By 2021, spending on mobile marketing is expected to account for almost ________ of all online marketing and almost ________ times as much spent on desktop advertising.

a) 65%; three

b) 70%; three

c) 75%; four

d) 80%; four

c) 75%; four

 

 

 

Encouraging users to click a Like button is an example of which step in the social marketing process?

a) community

b) amplification

c) brand strength

d) fan acquisition

b) amplification

 

 

 

Which of the following statements about Pinterest is not true?

a) Pinned photos and photo boards are available to all Pinterest users

b) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams

c) Pinterest users are all in the 18-34 age group

d) Men are Pinterest's fastest growing demographic

c) Pinterest users are all in the 18-34 age group

 

 

Which of the following is another term for amplification?

a) conversion rate

b) conversion ratio

c) impressions

d) reach

d) reach

 

 

 

All of the following are examples of dark social except:

a) Snapchat

b) tweets

c) e-mail

d) SMS texts

b) tweets

 

 

 

Which of the following is not true about mobile marketing?

a) Mobile marketing is the fastest growing form of online marketing

b) A substantial part of mobile marketing should be counted as social marketing.

c) People use most of their mobile minutes while they are on the go

d) In 2017, spending on mobile marketing will comprise over 70% of the amount spent on all types of online marketing

c) People use most of their mobile minutes while they are on the go

 

 

Which of the following is the most popular use for mobile devices?

a) shopping

b) performing tasks, such as finances

c) entertainment

d) socializing

c) entertainment

 

Ads that appear in a Facebook user's News Feed are called:

Page Post Ads.

 

 

 

 

 

All of the following are examples of dark social except:

tweets.

 

 

All of the following marketing tools on Facebook require payment except:

Brand Pages.

 

 

All of the following were popular types of online marketing before 2007 except:

mobile marketing.

 

 

Apple's iBeacon uses which of the following technologies?

BLE

 

 

As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:

Facebook Live.

 

 

(T/F) Both mobile and social advertising spending are expected to double from 2017 to 2021.

True

 

 

(T/F) Brand pages on Facebook typically attract more visitors than a brand's website.

True

 

 

By 2022, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?

$130 billion

 

 

Companies are not permitted to collect personal information from children under the age of ________ without parental consent.

13

 

 

(T/F) Eddystone is an open-source standard for beacon technology.

True

 

 

Encouraging users to click a Like button is an example of which step in the social marketing process?

amplification

 

 

 

(T/F) Facebook does not sell display ads.

False

 

 

Google uses which of the following to build a global database of wireless access points and their geographic locations?

Street View cars

 

 

(T/F) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.

True

 

 

In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?

40

 

 

In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?

$25 billion

 

 

 

(T/F) Influencer marketing is a method of generating customer engagement.

True

 

 

On average, users use about ________ apps a month on their smartphone.

20

 

 

People spend the most time doing which of the following when using a mobile device?

listening to music

 

 

(T/F) Pinterest's Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.

True

 

 

(T/F) Pinterest's users are predominantly women.

True

 

 

(T/F) Promoted Video is the source of over 60% of Twitter's ad revenue.

True

 

 

 

 

(T/F) SMS text messaging generates most of mobile marketing spending.

False

 

 

The number of people exposed to pins on Pinterest is a measure of which of the following?

fan acquisition

 

 

The ratio of impressions to fans is a measure of:

fan acquisition.

 

 

(T/F) TikTok is owned by Facebook.

False

 

 

(T/F) Traditional retail products and travel services are the source of much of the current growth in m-commerce.

True

 

 

Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?

Twitter Card

 

 

Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

Amplify

 

 

Which of the following account for the vast majority of location-based mobile marketing?

Google and Facebook

 

 

Which of the following allows Facebook to track user behavior on other sites?

Like button

 

 

Which of the following are features of both Pinterest and Twitter?

hashtags

 

 

 

Which of the following dominates the local mobile search market?

Google

 

 

Which of the following generates the most mobile ad spending?

search engine advertising

 

 

Which of the following involves using a variety of tools to encourage users to interact with content and brand?

engagement

 

 

Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?

amplification

 

 

 

Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

Open Graph

 

 

Which of the following is a history of your actions on Facebook?

Timeline

 

 

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

Curalate

 

 

Which of the following is another term for amplification?

reach

 

 

Which of the following is a not a type of Rich Pin?

Instant Pin

 

 

Which of the following is most similar to Pinterest?

Instagram

 

 

Which of the following is the first step in the social marketing process?

fan acquisition

 

 

Which of the following is the leading mobile retailer in the United States?

Amazon

 

 

Which of the following is the most popular use for mobile devices?

entertainment

 

 

Which of the following is not a major provider of mobile display advertising?

Webtrends

 

 

Which of the following is not a technology for enabling proximity marketing?

Lens Studio

 

 

Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?

They cannot contain links.

 

 

Which of the following is not true about mobile marketing?

People use most of their mobile minutes while they are on the go, outside of the home.

 

 

Which of the following is not true about social marketing?

More than 50% of Twitter's ad revenues are generated by desktop users.

 

 

Which of the following proximity marketing technologies did Macy's deploy in many of its retail stores in 2014?

iBeacon

 

 

Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?

dark social

 

 

Which of the following statements about BLE is not true?

Only Apple iPhones can use BLE.

 

 

 

Which of the following statements about Instagram is not true?

Instagram's most rapidly growing demographic group is comprised of people under the age of 35.

 

 

Which of the following statements about Pinterest is not true?

Pinterest is the only one of the major social networks that does not accept paid advertising.

 

 

Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?

Twitter

 

 

Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?

Facebook

 

 

Your Facebook News Feed includes all of the following except:

tweets.

 

Ads that appear in a Facebook user's News Feed are called:

Page Post Ads.

 

 

 

All of the following are examples of dark social except:

tweets.

 

 

All of the following marketing tools on Facebook require payment except:

Brand Pages.

 

 

All of the following were popular types of online marketing before 2007 except:

mobile marketing.

 

 

Apple's iBeacon uses which of the following technologies?

BLE

 

 

As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:

Facebook Live.

 

 

(T/F) Both mobile and social advertising spending are expected to double from 2017 to 2021.

True

 

 

(T/F) Brand pages on Facebook typically attract more visitors than a brand's website.

True

 

 

By 2022, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?

$130 billion

 

 

Companies are not permitted to collect personal information from children under the age of ________ without parental consent.

13

 

 

(T/F) Eddystone is an open-source standard for beacon technology.

True

 

 

Encouraging users to click a Like button is an example of which step in the social marketing process?

amplification

 

 

 

(T/F) Facebook does not sell display ads.

False

 

 

Google uses which of the following to build a global database of wireless access points and their geographic locations?

Street View cars

 

 

(T/F) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.

True

 

 

In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?

40

 

 

In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?

$25 billion

 

 

(T/F) Influencer marketing is a method of generating customer engagement.

True

 

 

On average, users use about ________ apps a month on their smartphone.

20

 

 

People spend the most time doing which of the following when using a mobile device?

listening to music

 

 

(T/F) Pinterests Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.

True

 

 

(T/F) Pinterest's users are predominantly women.

True

 

 

(T/F) Promoted Video is the source of over 60% of Twitter's ad revenue.

True

 

 

(T/F) SMS text messaging generates most of mobile marketing spending.

False

 

 

The number of people exposed to pins on Pinterest is a measure of which of the following?

fan acquisition

 

 

The ratio of impressions to fans is a measure of:

fan acquisition.

 

 

(T/F) TikTok is owned by Facebook.

False

 

 

(T/F) Traditional retail products and travel services are the source of much of the current growth in m-commerce.

True

 

 

Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?

Twitter Card

 

 

Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

Amplify

 

 

Which of the following account for the vast majority of location-based mobile marketing?

Google and Facebook

 

 

Which of the following allows Facebook to track user behavior on other sites?

Like button

 

 

Which of the following are features of both Pinterest and Twitter?

hashtags

 

 

Which of the following dominates the local mobile search market?

Google

 

 

Which of the following generates the most mobile ad spending?

search engine advertising

 

 

Which of the following involves using a variety of tools to encourage users to interact with content and brand?

engagement

 

 

Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?

amplification

 

 

 

Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

Open Graph

 

 

Which of the following is a history of your actions on Facebook?

Timeline

 

 

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

Curalate

 

 

Which of the following is another term for amplification?

reach

 

 

Which of the following is a not a type of Rich Pin?

Instant Pin

 

 

Which of the following is most similar to Pinterest?

Instagram

 

 

Which of the following is the first step in the social marketing process?

fan acquisition

 

 

Which of the following is the leading mobile retailer in the United States?

Amazon

 

 

Which of the following is the most popular use for mobile devices?

entertainment

 

 

Which of the following is not a major provider of mobile display advertising?

Webtrends

 

 

Which of the following is not a technology for enabling proximity marketing?

Lens Studio

 

 

Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?

They cannot contain links.

 

 

Which of the following is not true about mobile marketing?

People use most of their mobile minutes while they are on the go, outside of the home.

 

 

Which of the following is not true about social marketing?

More than 50% of Twitter's ad revenues are generated by desktop users.

 

 

Which of the following proximity marketing technologies did Macy's deploy in many of its retail stores in 2014?

iBeacon

 

 

Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?

dark social

 

 

Which of the following statements about BLE is not true?

Only Apple iPhones can use BLE.

 

 

 

Which of the following statements about Pinterest is not true?

Pinterest is the only one of the major social networks that does not accept paid advertising.

 

 

 

Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?

Facebook

 

 

Your Facebook News Feed includes all of the following except:

tweets.

 

 

1) All of the following were popular types of online marketing before 2007 except:

A) e-mail.

B) corporate websites.

C) mobile marketing.

D) display ads.

C) mobile marketing.

 

 

 

2) Which of the following is not true about social marketing?

A) More than 50% of Twitter's ad revenues are generated by desktop users.

B) The top seven social networks account for over 90% of all visits.

C) Social marketing differs markedly from traditional online marketing.

D) In social marketing, business cannot tightly control their brand messaging.

A) More than 50% of Twitter's ad revenues are generated by desktop users.

 

 

3) The second most popular social network in terms of average minutes per visitor is:

A) Instagram.

B) Pinterest.

C) LinkedIn.

D) Tumblr.

D) Tumblr

 

 

4) By 2018, it is estimated that advertisers will be spending ________ on mobile marketing.

A) $70 million

B) $700 million

C) $7 billion

D) $70 billion

D) $70 billion

 

 

9) Which of the following is primarily known for blogs?

A) Facebook

B) Tumblr

C) Google

D) Instagram

B) Tumblr

 

 

 

10) Which of the following is the first step in the social marketing process?

A) community

B) amplification

C) fan acquisition

D) engagement

C) fan acquisition

 

 

11) Encouraging users to click a Like button is an example of which step in the social marketing process?

A) fan acquisition

B) brand strength

C) community

D) amplification

D) amplification

 

 

12) Facebook News Feeds include all of the following except:

A) status updates.

B) app activity.

C) Likes.

D) tweets.

D) tweets

 

 

13) Which of the following statements about Facebook Exchange is not true?

A) It competes with DoubleClick.

B) It allows advertisers to target ads.

C) It is a social search engine.

D) It involves cookies.

C) It is a social search engine.

