51-Banks are more selective about who gets an account for accepting credit cards online

because

online transactions do

not produce much

revenue for banks

dot com failures have made

banks less willing to work

with online companies.

fees are higher

for online

processing

CNP transactions

are less secure and

riskier.

52-In addition to providing an easy mechanism for buying books, the Amazon.com Web

site is easily searchable by book title and author. It also has book reviews and suggests titles

based on previous purchase activity. These enhancements make the Amazon site a favorite

for readers. This is an example of:

internal Web site promotion search engine optimization using a meta tag. CNP

53-________ offers one of the most popular storefront packages at with three levels of

merchant solutions: starter, standard, and professional.

Google eBay Yahoo! Amazon.com

54-Options for acquiring storefronts include all of the following EXCEPT:

Page 136: Test Bank

Build from

scratch.

Build them from

components

Build from templates or

storebuilders. Join a

mall.

55-Before choosing the appropriate Web site development option, you need to consider all

of the following issues in order to generate a list of requirements and capabilities EXCEPT:

What might be the

reaction of competitors?

Can customers

place orders

online?

What kinds of products or

services will the business sell

online?

Who are the target

customers?

Chapter 17

1-For many e-businesses, a majority of their customer online traffic comes from search

engines.

True False

2-All marketing methods used to increase the ranking of a company's Web site in the

search results are ethical.

True False

3-Companies use search engine marketing (SEM) methods to increase their chance of

"getting found" among competing Web sites.

True False

4-The volume of e-mail spam has decreased because of the widespread use and

effectiveness of antispam software and ISP spam filters.

True False

5-Spam sent to blogs, cellular phones, or other types of messaging media to promote

products or services is called media spam.

True False

Page 137: Test Bank

6-Web pages that have been created to trick search engines into offering poor-quality

results are referred to as search engine spam.

True False

7-Acts or activities that are unethical are also illegal.

True False

8-Creations of the mind, such as inventions, literary and artistic works, and symbols,

names, images, and designs, used in commerce are known as private property.

True False

9-Questions or disputes about the legality of spam can be resolved easily by referring to

relevant laws.

True False

10-Legal precedents are decisions by judges that may be used as standards in similar legal

cases that follow.

True False

11-Political spam, regardless of its content, is legal in the United States because it is a form

of speech protected by the Constitution.

True False

12-Significant changes in the nature of business or crimes lead to new laws because laws

must remain responsive to new threats or abuses.

True False

13-Due process is a legal claim that others not interfere with a protected interest, such as

privacy, intellectual property, or free speech.

Page 138: Test Bank

True False

14-Because of intellectual property law, the recording industry can file lawsuits for

copyright infringement against YouTube or MySpace if it profits from the recording

industry's property without authorization and compensation.

True False

15-A company can be sued for libel if its EC site contains a defamatory or untrue statement

that causes damage to a person or another company.

True False

16-A corporate code of ethics should specify whether the company allows employees to set

up their own Web pages on the company intranet and the rules for private e-mail usage

during working hours.

True False

17-EC web site content needs to be reviewed by attorneys with cyber law expertise to

ensure that there nothing is unethical or illegal and that all required statements and

disclaimers are properly included.

True False

18-Ethical principles that apply to the collection and use of personal information, such as

notifying customers of information practices before collecting it, do not apply to

information collected in e-commerce.

True False

19-As a defense against abusive trackback tactics by profit-motivated spammers,

trackback spam filters are implemented in blog publishing systems.

True False

Page 139: Test Bank

20-Blocking tools cannot stop adware or software that gets bundled with other popular

applications, such as Kazaa, from delivering pop-up ads because they originate from the

desktop, and not the browser.

True False

21-Unlike hate sites that can cause problems for corporations or lead to lawsuits, fan sites

are beneficial and welcomed by the entertainment industry.

True False

22-Online merchants reject about 10 percent of incoming orders because of suspicions of

fraud; and about 3% of accepted orders turn out to be fraudulent.

True False

23-Electronic signatures improve EC by helping to distinguish between legitimate and

fraud transactions and build trust and predictability needed by parties doing business

online.

