ECOM 210 Week 8 Final Exam DeVry
Question 1.1. (TCO 2) The exchange of updated information with other computing devices is called (Points : 5)
- data transferring.
- A retailer is a sales intermediary.
- Many manufacturers sell directly to consumers and through wholesalers and retailers.
- E-tailing makes it easier for a manufacturer to sell directly to customers by cutting out the intermediary.
- Companies that produce a large number of products, such as Procter & Gamble, do not need retailers for efficient distribution.
- GPS
- PDA
- SMS
- WAP
- shopping portals.
- shopping browsers.
- intelligent search engines.
- a way to improve customer communication.
- a way to track customer satisfaction.
- a sales tool.
- a customer service tool.
- In addition to selling through catalogs, a firm begins to sell online.
- In addition to selling through department stores, a firm begins to sell online.
- Instead of selling through catalogs, a firm begins to sell online.
- In addition to selling through catalogs, a firm begins to sell through department stores.
- service provider.
- content disseminator.
- viral marketer.
- a value proposition is a revenue model.
- a value proposition refers to the intangible and non-quantitative benefits that a company can derive from a business model.
- a value proposition defines how a company’s product or service fulfills the needs of customers.
- a value proposition is an important part of any marketing plan of any product or service.
- message digest.
- key space.
- uses rules to analyze suspicious activity at the perimeter of a network or at key locations in the network.
- resides on the server that is being monitored where it can detect whether critical or security-related files have been tampered with or whether a user has attempted to access files that he or she is not authorized to use.
- can perform certain actions when an attack occurs, such as terminating network connections based on security policies.
- consists of information system resources, firewalls, routers, web servers, database servers, and files that look like production systems but do no real work.
- Stored-value card
- Closed-loop card
- Open-loop card
- All of the above
- Customers need to trust that the online marketplace and its businesses will not violate the right to privacy.
- Unethical privacy practices can have both immediate and long-term negative business consequences.
- Violators expose themselves to harsh penalties from various government agencies and victimized customers, as well as bloggers and consumer interest groups.
- All of the above
- limited access to data and documents.
- privacy invasion.
- infringing on workers’ personal time.
- posttransaction security issues of auditing and nonrepudiation are less difficult because cell phones have the ability to store the digital equivalent of a receipt.
- the basic security goals of confidentiality, authentication, authorization, and integrity are just as important for m-commerce as they are for e-commerce.
- as the capabilities of cell phones and PDAs increase and converge, the threat of attack from malicious code increases.
- an appropriate level of security must be maintained on each network that traffic flows through, in spite of the fact that interoperability among the various networks is difficult.
- Informational
- Interactive
- Transactional
- Framed
- Identify a customer or business need.
- Construct an interactive website.
- Investigate the opportunity.
- Determine the business owner’s ability to meet the need.
- (TCO 1) Write a short essay that defines the term e-commerce, then describe how companies have utilized this new medium. (Points: 35)
- (TCO 4) Compare current motives of hackers to those of the past. (Points: 35)
- (TCO 2) List and describe the four basic types of B2B transactions and activities. (Points: 35)
- (TCO 6) Discuss the role of intermediaries in B2B. Distinguish between buy-side and sell-side intermediaries. (Points : 35)
- (TCO 3) Explain how personalization is done in e-Commerce. (Points : 35)
- cell phones and smart phones.
- portable computers.
- All of the above
- Music and video
- Mobile games
- Mobile gambling
- All of the above
- mobile devices, network access points, and servers.
- WAP gateways, GPS locators, and GPS satellites.
- PDAs, smartphones, and PCs.
- web servers, mobile devices, and microbrowsers.
- brick-and-mortar retailers.
- virtual or pure-play companies.
- click-and-mortar retailers.
- channel partners.
- invasion of privacy.
- theft of intellectual property.
- market maker.
- transaction broker.
- content disseminator.
- viral marketer.
- the policy of least privilege, where access to network resources is blocked and permitted only when needed to conduct business.
- the policy of acceptable use, where access is restricted by the firewall.
- role-specific security protocols, where access is limited by a user’s level of trust.
- the policy of need to know, where access by all nonemployees is blocked.
- access control determines which persons, programs, or machines can legitimately use a network resource and which resources he, she, or it can use.
- access control lists (ACLs) define users’ rights, such as what they are allowed to read, view, write, print, copy, delete, execute, modify, or move.
- all resources need to be considered together to identify the rights of users or categories of users.
- after a user has been identified, the user must be authenticated.
- a brick-and-mortar strategy.
- a shared service mall strategy.
- a click-and-mortar strategy.
- direct marketing from a manufacturer.