 

 

14) Ads that appear in a Facebook user's News Feeds are called:

A) Marketplace Ads.

B) Promoted Ads.

C) Page Post Ads.

D) Brand Ads.

C) Page Post Ads.

 

 

15) How many hours a month does the average Facebook user spend on Facebook?

A) 8

B) 18

C) 28

D) 38

B) 18

 

 

16) Which of the following is a history of your actions on Facebook?

A) News Feed

B) Timeline

C) Ticker

D) Open Graph

B) Timeline

 

 

17) Which of the following statements is not true?

A) Over 90% of Facebook's monthly active users access Facebook via a mobile device at least some of the time.

B) The only way to access Facebook from a mobile device is to use a mobile app.

C) Mobile ads are displayed in users' News Feeds.

D) Facebook's mobile ad revenues are its fastest growing revenue stream.

B) The only way to access Facebook from a mobile device is to use a mobile app.

 

 

18) All of the following marketing tools on Facebook require payment except:

A) Brand Pages.

B) Right-Hand Sidebar Ads.

C) News Feed Page Post Ads.

D) Mobile Ads.

A) Brand Pages

 

 

 

19) The ratio of impressions to fans is a measure of:

A) engagement.

B) amplification.

C) community.

D) fan acquisition.

D) fan acquisition

 

 

20) Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

A) Enhanced Profile Pages

B) Amplify

C) Lead Generation Cards

D) Promoted Accounts

B) Amplify

 

 

21) Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline?

A) Promoted Tweet

B) Promoted Trend

C) Promoted Account

D) Lead Generation Card

D) Lead Generation Card

 

 

22) Which of the following statements about Pinterest is not true?

A) Pinned photos and photo boards are available to all Pinterest users.

B) Pinterest users are overwhelmingly female.

C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.

D) Pinterest is the only one of the major social networks that does not accept paid advertising.

D) Pinterest is the only one of the major social networks that does not accept paid advertising.

 

 

23) Which of the following are features of both Pinterest and Twitter?

A) tweets

B) hashtags

C) pins

D) Image Hover widget

B) hashtags

 

 

24) All of the following are Pinterest marketing tools except:

A) Brand pages.

B) Rich Pins.

C) Promoted Pins.

D) Promoted Accounts.

D) Promoted Accounts

 

 

25) The number of people exposed to pins is a measure of which of the following?

A) engagement

B) community

C) brand strength

D) fan acquisition

D) fan acquisition

 

 

 

26) Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

A) TweetDeck

B) Curalate

C) Amplify

D) Webtrends

B) Curalate

 

 

27) Which of the following is another term for amplification?

A) impressions

B) reach

C) conversation rate

D) conversion ratio

B) reach

 

 

 

28) All of the following are examples of dark social except:

A) e-mail.

B) tweets.

C) SMS texts.

D) Snapchat.

B) tweets

 

 

29) Facebook's share price fell dramatically after its IPO because investors feared that:

A) Facebook's new marketing solutions would be difficult to monetize.

B) new social networks such as Instagram were cannibalizing Facebook's audience.

C) privacy concerns were driving users away.

D) Facebook would be unable to increase advertising revenues fast enough to justify its price.

D) Facebook would be unable to increase advertising revenues fast enough to justify its price.

 

 

30) Which of the following allows Facebook to track user behavior on other sites and then sell the information to marketers?

A) Open Graph

B) Like button

C) hashtags

D) Whatsapp

B) Like button

 

 

31) Which of the following is not true about Facebook News Feed Page Post Ads?

A) They have a tiny tag indicating that they are sponsored.

B) They can be liked, shared, and commented on, just like any News Feed post.

C) They cannot contain links.

D) They have social context.

C) They cannot contain links.

 

 

32) Which of the following is a micro-blogging social network site that allows users to send and receive 140-character messages?

A) Facebook

B) Twitter

C) Pinterest

D) Instagram

B) Twitter

 

 

 

marketing capabilities of social marketing platforms such as Facebook, Twitter, and Pinterest.

34) Which of the following was the object of the FTC's highest penalty for a COPPA violation to date?

A) Disney's Playdom

B) W3 Innovation

C) Snapchat

D) Yelp

B) W3 Innovation

 

 

35) Which of the following is most similar to Pinterest?

A) LinkedIn

B) Instagram

C) YouTube

D) Tumblr

B) Instagram

 

 

36) Which social marketing proved the most effective for ExchangeHunterJumper.com?

A) Facebook

B) YouTube

C) Pinterest

D) Instagram

A) Facebook

 

 

 

 

38) Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?

A) social density

B) dark social

C) amplification

D) engagement

B) dark social

 

 

39) Which of the following is a real-time bidding system that allows advertisers to target their ads to specific users based on personal information provided by Facebook?

A) Amplify

B) FBX

C) DoubleClick

D) PTAT

B) FBX

 

 

40) Which of the following allows a user to buy products directly on its site and pay with Apple Pay?

A) Twitter

B) LinkedIn

C) Pinterest

D) Snapchat

C) Pinterest

 

 

41) Which of the following involves using a variety of tools to encourage users to interact with content and brand?

A) social density

B) engagement

C) amplification

D) dark social

B) engagement

 

 

42) Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?

A) social density

B) engagement

C) amplification

D) dark social

C) amplification

 

 

 

43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

A) Whatsapp

B) Like button

C) Messenger

D) Open Graph

D) Open Graph

 

 

 

55) Which of the following is not true about mobile marketing?

A) Mobile marketing is the fastest growing form of online marketing.

B) In 2016, spending on mobile marketing will comprise over 60% of the amount spent on all types of online marketing.

C) A substantial part of mobile marketing should be counted as social marketing.

D) People use most of their mobile minutes while they are on the go.

D) People use most of their mobile minutes while they are on the go

 

 

56) Which of the following is the top app in terms of both audience size and share of time spent?

A) YouTube

B) iTunes

C) Twitter

D) Facebook

D) Facebook

 

 

57) How many retail-oriented apps are among the top 25 apps?

A) 1

B) 2

C) 3

D) 4

D) 4

 

 

58) Which of the following statements is not true?

A) Google is the leading display ad site on mobile devices.

B) In 2016, Google is expected to generate almost $15 billion in mobile ad revenues.

C) Mobile advertising is dominated by Google.

D) Google generates almost two-thirds of all mobile search ad spending.

A) Google is the leading display ad site on mobile devices.

 

 

59) Which of the following is the most popular use for mobile devices?

A) shopping

B) socializing

C) entertainment

D) performing tasks, such as finances

C) entertainment

 

 

60) According to a recent National Federation of Retailers survey, what percentage of tablet users plan to purchase anything with their tablets?

A) around 75%

B) around 50%

C) around 33%

D) around 35%

C) around 33%

 

 

61) Which of the following accounts for the most time people spend using a mobile device?

A) watching video

B) social networks

C) listening to music

D) reading news and magazines

C) listening to music

 

 

 

62) Around how many apps do users regularly use a month?

A) 17

B) 27

C) 37

D) 57

B) 27

 

 

63) In 2016, mobile marketing will be about ________% of all online marketing.

A) 25

B) 55

C) 65

D) 75

C) 65

 

 

64) Which of the following accounts for the most mobile ad spending?

A) display ads

B) search engine advertising

C) video ads

D) SMS text messages

B)search engine advertising

 

 

65) Which of the following is not a major provider of mobile display advertising?

A) MoPub

B) iAd

C) AdMob

D) Webtrends

D) Webtrends

 

 

66) ________ is the leading mobile retailer in the United States.

A) Walmart

B) Amazon

C) Google

D) QVC

B) Amazon

 

 

67) Which of the following technologies has Apple adopted in its hardware for Apple Pay?

A) GPS

B) NFC

C) BLE

D) QR codes

B) NFC

 

 

68) Which of the following statements about BLE is not true?

A) Only Apple iPhones can use BLE.

B) BLE uses less power than traditional Bluetooth or GPS.

C) BLE has a two-way, push-pull communication capability.

D) BLE is more accurate than targeting through Wi-Fi triangulation.

A) Only Apple iPhones can use BLE.

 

 

 

69) According to a recent National Federation of Retailers survey, consumers are more likely to use tablets rather than smartphones for all of the following except:

A) research products.

B) purchase products.

C) redeem coupons.

D) check for in-store availability.

C) redeem coupons.

 

 

76) Which of the following is currently a small part of the online marketing universe, but is expected to triple over the next five years?

A) local marketing

B) location-based mobile marketing

C) mobile marketing

D) social marketing on Facebook

B) location-based mobile marketing

 

 

77) Macy's deployed which of the following technologies in many of its retail stores in 2014?

A) QR codes

B) iBeacon

C) E9-1-1

D) Geo-search

B) iBeacon

 

 

78) Which of the following is the leading location-based marketer?

A) Twitter

B) Apple

C) Facebook

D) Google

D) Google

 

 

79) Apple's iBeacon uses which of the following technologies?

A) BLE

B) NFC

C) E9-1-1

D) QR codes

A) BLE

 

 

80) Which of the following is the leading location-based mobile ad format?

A) search ads

B) display ads

C) native/social ads

D) video ads

A) search ads

 

 

81) Google uses which of the following to build a global database of wireless access points and their geographic locations?

A) E9-1-1

B) Street View cars

C) iBeacons

D) BLE

B) Street View cars

 

 

1) All of the following were popular types of online marketing before 2007 except:

A) e-mail.

B) corporate websites.

C) mobile marketing.

D) display ads.

C

 

 

 

2) Which of the following is not true about social marketing?

A) More than 50% of Twitter's ad revenues are generated by desktop users.

B) Spending on social network advertising grew by a cumulative annual average growth rate of over 35% between 2015 and 2019.

C) Social marketing differs markedly from traditional online marketing.

D) In social marketing, businesses cannot tightly control their brand messaging.

A

 

 

3) By 2022, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?

A) $13 million

B) $130 million

C) $13 billion

D) $130 billion

D

 

 

4) In which year did spending on mobile marketing first exceed the amount spent on desktop/laptop marketing?

A) 2014

B) 2015

C) 2016

D) 2017

C

 

 

 

5) Both mobile and social advertising spending are expected to double from 2017 to 2021.

TRUE

 

 

6) In 2020, the amount spent on local (digital) marketing is expected to exceed the amount spent on mobile marketing.

FALSE

 

 

8) How much time a month does the average U.S. adult spend on Facebook?

A) about 7 hours

B) about 10 hours

C) about 17 hours

D) about 27 hours

C

 

 

9) Which of the following attracts a highly educated, professional and managerial audience?

A) Snapchat

B) TikTok

C) LinkedIn

D) Instagram

C

 

 

10) Which of the following is the first step in the social marketing process?

A) community

B) amplification

C) fan acquisition

D) engagement

C

 

 

11) Encouraging users to click a Like button is an example of which step in the social marketing process?

A) fan acquisition

B) brand strength

C) community

D) amplification

D

 

 

12) Your Facebook News Feed includes all of the following except:

A) status updates.

B) app activity.

C) Likes.

D) tweets.

D

 

 

13) Which of the following companies used information from the Facebook pixel (tracking beacon) on its website and mobile app to create a dynamic ad campaign with ads delivered in Facebook News Feeds?