True False

24-Several public organizations and private companies attempt to protect consumers and

build users' trust and confidence in the Internet through a seal of quality, such as

Trustmark and BBBOnline.

True False

25-Online sellers can better protect themselves against fraud by requiring customers whose

billing address is different from the shipping address to call their bank and have the

alternate address added to their bank account.

True False

26-Approximately what percent of Internet shoppers use search engines to find products

and services?

75% 50% 10% 25%

Page 140: Test Bank

27-Sending spam that disguises a sales pitch to look like a personal e-mail so that it will

bypass e-mail spam filters violates the:

Controlling the Assault of

NonSolicited Pornography and

Marketing (CAN-SPAM) Act.

Computer Fraud

and Abuse Act

(CFAA)

Children's Internet

Protection Act

(CIPA)

First

Amendment

28-To defend against unethical and illegal business tactics that exploit EC operations,

Google, MSN Search, and Yahoo have turned to all of the following aggressive measures

except:

Banned

violators'

sites.

Built algorithms that check for and

penalize deceptive rank-boosting

practices.

Implemented spam site

reporting systems. Implemented

honeypots.

29-Having control over the collection, storage, and dissemination of personal information is

included in the category of:

duties rights privacy property

30-A decision by a judge that may be used as a standard in similar cases that follow is

referred to as:

legal precedent common law intellectual property tort

31-Critics of political spam are against its use because they believe that:

all spam is a nuisance, clogs mail

servers, and creates security risks

it increases candidates'

dependence on wealthy

fundraisers,

it is

illegal

it leads to political

favoritism

32-Due process is

a legal obligation not

to interfere with a

protected interest

a guarantee of basic

fairness and fair

procedures in legal

action.

a legal claim that others

not interfere with a

protected interest.

a set of enforceable

rules and

regulations.

Page 141: Test Bank

33-A duty is

a legal obligation not to

interfere with a

protected interest

a legal claim that others

not interfere with a

protected interest.

a guarantee of basic

fairness and fair

procedures in legal

action.

a set of enforceable

rules and

regulations.

34-Property rights relevant to e-commerce include all of the following EXCEPT:

The right to bring

criminal charges against a

violator.

The right to benefit,

transfer, or sell the

property.

The right to exclude

others from the

property.

Control of the use

of the property.

35-A music company can file a ________ against YouTube and MySpace for any

interference with the ability to profit from its IP or for profiting from the recording

industry's property without authorization and compensation

lawsuit or civil charge nuisance charge negligence charge criminal charge

36-________ enable an organization that has suffered a loss due to spammers to bring a

lawsuit against spammers responsible for the loss.

Civil laws CFAA Common laws Criminal laws

37-Intellectual property law is the area of law that is associated with each of the following

EXCEPT:

visual and

performing arts.

electronic databases,

advertising, and video

games.

patent law, copyright law,

trademark law, and trade secret

law.

business

contracts

38-Which of the following is true about copyrights?

The entertainment

industry, led primarily by

the Motion Picture

Association of America

The Recording Industry

Association of America

(RIAA) uses lawsuits

against universities, but

In the United States,

after work is created

and in a tangible

form such as through

Copyright

protection on

artistic property

such as a movie or

Page 142: Test Bank

(MPAA) and RIAA, is

trying technical solutions

via the legal system to

protect its interests.

not students, to stamp

out rampant music

piracy on university

campuses.

writing or recording,

the author can apply

for a federal

copyright.

music lasts forever,

even after the

death of the author

or creator.

39-Each of the following statements about digital rights management (DRM) is true

EXCEPT:

DRM are

technology-

based protection

measures.

DRM technologies

were developed with

strict regard for

privacy protection.

DRM is an umbrella term for

any arrangement that allows a

vendor of content in electronic

form to control the material and

restrict its usage.

Typically, the content

is a copyrighted

digital work to which

the vendor holds right.

40-Fair use means

that a copyright

holder has

exclusive rights to

the invention for a

fixed number of

years.

that copyrighted material

can be used for

noncommercial purposes

without paying royalties or

getting permission.

that copyrighted

material can be

digitally protected

against misuse.

that the author or creator

of a book, movie, or

musical composition can

use their creations for an

unlimited number of

years.