- Digital envelope
- Hardware and software independence
- Full traceability of the buyers
- The degree of security of the transfer
- Interoperability with other enterprise systems and applications
- Company Autosmart sells machine parts to their 20 distributors using their print catalog
- Company Autosmart participates with other producers and buyers to sell and buy machine parts on a central Web site
- Company Autosmart sells machine parts to their 20 distributors on their Web site
- Company Autosmart sells CDs to the public on their Web site
- transaction logs that record user activities at a company’s Web site
- cookies that allow a Web site to store data on the user’s PC
- spyware that gathers user information through an Internet connection without the user’s knowledge
- data mining to analyze clickstream data
Question 2.2. (TCO 2) All of the following describe retailing except (Points : 5)
Question 3.3. (TCO 2) _____ enables the determination of the location of an enabled device. (Points : 5)
Question 4.4. (TCO 3) Software tools that scout the Web for stores that sell similar items at low prices are called (Points : 5)
Question 5.5. (TCO 3) Companies that implement social computing technologies on their own websites need to view it primarily as (Points : 5)
Question 6.6. (TCO 3) Which of the following is an example of disintermediation? (Points : 5)
Question 7.7. (TCO 3) In an e-market, Federal Express is an example of a(n) (Points : 5)
Question 8.8. (TCO 4) All of the following are true about a value proposition except (Points : 5)
Question 9.9. (TCO 4) Authentication can be based on the public key infrastructure (PKI), which is based on (Points : 5)
Question 10.10. (TCO 4) A host-based intrusion detection system (IDS) (Points : 5)
Question 11.11. (TCO 5) What looks like a credit card or debit card, acts like a credit card or debit card, but isn’t a credit card or debit card? (Points : 5)
Question 12.12. (TCO 5) Why should EC companies comply with ethical privacy practices? (Points : 5)
Question 13.13. (TCO 7) Ethical issues raised by m-commerce include all of the following except (Points : 5)
Question 14.14. (TCO 7) All of the following are security-related issues of m-commerce except (Points : 5)
Question 15.15. (TCO 8) A website provides details on a manufactured product. What type of website is this? (Points : 5)
Question 16.16. (TCO 8) Which of the following is not one of the steps in business formation? (Points : 5)
Question 5. 5. (TCO 6) Define e-Procurement. (Points : 35)
Set 2
(TCO 2) Mobile devices used in m-commerce include (Points : 5)
(TCO 2) What is an example of mobile entertainment that you might utilize via your smartphone? (Points : 5)
(TCO 2) Infrastructures that support mobile computing are (Points : 5)
(TCO 3) Companies that have both a physical location and an online website are called (Points : 5)
(TCO 3) The ethical issue by collaborative filtering is (Points : 5)
(TCO 3) A company that creates and manages many-to-many markets is called a (Points : 5)
(TCO 4) Access to a network should be based on (Points : 5)
(TCO 4) All of the following are characteristics of access control except (Points : 5)
(TCO 5) Sears’s marketing strategy would best be described as (Points : 5)
(TCO 5) The combination of the encrypted original message and the digital signature using the recipient’s public key is called (Points : 5)
(TCO 5) Factors that come into play in determining whether a particular e-payment method achieves critical mass include all of the following except (Points : 5)
(TCO 6) Which of the following is a private B2B e-marketplace? (Points : 5)
(TCO 7) This is an exclusive right of the author or creator of artistic property to print, copy, sell, license, distribute, transform to another medium, translate, record, perform, or otherwise use it. (Points : 5)
(TCO 8) To avoid getting inaccurate information from participants of online surveys, marketers learn about customers by observing their behavior using each of the following except (Points : 5)
(TCO 1) Compare and contrast Web 1.0 versus Web 2.0. (Points : 35)
(TCO 2) List and explain the major infrastructure elements and tools of e-supply chain management. (Points : 35)
(TCO 2) Identify three factors or capabilities that the success of an e-supply chain depends on. (Points: 35)
(TCO 6) What are some service industries that utilize B2B; list at least three and then describe how they utilize this application. (Points : 35)
(TCO 6) Write a short essay that describes e-supply chain management in detail.
(TCO 6) Describe reverse-auction process and list the benefit of this process. (Points : 35)
(TCO 5) List three basic functions of the e-martketplace.
(TCO 6) Distinguish between organization buyers and individual consumers. (Points: 35)
Course Home Work aims to provide quality study notes and tutorials to the students of ECOM 210 Week 8 Final Exam DeVry in order to ace their studies.
Course Home Work – Best Home Work Tutorials
Course Home Work, ECOM 210 Week 8 Final Exam DeVry, Home Work Tutorials, Home Work Solutions, Home Work Essay, Home Work Questions.ACC 565 Wk 7 Assignment 3, ACC403 week 2 assignment, ACC565 Week 10, ACCT 212 (Financial Accounting), ACCT 344 (Entire Course) – Devry, ACCT 344 Final Exam Latest 2014 – Devry, ACCT 346 (Managerial Accounting), ACCT 346 Midterm Exam Updated DeVry, ACCT 504, ACCT 504 Week 8, ACCT 553, ART 101 Week 8, Ashford BUS 401, ASHFORD BUS 640, Ashford HIS 204, ASHFORD MAT 222 Week 3, BA 215 (Business Statistics), BA 215 All Assignments Week 1 -8 – Grantham, BA 225, BA 260, BA 265 (Business Law II), BA 265 (Business Law II) FINAL EXAM, BA 340 All Course Assignments, BA 340 Human Resource, BA 370 (Employment Law), BA 405 Multinational Management, BA 470 Week 3 – 5 – 6 – 7, BA 470 Entrepreneurship, BA350 Principles Of Finance, BIS 155 Final Exam – DeVry, BIS 220 Final Exam, BSOP 429, BSOP 434 Entire Course – Devry, BUS 303 Week 2, BUS 303 Week 3, BUS 303 Week 5, BUS 311 Business Law, BUS 330 Week 1, BUS 330 Week 3, BUS 330 Week 5, BUS 401 Week 4 DQ 1, BUS 401 Week 4 DQ 2, BUS 402 WEEK 4, BUS 405 (Principles of Investment), BUS 475, BUS 475 Final Exam 100 MCQS, BUS 475 Final Exam 600 MCQS, BUS 599 (STRAYER), BUS 599 Assignment, BUS 620 Week 4, BUS 640 Week 1, BUS499 Asignment 4, BUS508 Asignment 1, BUS499 Assignment 3.
ECOM 210 Week 8 Final Exam DeVry
No comments:
Post a Comment