A) Lays

B) Sephora

C) Lifewtr

D) Yankee Candle

B

 

 

14) Ads that appear in a Facebook user's News Feed are called:

A) Marketplace Ads.

B) Promoted Ads.

C) Page Post Ads.

D) Brand Ads.

C

 

 

15) In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?

A) 15

B) 20

C) 25

D) 40

D

 

 

16) Which of the following is a history of your actions on Facebook?

A) News Feed

B) Timeline

C) Ticker

D) Open Graph

B

 

 

17) Sprout Social helped the Chicago Bulls basketball team to improve its social media presence on all of the following except:

A) Facebook.

B) Instagram.

C) Twitter.

D) Pinterest.

D

 

 

18) All of the following marketing tools on Facebook require payment except:

A) Brand Pages.

B) Facebook Watch.

C) News Feed Page Post Ads.

D) Mobile Ads.

A

 

 

19) The ratio of impressions to fans is a measure of:

A) engagement.

B) amplification.

C) community.

D) fan acquisition.

D

 

 

20) Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

A) Promoted Trends

B) Amplify

C) Twitter Cards

D) Promoted Accounts

B

 

 

21) Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?

A) Promoted Tweet

B) Promoted Trend

C) Promoted Account

D) Twitter Card

D

 

 

22) Which of the following statements about Pinterest is not true?

A) Pinned photos and photo boards are available to all Pinterest users.

B) Men are Pinterest's fastest growing demographic.

C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.

D) Pinterest is the only one of the major social networks that does not accept paid advertising.

D

 

 

 

23) Which of the following are features of both Pinterest and Twitter?

A) tweets

B) hashtags

C) pins

D) Image Hover widget

B

 

 

24) All of the following are Pinterest marketing tools except:

A) Brand pages.

B) Rich Pins.

C) Promoted Pins.

D) Promoted Accounts.

D

 

 

25) The number of people exposed to pins on Pinterest is a measure of which of the following?

A) engagement

B) community

C) brand strength

D) fan acquisition

D

 

 

26) Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

A) TweetDeck

B) Curalate

C) Amplify

D) Webtrends

B

 

 

27) Which of the following is another term for amplification?

A) impressions

B) reach

C) conversation rate

D) conversion ratio

B

 

 

 

28) All of the following are examples of dark social except:

A) e-mail.

B) tweets.

C) SMS texts.

D) instant messages.

B

 

 

29) As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:

A) Facebook brand page.

B) Facebook News Feed ads

C) Facebook Live.

D) Facebook's Lookalike Audience lead generation tool.

C

 

 

 

31) Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?

A) They have a tiny tag indicating that they are sponsored.

B) They can be liked, shared, and commented on, just like any news feed post.

C) They cannot contain links.

D) They have social context.

C

 

 

32) Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?

A) Facebook

B) Twitter

C) Pinterest

D) Instagram

B

 

 

 

 

34) Which of the following statements about COPPA is not true?

A) COPPA is not applicable to Internet of Thing (IoT) devices.

B) COPPA can only be enforced by the Federal Trade Commission.

C) COPPA provides that companies are not permitted to use personal information collected from children under 13 years of age without the verifiable prior consent of their parents.

D) The largest fine levied by the FTC under COPPA as of 2020 was against Google and YouTube.

A

 

 

35) Which of the following is most similar to Pinterest?

A) LinkedIn

B) Instagram

C) YouTube

D) Tumblr

B

 

 

36) Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?

A) Facebook

B) YouTube

C) Pinterest

D) Instagram

A

 

 

37) Which of the following refers to the number of interactions among members of a group and reflects the 'connectedness' of the group, even if these connections are forced on users?

A) engagement

B) information density

C) social density

D) amplification

C

 

 

38) Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?

A) social density

B) dark social

C) amplification

D) engagement

B

 

 

39) Which of the following is a not a type of Rich Pin?

A) Product Pin

B) Instant Pin

C) Article Pin

D) Recipe Pin

B

 

 

40) Which of the following statements about Instagram is not true?

A) Instagram is owned by Facebook.

B) Instagram's most rapidly growing demographic group is comprised of people under the age of 35.

C) Instagram is expected to generate around $16 billion in ad revenues in 2020.

D) Instagram has over 1 billion users worldwide.

B

 

 

41) Which of the following involves using a variety of tools to encourage users to interact with content and brand?

A) social density

B) engagement

C) amplification

D) dark social

B

 

 

42) Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?

A) social density

B) engagement

C) amplification

D) dark social

C

 

 

 

43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

A) Graph Search

B) Like button

C) Messenger

D) Open Graph

D

 

 

 

44) Influencer marketing is a method of generating customer engagement.

TRUE

 

 

45) Pinterest's Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.

TRUE

 

 

46) Facebook does not sell display ads.

FALSE

 

 

47) Brand pages on Facebook typically attract more visitors than a brand's website.

TRUE

 

 

48) Promoted Video is the source of over 60% of Twitter's ad revenue.

TRUE

 

 

49) Pinterest's users are predominantly women.

TRUE

 

 

50) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.

TRUE

 

 

51) TikTok is owned by Facebook

FALSE

 

 

56) Which of the following is not true about mobile marketing?

A) There is significant overlap between local and mobile marketing.

B) By 2024, spending on mobile marketing is expected to be three times as much as spending on desktop marketing.

C) A substantial part of mobile marketing should be counted as social marketing.

D) People use most of their mobile minutes while they are on the go, outside of the home.

D

 

 

57) Which of the following is the top app in terms of percentage reach?

A) YouTube

B) Instagram

C) Twitter

D) Facebook

A

 

 

58) On average, users use about ________ apps a month on their smartphone.

A) 10

B) 15

C) 20

D) 50

C

 

 

59) Which of the following statements about Google is not true?

A) Google has seven of the top 15 apps in terms of percentage of reach.

B) The prices Google can charge for mobile ads are higher than what it can charge for desktop computer ads.

C) Facebook surpassed Google in mobile advertising revenue for the first time in 2018.

D) About 65 % of all mobile search ad revenue is generated by Google.

B

 

 

60) Which of the following is the most popular use for mobile devices?

A) shopping

B) socializing

C) entertainment

D) performing tasks, such as finances

C

 

 

61) Which of the following formats generates the second-highest amount of mobile ad spending revenue?

A) search engine advertising

B) display advertising

C) video advertising

D) mobile messaging

B

 

 

62) People spend the most time doing which of the following when using a mobile device?

A) watching videos

B) interacting on social networks

C) listening to music

D) reading news and magazines

C

 

 

 

63) While using apps, users spend over 90% of the time on just ________ of them.

A) 2

B) 3

C) 4

D) 5

D

 

 

 

64) Which of the following generates the most mobile ad spending?

A) display ads

B) search engine advertising

C) video ads

D) SMS text messages

B

 

 

65) Which of the following is not a major provider of mobile display advertising?

A) MoPub

B) Verizon Media

C) AdMob

D) Webtrends

D

 

 

66) Which of the following is the leading mobile retailer in the United States?

A) Walmart

B) Amazon

C) Google

D) QVC

B

 

 

 

67) Which of the following is not a technology for enabling proximity marketing?

A) Lens Studio

B) NFC

C) BLE

D) QR codes

A

 

 

68) Which of the following statements about BLE is not true?

A) Only Apple iPhones can use BLE.

B) BLE uses less power than traditional Bluetooth or GPS.

C) BLE has a two-way, push-pull communication capability.

D) BLE is more accurate than targeting through Wi-Fi triangulation.

A

 

 

 

69) Which of the following has been a leader in enabling augmented reality for mobile marketing?

A) Twitter

B) Google

C) Snapchat

D) Apple

C

 

 

70) Traditional retail products and travel services are the source of much of the current growth in m-commerce.

TRUE

 

 

71) Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues.

FALSE

 

 

72) SMS text messaging generates most of mobile marketing spending.

FALSE

 

 

76) In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?

A) $25 billion

B) $59 billion

C) $92 billion

D) $135 billion

A

 

 

77) Which of the following proximity marketing technologies did Macy's deploy in many of its retail stores in 2014?

A) QR codes

B) iBeacon

C) E9-1-1

D) Geo-search

B

 

 

78) Which of the following dominates the local mobile search market?

A) Twitter

B) Apple

C) Facebook

D) Google

D

 

 

79) Apple's iBeacon uses which of the following technologies?

A) BLE

B) NFC

C) E9-1-1

D) QR codes

A

 

 

80) Which of the following account for the vast majority of location-based mobile marketing?

A) Google and Twitter

B) Google and Facebook

C) Facebook and Twitter

D) Facebook and Instagram

B

 

 

81) Google uses which of the following to build a global database of wireless access points and their geographic locations?

A) E9-1-1

B) Street View cars

C) iBeacons

D) BLE

B

 

 

82) Eddystone is an open-source standard for beacon technology.

TRUE

 

 

83) A cell phone's GPS is accurate to within five feet of the actual location of the phone.

FALSE

 

1.8. 知識管理的程序為何?(單選) 回答錯誤

單選題 (2 ) 0

 

A

.

(A) 知識的吸收→知識的累積→知識的創造→知識的擴散

 

 

B

.

(B) 知識的吸收→知識的創造→知識的累積→知識的擴散

 

 

C

.

(C) 知識的創造→知識的累積→知識的吸收→知識的擴散

 

 

D

.

(D) 知識的擴散→知識的累積→知識的吸收→知識的創造

 

正確答案: B

2.33) Companies are not permitted to collect personal information from children under the age of ________ without parental consent.

單選題 (2 ) 2

 

A

.

A) 8

 

 

B

.

B) 13

 

 

C

.

C) 15

 

 

D

.

D) 18

 

正確答案: B

答案解釋:

3.59) Which of the following statements about Google is not true? 

單選題 (2 ) 2

 

A

.

A) Google has seven of the top 15 apps in terms of percentage of reach.

 

 

B

.

B) The prices Google can charge for mobile ads are higher than what it can charge for desktop computer ads.

 

 

C

.

C) Facebook surpassed Google in mobile advertising revenue for the first time in 2018.

 

 

D

.

D) About 65 % of all mobile search ad revenue is generated by Google.

 

正確答案: B

答案解釋:

4.9) Which of the following attracts a highly educated, professional and managerial audience? 

單選題 (2 ) 2

 

A

.

A) Snapchat

 

 

B

.

B) TikTok

 

 

C

.

C) LinkedIn

 

 

D

.

D) Instagram

 

正確答案: C

答案解釋:

5.21) Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?

單選題 (2 ) 2

 

A

.

A) Promoted Tweet

 

 

B

.

B) Promoted Trend

 

 

C

.

C) Promoted Account

 

 

D

.

D) Twitter Card

 

正確答案: D

答案解釋:

6.34) Which of the following statements about COPPA is not true? 

單選題 (2 ) 2

 

A

.

A) COPPA is not applicable to Internet of Thing (IoT) devices.

 

 

B

.

B) COPPA can only be enforced by the Federal Trade Commission.

 

 

C

.

C) COPPA provides that companies are not permitted to use personal information collected from children under 13 years of age without the verifiable prior consent of their parents.

 

 

D

.

D) The largest fine levied by the FTC under COPPA as of 2020 was against Google and YouTube.