41-Which of the following is true about the scope of business ethics?

The scope of

business ethics

has not changed

even though laws

have expanded.

The scope of business ethics has

expanded to encompass the nature

and quality of the relationships

with shareholders, customers,

business partners, suppliers, the

community, environment, and

future generations.

The scope of

business ethics

has not changed

because laws

have not

changed.

The scope of business

ethics has been limited

to company's actions

with regard to how it

treats employees and

obeys laws.

42-An Internet acceptable use policy (AUP) is an important safeguard because:

without a formal AUP, it is much more

difficult to enforce acceptable behaviors

and eliminate unacceptable behaviors,

and punish violators.

employees may be using

company e-mail to

advertise their own

businesses.

it includes a

corporate code

of ethics.

it required

by the

FTC.

Page 143: Test Bank

43-Section 5 of the FTC Act does each of the following EXCEPT:

prohibits unfair

or deceptive EC

practices.

requires

monitoring of

employees' e-mail.

protects

privacy.

gives the FTC authority to take action against

companies whose lax security practices could

expose customers' financial information to

theft or loss,

44-Companies can improve their responsibility as custodians of customers' personal data

by implementing:

AUP. E-mail monitoring. Firewalls. Opt in and opt out information practices.

45-Which of the following statements about the rights to privacy and free speech is not

correct?

As with all rights,

the right of free

speech is not

unlimited.

Those rights have an

increasingly important role

in an information society

and to EC.

The Internet has

destroyed the

right to privacy.

Defamation laws put

restrictions on what may

be freely said or

published.

46-All of the following are ways to use the Internet to find information about an individual

EXCEPT:

Using cookies,

spyware or keystroke

loggers.

Reading an individual's e-

mail, IM, blogs, or text

messages.

Wiretapping

communication lines.

Stealing the

individual's

computer.

47-Private online communities that are only open to those who belong to them are called:

splogs darknets RFIDs blogs

48-A domain name is:

intangible property

protected by law

tangible property

protected by law

intangible property that is

not protected by law

tangible property that is

not protected by law

49-The ________ give law enforcement agencies broader range in their efforts to protect

the public.

Page 144: Test Bank

Electronic Freedom

Foundation (EFF)

American Civil Liberties

Union (ACLU)

U.S. Department of

Justice (DOJ) USA PATRIOT

Act

50-________ work on the principle that once Web surfers arrive at their site, a few of them

will click on one of the linked advertisements and earn them a few cents for each click.

Spammers Phishers Trackbacks Sploggers

51-The least effective method to protect against pop-up ads and their risk is:

Pop-up blocking

software on users'

computers.

Mozilla and Firefox Web

browsers preventing pop-

ups.

ISPs using tools that

stop pop-ups from

appearing.

Minimizing the

pop-up window.

52-All of the following statements apply to hate Web sites EXCEPT:

Web sites that contain legitimate

complaints that aren't defamatory,

sponsored by competitors, or

infringe upon trademark rights by

confusing consumers are usually

protected by the First Amendment.

Cyberbashing is the

registration of a

domain name that

criticizes an

organization or person.

The intent of

most hate

Web sites is

to commit

fraud.

Many hate sites are

directed against large

corporations such as

Wal-Mart, Microsoft,

and Nike.

53-A legally binding contract requires a few basic elements. Which of the following is not

one of those elements?

an offer acceptance consideration agreement

54-Examples of electronic signatures to help distinguish between legitimate and fraud

transactions include all of the following EXCEPT:

a name typed at the

end of an e-mail

message by the sender

a Web site

development

agreement

a secret code or PIN

to identify the sender

to the recipient

a digitized image of a

handwritten signature

attached to an electronic

document

55-EC sellers need to protect against fraud and each of the following EXCEPT:

Page 145: Test Bank

Customers who give false credit card or bad

check information in payment for products

and services provided.

Public

keys.

Use of their name

by imposter

sellers.

Customers who deny

that they placed an

order.


Recommended