 

正確答案: A

答案解釋:

7.30) Which of the following allows Facebook to track user behavior on other sites?

單選題 (2 ) 2

 

A

.

A) Open Graph

 

 

B

.

B) Like button

 

 

C

.

C) hashtags

 

 

D

.

D) Facebook Watch

 

正確答案: B

答案解釋:

8.65) Which of the following is not a major provider of mobile display advertising?

單選題 (2 ) 2

 

A

.

A) MoPub

 

 

B

.

B) Verizon Media

 

 

C

.

C) AdMob

 

 

D

.

D) Webtrends

 

正確答案: D

答案解釋:

9.32) Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?

單選題 (2 ) 2

 

A

.

A) Facebook

 

 

B

.

B) Twitter

 

 

C

.

C) Pinterest

 

 

D

.

D) Instagram

 

正確答案: B

答案解釋:

10.81) Google uses which of the following to build a global database of wireless access points and their geographic locations?

單選題 (2 ) 2

 

A

.

A) E9-1-1

 

 

B

.

B) Street View cars

 

 

C

.

C) iBeacons

 

 

D

.

D) BLE

 

正確答案: B

答案解釋:

11.68) Which of the following statements about BLE is not true?

單選題 (2 ) 2

 

A

.

A) Only Apple iPhones can use BLE.

 

 

B

.

B) BLE uses less power than traditional Bluetooth or GPS.

 

 

C

.

C) BLE has a two-way, push-pull communication capability.

 

 

D

.

D) BLE is more accurate than targeting through Wi-Fi triangulation.

 

正確答案: A

答案解釋:

12.25) The number of people exposed to pins on Pinterest is a measure of which of the following?

單選題 (2 ) 2

 

A

.

A) engagement

 

 

B

.

B) community

 

 

C

.

C) brand strength

 

 

D

.

D) fan acquisition

 

正確答案: D

答案解釋:

13.10. 主要是由經驗獲得,較無法訴諸語言,需經由適當的方式來進行分享 (外顯化),並透過知識庫來儲存與分享,而這也是知識創造過程中最為關鍵的一步。這是指?(單選)

單選題 (2 ) 2

 

A

.

(A) 創造觀念

 

 

B

.

(B) 分享內隱知識

 

 

C

.

(C) 確認觀念

 

 

D

.

(D) 跨層次的知識擴展

 

正確答案: B

答案解釋:

14.8) How much time a month does the average U.S. adult spend on Facebook? 

單選題 (2 ) 2

 

A

.

A) about 7 hours

 

 

B

.

B) about 10 hours

 

 

C

.

C) about 17 hours

 

 

D

.

D) about 27 hours

 

正確答案: C

答案解釋:

15.77) Which of the following proximity marketing technologies did Macys deploy in many of its retail stores in 2014?

單選題 (2 ) 2

 

A

.

A) QR codes

 

 

B

.

B) iBeacon

 

 

C

.

C) E9-1-1

 

 

D

.

D) Geo-search

 

正確答案: B

答案解釋:

16.28) All of the following are examples of dark social except:

單選題 (2 ) 2

 

A

.

A) e-mail.

 

 

B

.

B) tweets.

 

 

C

.

C) SMS texts.

 

 

D

.

D) instant messages.

 

正確答案: B

答案解釋:

17.18) All of the following marketing tools on Facebook require payment except:

單選題 (2 ) 2

 

A

.

A) Brand Pages.

 

 

B

.

B) Facebook Watch.

 

 

C

.

C) News Feed Page Post Ads.

 

 

D

.

D) Mobile Ads.

 

正確答案: A

答案解釋:

18.76) In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing? 

單選題 (2 ) 2

 

A

.

A) $25 billion

 

 

B

.

B) $59 billion

 

 

C

.

C) $92 billion

 

 

D

.

D) $135 billion

 

正確答案: A

答案解釋:

19.26) Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

單選題 (2 ) 2

 

A

.

A) TweetDeck

 

 

B

.

B) Curalate

 

 

C

.

C) Amplify

 

 

D

.

D) Webtrends

 

正確答案: B

答案解釋:

20.4. 下列何者不是知識管理的本質?(單選)

單選題 (2 ) 2

 

A

.

(A) 知識資訊化

 

 

B

.

(B) 知識數據化

 

 

C

.

(C) 知識分享化

 

 

D

.

(D) 知識價值化

 

正確答案: B

答案解釋:

21.7. 知識管理發展的沿革為下列何者?(單選)

單選題 (2 ) 2

 

A

.

(A) 泰勒時期→豐田式生產→知識型企業

 

 

B

.

(B) 知識型企業→泰勒時期→豐田式生產

 

 

C

.

(C) 豐田式生產→泰勒時期→知識型企業

 

 

D

.

(D) 標準化生產→福特式生產→知識型企業

 

正確答案: A

答案解釋:

22.5. 知識的開發、整理、利用之過程,能發掘出新的知識以創造出更高的價值。這是屬於知識管理本質的哪一個?(單選)

單選題 (2 ) 2

 

A

.

(A) 知識價值化

 

 

B

.

(B) 知識分享化

 

 

C

.

(C) 知識數據化

 

 

D

.

(D) 知識資訊化

 

正確答案: A

答案解釋:

23.24) All of the following are Pinterest marketing tools except: 回答錯誤

單選題 (2 ) 0

 

A

.

A) Brand pages.

 

 

B

.

B) Rich Pins.

 

 

C

.

C) Promoted Pins.

 

 

D

.

D) Promoted Accounts.

 

正確答案: D

24.6. 以最低成本、最少人力來完成工作,主要的義涵為避免浪費。這是屬於下列哪一種生產方式?(單選)

單選題 (2 ) 2

 

A

.

(A) 福特式生產

 

 

B

.

(B) 大量生產

 

 

C

.

(C) 豐田式生產

 

 

D

.

(D) 泰勒式生產

 

正確答案: C

答案解釋:

25.67) Which of the following is not a technology for enabling proximity marketing?

單選題 (2 ) 2

 

A

.

A) Lens Studio

 

 

B

.

B) NFC

 

 

C

.

C) BLE

 

 

D

.

D) QR codes

 

正確答案: A

答案解釋:

26.23) Which of the following are features of both Pinterest and Twitter?

單選題 (2 ) 2

 

A

.

A) tweets

 

 

B

.

B) hashtags

 

 

C

.

C) pins

 

 

D

.

D) Image Hover widget

 

正確答案: B

答案解釋:

27.42) Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?

單選題 (2 ) 2

 

A

.

A) social density

 

 

B

.

B) engagement

 

 

C

.

C) amplification

 

 

D

.

D) dark social

 

正確答案: C

答案解釋:

28.58) On average, users use about ________ apps a month on their smartphone.

單選題 (2 ) 2

 

A

.

A) 10

 

 

B

.

B) 15

 

 

C

.

C) 20

 

 

D

.

D) 50

 

正確答案: C

答案解釋:

29.22) Which of the following statements about Pinterest is not true?

單選題 (2 ) 2

 

A

.

A) Pinned photos and photo boards are available to all Pinterest users.

 

 

B

.

B) Men are Pinterest's fastest growing demographic.

 

 

C

.

C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.

 

 

D

.

D) Pinterest is the only one of the major social networks that does not accept paid advertising.

 

正確答案: D

答案解釋:

30.36) Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?

單選題 (2 ) 2

 

A

.

A) Facebook

 

 

B

.

B) YouTube

 

 

C

.

C) Pinterest

 

 

D

.

D) Instagram

 

正確答案: A

答案解釋:

31.31) Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?

單選題 (2 ) 2

 

A

.

A) They have a tiny tag indicating that they are sponsored.

 

 

B

.

B) They can be liked, shared, and commented on, just like any news feed post.

 

 

C

.

C) They cannot contain links.

 

 

D

.

D) They have social context.

 

正確答案: C

答案解釋:

32.57) Which of the following is the top app in terms of percentage reach? 回答錯誤

單選題 (2 ) 0

 

A

.

A) YouTube

 

 

B

.

B) Instagram

 

 

C

.

C) Twitter

 

 

D

.

D) Facebook

 

正確答案: A

33.11) Encouraging users to click a Like button is an example of which step in the social marketing process?

單選題 (2 ) 2

 

A

.

A) fan acquisition

 

 

B

.

B) brand strength

 

 

C

.

C) community

 

 

D

.

D) amplification

 

正確答案: D

答案解釋:

34.43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

單選題 (2 ) 2

 

A

.

A) Graph Search

 

 

B

.

B) Like button

 

 

C

.

C) Messenger

 

 

D

.

D) Open Graph

 

正確答案: D

答案解釋:

35.69) Which of the following has been a leader in enabling augmented reality for mobile marketing? 

單選題 (2 ) 2

 

A

.

A) Twitter

 

 

B

.

B) Google

 

 

C

.

C) Snapchat

 

 

D

.

D) Apple

 

正確答案: C

答案解釋:

36.5) Both mobile and social advertising spending are expected to double from 2017 to 2021.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

37.46) Facebook does not sell display ads.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

38.45) Pinterests Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest. 

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

39.50) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

40.47) Brand pages on Facebook typically attract more visitors than a brand's website.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

41.83) A cell phone's GPS is accurate to within five feet of the actual location of the phone.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

42.6) In 2020, the amount spent on local (digital) marketing is expected to exceed the amount spent on mobile marketing. 回答錯誤

是非題 (2 ) 0

 

A

.

A

 

 

B

.

B

 

正確答案: B

43.82) Eddystone is an open-source standard for beacon technology.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

44.51) TikTok is owned by Facebook

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

45.48) Promoted Video is the source of over 60% of Twitters ad revenue.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

46.49) Pinterest's users are predominantly women.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

47.72) SMS text messaging generates most of mobile marketing spending.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

48.70) Traditional retail products and travel services are the source of much of the current growth in m-commerce.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

49.71) Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues. 回答錯誤

是非題 (2 ) 0

 

A

.

A

 

 

B

.

B

 

正確答案: B

50.44) Influencer marketing is a method of generating customer engagement. 

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

 

1.38) Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?

單選題 (2 ) 2

 

A

.

A) social density

 

 

B

.

B) dark social

 

 

C

.

C) amplification

 

 

D

.

D) engagement

 

正確答案: B

答案解釋:

2.79) Apple's iBeacon uses which of the following technologies?

單選題 (2 ) 2

 

A

.

A) BLE

 

 

B

.

B) NFC

 

 

C

.

C) E9-1-1

 

 

D

.

D) QR codes

 

正確答案: A

答案解釋:

3.15) In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?

單選題 (2 ) 2

 

A

.

A) 15

 

 

B

.

B) 20

 

 

C

.

C) 25

 

 

D

.

D) 40

 

正確答案: D

答案解釋:

4.41) Which of the following involves using a variety of tools to encourage users to interact with content and brand?

單選題 (2 ) 2

 

A

.

A) social density

 

 

B

.

B) engagement

 

 

C

.

C) amplification

 

 

D

.

D) dark social

 

正確答案: B

答案解釋:

5.40) Which of the following statements about Instagram is not true? 

單選題 (2 ) 2

 

A

.

A) Instagram is owned by Facebook.

 

 

B

.

B) Instagrams most rapidly growing demographic group is comprised of people under the age of 35.

 

 

C

.

C) Instagram is expected to generate around $16 billion in ad revenues in 2020.

 

 

D

.

D) Instagram has over 1 billion users worldwide.

 

正確答案: B

答案解釋:

6.76) In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing? 

單選題 (2 ) 2

 

A

.

A) $25 billion

 

 

B

.

B) $59 billion

 

 

C

.

C) $92 billion

 

 

D

.

D) $135 billion

 

正確答案: A

答案解釋:

7.68) Which of the following statements about BLE is not true?

單選題 (2 ) 2

 

A

.

A) Only Apple iPhones can use BLE.

 

 

B

.

B) BLE uses less power than traditional Bluetooth or GPS.

 

 

C

.

C) BLE has a two-way, push-pull communication capability.

 

 

D

.

D) BLE is more accurate than targeting through Wi-Fi triangulation.

 

正確答案: A

答案解釋:

8.24) All of the following are Pinterest marketing tools except:

單選題 (2 ) 2

 

A

.

A) Brand pages.

 

 

B

.

B) Rich Pins.

 

 

C

.

C) Promoted Pins.

 

 

D

.

D) Promoted Accounts.

 

正確答案: D

答案解釋:

9.12) Your Facebook News Feed includes all of the following except:

單選題 (2 ) 2

 

A

.

A) status updates.

 

 

B

.

B) app activity.

 

 

C

.

C) Likes.

 

 

D

.

D) tweets.

 

正確答案: D

答案解釋:

10.67) Which of the following is not a technology for enabling proximity marketing?

單選題 (2 ) 2

 

A

.

A) Lens Studio

 

 

B

.

B) NFC

 

 

C

.

C) BLE

 

 

D

.

D) QR codes

 

正確答案: A

答案解釋:

11.28) All of the following are examples of dark social except:

單選題 (2 ) 2

 

A

.

A) e-mail.

 

 

B

.

B) tweets.

 

 

C

.

C) SMS texts.

 

 

D

.

D) instant messages.

 

正確答案: B

答案解釋:

12.37) Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users?

單選題 (2 ) 2

 

A

.

A) engagement

 

 

B

.

B) information density

 

 

C

.

C) social density

 

 

D

.

D) amplification

 

正確答案: C

答案解釋:

13.9. 泛指企業將外在知識轉化為內在知識的能力,針對外在資訊,企業須思考如何透過學習、內化與應用過程,將其轉化為企業本身已經學得的內在知識。這是指?(單選)

單選題 (2 ) 2

 

A

.

(A) 知識創造能力

 

 

B

.

(B) 知識累積能力

 

 

C

.

(C) 知識擴散能力

 

 

D

.

(D) 知識吸收能力

 

正確答案: D

答案解釋:

14.64) Which of the following generates the most mobile ad spending?

單選題 (2 ) 2

 

A

.

A) display ads

 

 

B

.

B) search engine advertising

 

 

C

.

C) video ads

 

 

D

.

D) SMS text messages

 

正確答案: B

答案解釋:

15.1. 企業透過程式記錄下所有能夠觀察到的事情,從網路使用者進入網頁的網址、點選的項目、停留時間、消費的狀況等,並存放在數據庫中,做為後續分析的基本素材。這是指下列何者?(單選)

單選題 (2 ) 2

 

A

.

(A) 數據

 

 

B

.

(B) 資訊

 

 

C

.

(C) 技術

 

 

D

.

(D) 知識

 

正確答案: A

答案解釋:

16.10) Which of the following is the first step in the social marketing process?

單選題 (2 ) 2

 

A

.

A) community

 

 

B

.

B) amplification

 

 

C

.

C) fan acquisition

 

 

D

.

D) engagement

 

正確答案: C

答案解釋:

17.32) Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?

單選題 (2 ) 2

 

A

.

A) Facebook

 

 

B

.

B) Twitter

 

 

C

.

C) Pinterest

 

 

D

.

D) Instagram

 

正確答案: B

答案解釋:

18.30) Which of the following allows Facebook to track user behavior on other sites?

單選題 (2 ) 2

 

A

.

A) Open Graph

 

 

B

.

B) Like button

 

 

C

.

C) hashtags

 

 

D

.

D) Facebook Watch

 

正確答案: B

答案解釋:

19.33) Companies are not permitted to collect personal information from children under the age of ________ without parental consent.

單選題 (2 ) 2

 

A

.

A) 8

 

 

B

.

B) 13

 

 

C

.

C) 15

 

 

D

.

D) 18

 

正確答案: B

答案解釋:

20.34) Which of the following statements about COPPA is not true? 

單選題 (2 ) 2

 

A

.

A) COPPA is not applicable to Internet of Thing (IoT) devices.

 

 

B

.

B) COPPA can only be enforced by the Federal Trade Commission.

 

 

C

.

C) COPPA provides that companies are not permitted to use personal information collected from children under 13 years of age without the verifiable prior consent of their parents.

 

 

D

.

D) The largest fine levied by the FTC under COPPA as of 2020 was against Google and YouTube.

 

正確答案: A

答案解釋:

21.59) Which of the following statements about Google is not true? 

單選題 (2 ) 2

 

A

.

A) Google has seven of the top 15 apps in terms of percentage of reach.

 

 

B

.

B) The prices Google can charge for mobile ads are higher than what it can charge for desktop computer ads.

 

 

C

.

C) Facebook surpassed Google in mobile advertising revenue for the first time in 2018.

 

 

D

.

D) About 65 % of all mobile search ad revenue is generated by Google.

 

正確答案: B

答案解釋:

22.9) Which of the following attracts a highly educated, professional and managerial audience? 

單選題 (2 ) 2

 

A

.

A) Snapchat

 

 

B

.

B) TikTok

 

 

C

.

C) LinkedIn

 

 

D

.

D) Instagram

 

正確答案: C

答案解釋:

23.8. 知識管理的程序為何?(單選)

單選題 (2 ) 2

 

A

.

(A) 知識的吸收→知識的累積→知識的創造→知識的擴散

 

 

B

.

(B) 知識的吸收→知識的創造→知識的累積→知識的擴散

 

 

C

.

(C) 知識的創造→知識的累積→知識的吸收→知識的擴散

 

 

D

.

(D) 知識的擴散→知識的累積→知識的吸收→知識的創造

 

正確答案: B

答案解釋:

24.29) As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:

單選題 (2 ) 2

 

A

.

A) Facebook brand page.

 

 

B

.

B) Facebook News Feed ads

 

 

C

.

C) Facebook Live.

 

 

D

.

D) Facebooks Lookalike Audience lead generation tool.

 

正確答案: C

答案解釋:

25.81) Google uses which of the following to build a global database of wireless access points and their geographic locations?

單選題 (2 ) 2

 

A

.

A) E9-1-1

 

 

B

.

B) Street View cars

 

 

C

.

C) iBeacons

 

 

D

.

D) BLE

 

正確答案: B

答案解釋:

26.7. 知識管理發展的沿革為下列何者?(單選)

單選題 (2 ) 2

 

A

.

(A) 泰勒時期→豐田式生產→知識型企業

 

 

B

.

(B) 知識型企業→泰勒時期→豐田式生產

 

 

C

.

(C) 豐田式生產→泰勒時期→知識型企業

 

 

D

.

(D) 標準化生產→福特式生產→知識型企業

 

正確答案: A

答案解釋:

27.62) People spend the most time doing which of the following when using a mobile device?

單選題 (2 ) 2

 

A

.

A) watching videos

 

 

B

.

B) interacting on social networks

 

 

C

.

C) listening to music

 

 

D

.

D) reading news and magazines

 

正確答案: C

答案解釋:

28.22) Which of the following statements about Pinterest is not true?

單選題 (2 ) 2

 

A

.

A) Pinned photos and photo boards are available to all Pinterest users.

 

 

B

.

B) Men are Pinterest's fastest growing demographic.

 

 

C

.

C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.

 

 

D

.

D) Pinterest is the only one of the major social networks that does not accept paid advertising.

 

正確答案: D

答案解釋:

29.20) Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

單選題 (2 ) 2

 

A

.

A) Promoted Trends

 

 

B

.

B) Amplify

 

 

C

.

C) Twitter Cards

 

 

D

.

D) Promoted Accounts

 

正確答案: B

答案解釋:

30.3. 意指資料整理、匯整分析後的資訊,找出適合使用的部分,並且加入提要以供索引使用。這是屬於資訊分析工具的哪一種?(單選)

單選題 (2 ) 2

 

A

.

(A) 分類

 

 

B

.

(B) 文字化

 

 

C

.

(C) 計算

 

 

D

.

(D) 精縮

 

正確答案: D

答案解釋:

31.5. 知識的開發、整理、利用之過程,能發掘出新的知識以創造出更高的價值。這是屬於知識管理本質的哪一個?(單選)

單選題 (2 ) 2

 

A

.

(A) 知識價值化

 

 

B

.

(B) 知識分享化

 

 

C

.

(C) 知識數據化

 

 

D

.

(D) 知識資訊化

 

正確答案: A

答案解釋:

32.63) While using apps, users spend over 90% of the time on just ________ of them.

單選題 (2 ) 2

 

A

.

A) 2

 

 

B

.

B) 3

 

 

C

.

C) 4

 

 

D

.

D) 5

 

正確答案: D

答案解釋:

33.43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

單選題 (2 ) 2

 

A

.

A) Graph Search

 

 

B

.

B) Like button

 

 

C

.

C) Messenger

 

 

D

.

D) Open Graph

 

正確答案: D

答案解釋:

34.19) The ratio of impressions to fans is a measure of:

單選題 (2 ) 2

 

A

.

A) engagement.

 

 

B

.

B) amplification.

 

 

C

.

C) community.

 

 

D

.

D) fan acquisition.

 

正確答案: D

答案解釋:

35.65) Which of the following is not a major provider of mobile display advertising?

單選題 (2 ) 2

 

A

.

A) MoPub

 

 

B

.

B) Verizon Media

 

 

C

.

C) AdMob

 

 

D

.

D) Webtrends

 

正確答案: D

答案解釋:

36.45) Pinterests Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest. 

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

37.44) Influencer marketing is a method of generating customer engagement. 

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

38.47) Brand pages on Facebook typically attract more visitors than a brand's website.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

39.70) Traditional retail products and travel services are the source of much of the current growth in m-commerce.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

40.6) In 2020, the amount spent on local (digital) marketing is expected to exceed the amount spent on mobile marketing.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

41.49) Pinterest's users are predominantly women.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

42.72) SMS text messaging generates most of mobile marketing spending.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

43.83) A cell phone's GPS is accurate to within five feet of the actual location of the phone.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

44.71) Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

45.50) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

46.82) Eddystone is an open-source standard for beacon technology.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

47.51) TikTok is owned by Facebook

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

48.5) Both mobile and social advertising spending are expected to double from 2017 to 2021.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

49.46) Facebook does not sell display ads.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

50.48) Promoted Video is the source of over 60% of Twitters ad revenue.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

 

 

1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A) information density

B) interactivity

C) social technology

D) ubiquity

c

 

 

2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A) ubiquity

B) interactivity

C) information density

D) global reach

d

 

 

3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A) accountability

B) privacy

C) responsibility

D) liability

b

 

 

4) What is the first step in analyzing an ethical dilemma?

A) Define the conflict or dilemma and identify the higher-order values involved.

B) Identify the potential consequences of your opinions.

C) Identify the options you can reasonably take.

D) Identify and describe the facts.

d

 

 

5) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A) the Golden Rule

B) Risk Aversion

C) the Collective Utilitarian principle

D) the Social Contract Rule

c

 

 

6) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A) the Golden Rule

B) Universalism

C) the Collective Utilitarian principle

D) the Social Contract Rule

a

 

 

7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A) the Golden Rule

B) the Slippery Slope

C) the Social Contract Rule

D) No Free Lunch

d

 

 

8) Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?

A) Universalism

B) the Slippery Slope

C) the Social Contract Rule

D) the Golden Rule

b

 

 

9) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

A) the Golden Rule

B) Risk Aversion

C) the Slippery Slope

D) the Social Contract Rule

d

 

 

10) Which ethical principle tells you that it is wise to assume perfect information markets?

A) the Golden Rule

B) the New York Times test

C) the Social Contract Rule

D) the Collective Utilitarian principle

b

 

 

11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A) the Slippery Slope

B) Risk Aversion

C) No Free Lunch

D) the Collective Utilitarian principle

b

 

 

12) A social consequence of the richness of Internet information is:

A) an increase in shallowness.

B) an increase in the ease of creating misleading information.

C) very persuasive messages might reduce the need for multiple independent sources of information.

D) an increase in vulnerability to hacking attacks.

c

 

 

13) Downloading a music track owned by a record company without paying for it is an example of a violation of:

A) patent law.

B) copyright law.

C) trademark law.

D) privacy law.

b

 

 

14) Which of the following features of e-commerce technology can result in work and shopping invading family life?

A) interactivity

B) ubiquity

C) information density

D) global reach

b

 

 

20) Which of the following basic ethical concepts plays an important role in defining privacy?

A) responsibility

B) accountability

C) liability

D) due process

d

 

 

21) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

A) USA PATRIOT Act

B) Homeland Security Act

C) Communications Assistance for Law Enforcement Act

D) USA Freedom Act

d

 

 

22) Which of the following is used to track individuals as they move among thousands of websites?

A) first-party cookies

B) digital wallets

C) advertising networks

D) shopping carts

c

 

 

23) Which of the following uses software installed at the ISP level to track user clickstream behavior?

A) shopping carts

B) trusted computing environments

C) deep packet inspection

D) DRM

c

 

 

25) The Spokeo case involved a claim for damages based on which of the following?

A) Fair Credit Reporting Act

B) Digital Millennium Copyright Act

C) Anticybersquatting Consumer Protection Act

D) Defend Trade Secrets Act

a

 

 

26) Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

A) Freedom of Information Act

B) Gramm-Leach-Bliley Act

C) COPPA

D) HIPAA

b

 

 

27) Which of the following is a core Fair Information Practices (FIP) principle?

A) Choice/Consent

B) Access/Participation

C) Security

D) Enforcement

a

 

 

28) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

A) Notice/Awareness

B) Choice/Consent

C) Access/Participation

D) Security

a

 

 

29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

A) Notice/Awareness

B) Choice/Consent

C) Access/Participation

D) Security

b

 

 

30) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A) Require firms to have consumers affirmatively opt-in before PII is collected.

B) Require firms to allow consumers to opt-out before PII is collected.

C) Make collection of PII illegal.

D) Require robust notice only before PII is collected.

a

 

 

31) "Do Not Track" falls under which of the following principles in the FTC's current privacy framework?

A) Privacy by Design

B) Simplified Choice

C) Greater Transparency

D) Scope

b

 

 

32) Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?

A) anonymous surfing

B) anonymous remailers

C) differential privacy software

D) public key encryption

c

 

 

33) Which of the following is an example of a pay-for-privacy (PFP) approach?

A) AT&T's GigaPower service

B) Meeco.me's life management tool

C) Digi.me's app

D) The Hub of All Thing's open source project

a

 

 

34) All of the following are required for information to be considered a trade secret except:

A) it must have commercial value to its owner.

B) the owner must have taken steps to protect it.

C) it must be unique.

D) it must be something that others do not know.

c

 

 

35) According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A) used an anonymous web browsing service

B) encrypted their communications

C) cleared web browser history and cookies

D) posted comments online anonymously

c

 

 

36) Which of the following statements about the General Data Protection Regulation (GDPR) is not true?

A) The GDPR replaces the Data Protection Directive.

B) The GDPR applies to any firm operating in any E.U. country.

C) The GDPR eliminate the right to be forgotten.

D) The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.

c

 

 

37) Which of the following is not a privacy advocacy group?

A) EPIC

B) TIO

C) CDT

D) EFF

b

 

 

38) Which of the following was the first state law in the United States requiring owners of commercial websites or online services to post a privacy policy.

A) California Consumer Privacy Act

B) California Net Neutrality Act

C) California Electronic Communications Privacy Act

D) California Online Privacy Protection Act

d

 

 

50) Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?

A) Field v. Google, Inc.

B) Alice Corporation Pty. Ltd. v. CLS Bank International

C) BMG Rights Management v. Cox Communications

D) Perfect 10, Inc. v. Amazon.com, Inc. et al.

a

 

 

51) What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

A) the ability to make perfect copies of digital works at little cost

B) the anonymous nature of the Internet

C) the support for instant peer-to-peer communication

D) the use of standards for file formats

a

 

 

52) Which of the following protects original forms of expression in a tangible medium?

A) trade secret law

B) copyright law

C) patent law

D) trademark law

b

 

53) Consider the following code snippet:

 

public class Coin

{

private String coinName;

private int coinValue;

public Coin()

{

}

. . .

}

 

Which statement reflects the action performed when the constructor to Coin is called?

 

a) The variable coinName will be initialized to "" and the variable coinValue will be initialized to 0.

b) The variable coinName will be initialized to "null" and the variable coinValue will be initialized to 0.

c) The variable coinName will not be initialized but the variable coinValue will be initialized to 0.

d) The variable coinName will be initialized to null and the variable coinValue will be initialized to 0.

2

54) If you do not provide a constructor in a class, which of the following is correct?

 

a) The compiler will generate a constructor with arguments for each class instance variable and will initialize all of the class instance variables.

b) The compiler will generate a constructor with no arguments.

c) The compiler will generate a constructor with arguments for each class instance variable.

d) The class code will not compile.

3

69) Consider the following code snippet:

 

public class Vehicle

{

private String model;

private double rpm;

. . .

}

 

Which of the following methods would correctly remove the values of the class instance variables?

 

a)

public void reset()

{

model = null;

rpm = 0;

}

b)

public void reset()

{

model.clear();

rpm = 0;

}

c)

public void reset(String aModel, double theRpm)

{

model = aModel;

rpm = theRpm;

}

d)

public void reset("",0)

{

}

4

59) You are creating a class named Employee. Which statement correctly declares a constructor for this class?

 

a) public Employee()

b) public void Employee()

c) void Employee()

d) new Employee()

 

不知道嗎?

本學習集中的詞語(51

51) Which of the following statements about constructors is correct?

 

a) A class can have only one constructor.

b) A constructor should always return a value.

c) A class must have at least one constructor supplied by the programmer.

d) A constructor must have the same name as the class.

d) A constructor must have the same name as the class.

 

Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of (choose the most accurate answer)

typosquatting

 

 

Who, while under oath during Congressional testimony, falsely denied that the NSA was gathering information on millions of Americans online?

James Clapper

 

 

TRUE or FALSE. The .com, .edu, .org at the end of a website address is called the generic Top Line Domain Name.

TRUE

 

 

Downloading a music track owned by a record company without paying for it is an example of a violation of:

copyright law

 

 

The Right to be Forgotten relates to a court case against Google started in which country?

spain

 

 

Which of the following best captures the four key areas of Intellectual Property protection we reviewed in class and that are outlined in EC?

Patents; Copyrights; Trademarks; Trade Secrets.

 

 

In the context of E-Commerce, what does the EU's GDPR stand for?

General Data Protection Regulation

 

 

TRUE or FALSE. In the United States, Google is NOT required to remove results from its search engine if requested to do so by a citizen or a corporation based in the US.

TRUE

 

 

How long does copyright protection extend for corporate-owned works?

95 years

 

 

Which country recently announced that they will delay implementing a 3% revenue tax on "large" international companies operating in their country?

France

 

 

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

patent law

 

 

Registering a domain name that infringes on an existing brand or corporate identity is an example of:

cybersquatting

 

 

Which of the following is NOT one of the four basic principles shared by ethical schools of thought in western culture?

privacy

 

 

Which of the following represents PII in the context of E-Commerce

Personally Identifiable Information

 

 

TRUE or FALSE. A brand logo can be protected by a Trademark.

TRUE

 

 

TRUE or FALSE. AdChoices is a consumer protection program run by the federal government in the United States.

False

 

 

TRUE or FALSE. Patents, Trademarks and Copyrights are critically important to our economy but only benefit businesses and inventors.

false

 

 

In the context of Clickstream Analysis, which of the following best describes Backward Path Analysis?

What led up to a page or an action on a website.

 

 

Which of the following best describes the recent US Supreme Court case dealing with the nature of sales tax for E-Commerce purchases and frequently referred to as the Tax Case of the Millennium?

South Dakota vs Wayfair

 

 

TRUE or FALSE. According to IP lawyers, "Opt-In" in the EU is nearly identical in meaning and legal requirements to "Opt-Out" in the United States.

false

 

Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

USA Freedom Act

 

 

Which of the following protects original forms of expression in a tangible medium?

copyright law

 

 

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

Require firms to have consumers affirmatively opt-in before PII is collected.

 

 

 

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

free availability of the work on the Web.

 

 

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

the Golden Rule

 

 

 

Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

 

 

The TrustArc program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information, and to make it more likely that appropriate ads are shown to users.

False

 

 

Which of the following involves bypassing the target site's home page and going directly to a content page?

deep linking

 

 

Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

True

 

 

Online gambling is now legal throughout the United States.

False

 

 

Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all the following lawsuits except:

a lawsuit filed by the Authors Guild and five major publishing companies against Google

 

 

All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

up to ten years imprisonment for a first offense.

 

 

 

 

 

Which of the following features of e-commerce technology can result in work and shopping invading family life?

ubiquity

 

 

Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

Choice/Consent

 

 

Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?

differential privacy software

 

 

A social consequence of the richness of Internet information is:

very persuasive messages might reduce the need for multiple independent sources of information.

 

 

Downloading a music track owned by a record company without paying for it is an example of a violation of:

copyright law.

 

 

"Do Not Track" falls under which of the following principles in the FTC's current privacy framework?

Simplified Choice

 

 

Which of the following cases involved the issue of keywording?

Government Employees Insurance Company v. Google, Inc.

 

 

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

The Collective Utilitarian principle

 

 

 

All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:

the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.

 

 

Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:

typosquatting.

 

 

The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

True

 

 

Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

privacy

 

 

What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

the ability to make perfect copies of digital works at little cost

 

 

Disputes over federal trademarks involve establishing:

infringement.

 

 

Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?

South Dakota v. Wayfair

 

 

Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

Risk Aversion

 

 

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

cybersquatting

 

 

 

Which of the following is not a privacy advocacy group?

TIO

 

 

Owners of gTLDs have the right to create and sell new domains with the gTLD suffix.

True

 

 

All of the following are required for information to be considered a trade secret except:

it must be unique

 

 

Which case was instrumental in paving the way for Internet business methods patents?

State Street Bank & Trust Co. v. Signature Financial Group, Inc.

 

The expansion of generic top-level domains recently authorized by ICANN is likely to be disruptive in terms of trademark protection.

Group of answer? True or False

True

 

 

Safe harbor provisions of the DMCA were at the heart of which of the following lawsuits?

-Government Employees Insurance Company v. Google, Inc.

-a lawsuit filed by the Authors Guild and five major publishing companies against Google

-Google, Inc. v. American Blind & Wallpaper Factory, Inc.

-a lawsuit brought by Viacom against YouTube and Google

a lawsuit filed by the Authors Guild and five major publishing companies against Google

 

 

Which case was instrumental in paving the way for Internet business methods patents?

-Bilski et al. v. Kappos

-State Street Bank & Trust Co. v. Signature Financial Group, Inc.

-Alice Corporation Pty. Ltd. v. CLS Bank International

-Ticketmaster Corp. v. Tickets.com

State Street Bank & Trust Co. v. Signature Financial Group, Inc.

 

 

A social consequence of the richness of Internet information is:

-very persuasive messages might reduce the need for multiple independent sources of information.

-an increase in shallowness.

-an increase in vulnerability to hacking attacks.

-an increase in the ease of creating misleading information.

very persuasive messages might reduce the need for multiple independent sources of information.

 

 

 

"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?

-Simplified Choice

-Scope

-Greater Transparency

-Privacy by Design

Simplified Choice

 

 

All of the following cases involved the doctrine of fair use except:

-Kelly v. Arriba Soft.

-Perfect 10, Inc. v. Amazon.com, Inc. et al.

-Field v. Google, Inc.

-Spokeo v. Robins

Spokeo v. Robins

 

 

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

-the Social Contract Rule

-the Golden Rule

-the Collective Utilitarian principle

-Universalism

the Golden Rule

 

 

Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.

True or False

True

 

 

The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.

True or False

False

 

 

 

Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

-Notice/Awareness

-Choice/Consent

-Access/Participation

-Security

Choice/Consent

 

 

 

All of the following are required in order for information to be considered a trade secret except:

-the owner must have taken steps to protect it.

-it must be something that others do not know.

-it must be unique.

-it must have commercial value to its owner.

it must be unique.

 

 

According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

-posted comments online anonymously

-used an anonymous web browsing service

-encrypted their communications

-cleared web browser history and cookies

cleared web browser history and cookies

 

 

In the United States, Google is not required to remove results from its search engine if requested.

True or False

True

 

 

In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

-State Street Bank & Trust v. Signature Financial Group, Inc.

-BMG Rights Management v. Cox Communications

-Bilski et al. v. Kappos

-Alice Corporation Pty. Ltd. v. CLS Bank International

Alice Corporation Pty. Ltd. v. CLS Bank International

 

 

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

-Require robust notice only before PII is collected.

-Require firms to have consumers affirmatively opt-in before PII is collected.

-Require firms to allow consumers to opt-out before PII is collected.

-Make collection of PII illegal.

Require firms to have consumers affirmatively opt-in before PII is collected.

 

 

Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

True or False

True

 

 

Which of the following involves bypassing the target site's home page and going directly to a content page?

-cybersquatting

-framing

-deep linking

-metatagging

deep linking

 

 

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

-copyright law

-patent law

-trade secret law

-trademark law

patent law

 

 

 

The Day of Action in July 2017 was a protest to proposed changes in regulations pertaining to which of the following?

-Net neutrality

-fantasy sports

-Internet sales taxes

-the online sale of prescription drugs

Net neutrality

 

 

Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

-Risk Aversion

-the Slippery Slope

-the Collective Utilitarian principle

-No Free Lunch

Risk Aversion

 

 

Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?

-the Social Contract Rule

-the Golden Rule

-the Slippery Slope

-Universalism

the Slippery Slope

 

 

The TrustArc program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information, and to make it more likely that appropriate ads are shown to users.

True or False

False

 

 

Which of the following statements about the E.U. General Data Protection Regulation (GDPR) is not true?

-The GDPR replaces the E.U.'s existing Data Protection Directive.

-The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.

-The GDPR applies to any firm operating in any E.U. country.

-The GDPR eliminate the right to be forgotten.

The GDPR eliminate the right to be forgotten.

 

 

Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?

-digital wallets

-cookies

-shopping carts

-search engines

search engines

 

 

Which of the following is not a major e-commerce public safety and welfare issue?

-regulation of pornography

-regulation of gambling

-regulation of cigarette sales

-regulation of taxation

regulation of taxation

 

 

Which of the following statements about industry self-regulation regarding privacy is not true?

-Critics argue that the most effective form of industry self-regulation to safeguard privacy are online seal programs that attest to a company's privacy policies.

-The NAI offers consumers a global opt-out feature to prevent network advertising agencies from placing cookies on a user's computer.

-The AdChoices program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.

-Industry efforts have not so far succeeded in reducing American fears of privacy invasion.

Critics argue that the most effective form of industry self-regulation to safeguard privacy are online seal programs that attest to a company's privacy policies.

 

 

Which of the following is not true about the evolution of Facebook's privacy policies over the ten-year period from 2005 to 2015?

-Facebook's privacy policies improved from 2005 to 2009.

-Facebook's privacy policies have steadily declined since 2009.

-The amount of information gathered and monitored by Facebook increased.

-Facebook's privacy policy became easier to understand.

Facebook's privacy policy became easier to understand.

 

 

Most adult social network participants do not have any expectation of personal privacy when using a social network.

True or False

False

 

 

Which of the following protects original forms of expression in a tangible medium?

-trade secret law

-copyright law

-patent law

-trademark law

copyright law

 

 

 

Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

-the Golden Rule

-the Social Contract Rule

-the Slippery Slope

-Risk Aversion

the Social Contract Rule

 

 

Which of the following basic ethical concepts plays an important role in defining privacy?

-due process

-accountability

-liability

-responsibility

due process

 

 

 

Google defended its Library Project on the grounds of fair use.

True or False

True

 

 

Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

-A journalist quotes a paragraph from a book in a review of the book.

-A professor clips a newspaper article just before class and distributes copies of it to his class.

-Google posts thumbnail images of books in the Google Book Search Project.

-A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

 

 

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

-free availability of the work on the Web.

-nature of the work used.

-amount of the work used.

-market effect of the use.

free availability of the work on the Web.

 

 

All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:

-the DMCA makes it illegal to circumvent technological measures to protect works.

-the DMCA requires search engines to block access to infringing sites.

-the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.

-the DMCA allows libraries to make digital copies of works for internal use only.

the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.

 

 

Google owns which of the following, whose data it can use to create what some refer to as super profiles?

-TransUnion Corporation

-DoubleClick

-Experian

-Acxiom

DoubleClick

 

 

Which of the following cases has chipped away at DMCA safe harbor protection?

-Perfect 10, Inc. v. Amazon.com, Inc. et al.

-Alice Corporation Pty. Ltd. v. CLS Bank International

-Field v. Google, Inc.

-BMG Rights Management v. Cox Communications

Field v. Google, Inc.

 

 

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

-framing.

-cybersquatting.

-cyberpiracy.

-metatagging.

cybersquatting

 

 

The Federal Communications Commission's privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017.

True or False

True

 

 

Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

-information density

-interactivity

-ubiquity

-global reach

global reach

 

 

 

The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

True or False

False

 

 

Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?

-ICANN

-WIPO

-USPTO

-FTC

WIPO

 

 

Which ethical principle tells you that it is wise to assume perfect information markets?

-the New York Times test

-the Social Contract Rule

-the Collective Utilitarian principle

-the Golden Rule

the New York Times test

 

 

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

-social technology

-ubiquity

-information density

-interactivity

social technology

 

 

 

The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

True or False

True

 

 

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

-Notice/Awareness

-Security

-Access/Participation

-Choice/Consent

Notice/Awareness

 

 

 

Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.

True or False

True

 

 

Which of the following is not a privacy advocacy group?

-EPIC

-TIO

-EFF

-CDT

TIO

 

 

Which of the following cases involved the issue of keywording?

-E. & J. Gallo Winery v. Spider Webs Ltd.

-Ticketmaster Corp. v. Tickets.com

-Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc.

-Government Employees Insurance Company v. Google, Inc.

Government Employees Insurance Company v. Google, Inc.

 

 

 

Which of the following technologies allows you to send e-mail without a trace?

-anonymous surfing

-P3P

-anonymous remailers

-public key encryption

anonymous remailers

 

 

Which of the following features of e-commerce technology can result in work and shopping invading family life?

-interactivity

-global reach

-ubiquity

-information density

ubiquity

 

 

 

Which of the following can be used to record all keyboard activity of a user?

-DRM

-trusted computing environments

-shopping carts

-spyware

spyware

 

 

The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

True or False

True

 

 

Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

-Freedom of Information Act

-COPPA

-Gramm-Leach-Bliley Act

-HIPAA

Gramm-Leach-Bliley Act

 

 

 

Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

-responsibility

-liability

-accountability

-privacy

privacy

 

 

Disputes over federal trademarks involve establishing:

-underlying ideas.

-infringement.

-piracy.

-intent.

infringement

 

 

All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

-fines up to $1 million for a repeat offense.

-restitution to the injured parties for any losses due to infringement.

-fines up to $500,000 for a first offense.

-up to ten years imprisonment for a first offense.

up to ten years imprisonment for a first offense.

 

 

Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:

-cybersquatting.

-metatagging.

-linking.

-typosquatting.

typosquatting

 

 

Online gambling is now legal throughout the United States.

True or False

False

 

 

What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

-the use of standards for file formats

-the ability to make perfect copies of digital works at little cost

-the anonymous nature of the Internet

-the support for instant peer-to-peer communication

the ability to make perfect copies of digital works at little cost

 

 

 

The Spokeo case involved a claim for damages based on which of the following?

-Anticybersquatting Consumer Protection Act

-Fair Credit Reporting Act

-Digital Millennium Copyright Act

-Defend Trade Secrets Act

Fair Credit Reporting Act

 

 

All of the following statements about patents are true except:

-it is more difficult to obtain a copyright than it is to obtain a patent.

-computer programs can be patented.

-in order to be patented, an invention must be nonobvious.

-the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.

it is more difficult to obtain a copyright than it is to obtain a patent.

 

 

Copyright protection protects against others copying the underlying ideas in a work.

True or False

False

 

 

 

Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

-USA PATRIOT Act

-Communications Assistance for Law Enforcement Act

-Homeland Security Act

-USA Freedom Act

USA Freedom Act

 

 

Downloading a music track owned by a record company without paying for it is an example of a violation of:

-copyright law.

-privacy law.

-trademark law.

-patent law.

copyright law.

 

 

Which of the following is considered one of the most contentious e-commerce patents?

-patent on one-click purchasing

-patent on streaming video media transmission

-Google's PageRank patent

-patent on buyer-driven name your price tools

patent on one-click purchasing

 

 

 

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

-the Golden Rule

-the Slippery Slope

-No Free Lunch

-the Social Contract Rule

No Free Lunch

 

 

What is the first step in analyzing an ethical dilemma?

-Identify the options you can reasonably take.

-Identify and describe the facts.

-Identify the potential consequences of your opinions.

-Define the conflict or dilemma and identify the higher-order values involved.

Identify and describe the facts.

 

 

 

Which of the following is a core Fair Information Practices (FIP) principle?

-Security

-Enforcement

-Choice/Consent

-Access/Participation

Choice/Consent

 

 

 

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

-Risk Aversion

-the Golden Rule

-the Social Contract Rule

-the Collective Utilitarian principle

the Collective Utilitarian principle

 

 

Which of the following is not one of the issues complicating the taxation of e-commerce sales?

-Taxes raised are used for different government purposes.

-Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.

-Sales taxes and policies vary by state and country.

-Retailers are only legally required to charge sales tax if they have operations located in the same state as a consumer.

Taxes raised are used for different government purposes.

 

 

The display of a third-party's website or page within your own website is called:

-metatagging.

-cybersquatting.

-framing.

-deep linking.

framing

 

1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A) information density

B) interactivity

C) social technology

D) ubiquity

C

 

 

 

2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A) ubiquity

B) interactivity

C) information density

D) global reach

D

 

 

 

3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A) accountability

B) privacy

C) responsibility

D) liability

B

 

 

4) What is the first step in analyzing an ethical dilemma?

A) Define the conflict or dilemma and identify the higher-order values involved.

B) Identify the potential consequences of your opinions.

C) Identify the options you can reasonably take.

D) Identify and describe the facts.

D

 

 

 

5) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A) The Golden Rule

B) Risk Aversion Principle

C) Collective Utilitarian Principle

D) The Social Contract Rule

C

 

 

6) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A) The Golden Rule

B) Universalism

C) Collective Utilitarian principle

D) The Social Contract Rule

A

 

 

7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A) The Golden Rule

B) Slippery Slope

C) The Social Contract Rule

D) No Free Lunch

D

 

 

8) Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?

A) Universalism

B) Slippery Slope

C) The Social Contract Rule

D) The Golden Rule

B

 

 

9) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

A) The Golden Rule

B) Risk Aversion

C) Slippery Slope

D) The Social Contract Rule

D

 

 

10) Which ethical principle tells you that it is wise to assume perfect information markets?

A) The Golden Rule

B) The New York Times Test

C) The Social Contract Rule

D) The Collective Utilitarian Principle

B

 

 

11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A) Slippery Slope

B) Risk Aversion

C) No Free Lunch

D) The Collective Utilitarian Principle

B

 

 

12) A social consequence of the richness of Internet information is:

A) an increase in shallowness.

B) an increase in the ease of creating misleading information.

C) very persuasive messages might reduce the need for multiple independent sources of information.

D) an increase in vulnerability to hacking attacks.

C

 

 

 

13) Downloading a music track owned by a record company without paying for it is an example of a violation of:

A) patent law.

B) copyright law.

C) trademark law.

D) privacy law.

B

 

 

14) Which of the following features of e-commerce technology can result in work and shopping invading family life?

A) interactivity

B) ubiquity

C) information density

D) global reach

B

 

 

 

15) Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

TRUE

 

 

16) The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

FALSE

 

 

17) The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

TRUE

 

 

20) Which of the following basic ethical concepts plays an important role in defining privacy?

A) responsibility

B) accountability

C) liability

D) due process

D

 

 

 

21) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

A) USA PATRIOT Act

B) Homeland Security Act

C) Cyber Security Enhancement Act

D) USA Freedom Act

D

 

 

22) Which of the following is used to track individuals as they move among thousands of websites?

A) first-party cookies

B) digital wallets

C) advertising networks

D) shopping carts

C

 

 

23) Which of the following uses software installed at the ISP level to track user clickstream behavior?

A) shopping carts

B) trusted computing environments

C) deep packet inspection

D) DRM

C

 

 

24) Which of the following statements about industry self-regulation regarding privacy is not true?

A) The AdChoices program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.

B) The Network Advertising Initiative offers consumers a global opt-out feature to prevent network advertising agencies from placing cookies on a user's computer.

C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion.

D) Online seal programs that attest to a company's privacy policies have had a significant impact on online privacy practices.

D

 

 

25) The Spokeo case involved a claim for damages based on which of the following?

A) Fair Credit Reporting Act

B) Digital Millennium Copyright Act

C) Anticybersquatting Consumer Protection Act

D) Defend Trade Secrets Act

A

 

 

26) Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

A) Freedom of Information Act

B) Gramm-Leach-Bliley Act

C) COPPA

D) HIPAA

B

 

 

 

27) Which of the following is a core Fair Information Practices (FIP) principle?

A) Choice/Consent

B) Access/Participation

C) Security

D) Enforcement

A

 

 

 

28) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

A) Notice/Awareness

B) Choice/Consent

C) Access/Participation

D) Security

A

 

 

 

29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

A) Notice/Awareness

B) Choice/Consent

C) Access/Participation

D) Security

B

 

 

 

30) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A) Require firms to have consumers affirmatively opt-in before PII is collected.

B) Require firms to allow consumers to opt-out before PII is collected.

C) Make collection of PII illegal.

D) Require robust notice only before PII is collected.

A

 

 

31) 'Do Not Track' falls under which of the following principles in the FTC's current privacy framework?

A) Privacy by Design

B) Simplified Choice

C) Greater Transparency

D) Scope

B

 

 

32) Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?

A) anonymous surfing

B) anonymous remailers

C) differential privacy software

D) public key encryption

C

 

 

 

33) Which of the following is an example of a pay-for-privacy (PFP) approach?

A) AT&T's GigaPower service

B) Meeco.me's life management tool

C) Digi.me's app

D) The Hub of All Thing's open source project

A

 

 

34) According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A) used an anonymous web browsing service

B) encrypted their communications

C) cleared web browser history and cookies

D) posted comments online anonymously

C

 

 

35) Which of the following statements about the General Data Protection Regulation (GDPR) is not true?

A) The GDPR replaces the Data Protection Directive.

B) The GDPR applies to any firm operating in any E.U. country.

C) The GDPR eliminate the right to be forgotten.

D) The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.

C

 

 

36) As of 2020, the largest consumer privacy penalty issued by the Federal Trade Commission had been imposed on which of the following companies?

A) Google

B) Facebook

C) Uber

D) Apple

B

 

 

37) The California Consumer Privacy Act (CCPA) does all of the following except:

A) give residents the right to be informed about the kind of personal information that is collected about them.

B) gives residents the right to opt out of the sale of their information.

C) gives residents the right to access their information in a usable format so they can transfer it to another service.

D) gives residents the right to prevent government access to their personal information.

D

 

 

38) In the United States, Google is not required to remove results from its search engine if requested.

TRUE

 

 

39) The main objective of the European Union's General Data Protection Regulation (GDPR) is to strengthen the rights of citizens to their own personal information and to strengthen oversight of firms to ensure that they implement these individual rights.

TRUE

 

 

40) The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

TRUE

 

 

41) The Federal Communications Commission's privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017.

TRUE

 

 

42) The Illinois Biometric Information Privacy Act requires firms to have user consent to collect facial information.

TRUE

 

 

47) All of the following are required for information to be considered a trade secret except:

A) it must have commercial value to its owner.

B) the owner must have taken steps to protect it.

C) it must be unique.

D) it must be something that others do not know.

C

 

 

48) Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?

A) Field v. Google, Inc.

B) Alice Corporation Pty. Ltd. v. CLS Bank International

C) BMG Rights Management v. Cox Communications

D) Perfect 10, Inc. v. Amazon.com, Inc. et al.

C

 

 

49) What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

A) the ability to make perfect copies of digital works at little cost

B) the anonymous nature of the Internet

C) the support for instant peer-to-peer communication

D) the use of standards for file formats

A

 

 

 

50) Which of the following protects original forms of expression in a tangible medium?

A) trade secret law

B) copyright law

C) patent law

D) trademark law

B

 

 

 

51) How long does copyright protection extend for corporate-owned works?

A) 25 years

B) 50 years

C) 75 years

D) 95 years

D

 

 

 

52) Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

A) A professor clips a newspaper article just before class and distributes copies of it to his class.

B) A journalist quotes a paragraph from a book in a review of the book.

C) A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

D) Google posts thumbnail images of books in the Google Book Search Project.

C

 

 

53) All of the following are factors that will be considered in determining whether use of copyrighted material is 'fair use' except the:

A) nature of the work used.

B) amount of the work used.

C) market effect of the use.

D) free availability of the work on the Web.

D

 

 

54) All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

A) up to ten years imprisonment for a first offense.

B) fines up to $500,000 for a first offense.

C) fines up to $1 million for a repeat offense.

D) restitution to the injured parties for any losses due to infringement.

A

 

 

55) All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:

A) the DMCA makes it illegal to circumvent technological measures to protect works.

B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.

C) the DMCA requires search engines to block access to infringing sites.

D) the DMCA allows libraries to make digital copies of works for internal use only.

B

 

 

56) Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

A) copyright law

B) trade secret law

C) patent law

D) trademark law

C

 

 

 

57) All of the following statements about patents are true except:

A) it is more difficult to obtain a copyright than it is to obtain a patent.

B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.

C) computer programs can be patented.

D) in order to be patented, an invention must be nonobvious.

A

 

 

58) Which case was instrumental in paving the way for Internet business methods patents?

A) Bilski et al. v. Kappos

B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.

C) Alice Corporation Pty. Ltd. v. CLS Bank International

D) Ticketmaster Corp. v. Tickets.com

B

 

 

59) Which of the following is considered one of the most contentious e-commerce patents?

A) Acacia Technologies' patent on streaming video media transmission

B) Priceline's patent on buyer-driven name your price tools

C) Amazon's patent on one-click purchasing

D) Google's PageRank patent

C

 

 

 

60) Disputes over federal trademarks involve establishing:

A) underlying ideas.

B) intent.

C) piracy.

D) infringement.

D

 

 

61) Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

A) cybersquatting.

B) cyberpiracy.

C) framing.

D) metatagging.

A

 

 

62) Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?

A) ICANN

B) FTC

C) WIPO

D) USPTO

C

 

64) Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:

A) keywording.

B) typosquatting.

C) metatagging.

D) deep linking.

B

 

 

65) In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

A) State Street Bank & Trust v. Signature Financial Group, Inc.

B) Bilski et al. v. Kappos

C) Alice Corporation Pty. Ltd. v. CLS Bank International

D) BMG Rights Management v. Cox Communications

C

 

 

66) The display of a third-party's website or page within your own website is called:

A) cybersquatting.

B) metatagging.

C) framing.

D) deep linking.

C

 

 

 

67) Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all the following lawsuits except:

A) a lawsuit filed by the Authors Guild and five major publishing companies against Google

B) a lawsuit brought by Viacom against YouTube and Google

C) BMG Rights Management v. Cox Communications.

D) Mavrix Photographs, LLC v. LiveJournal, Inc.

A

 

 

68) Which of the following cases involved the issue of keywording?

A) Ticketmaster Corp. v. Tickets.com

B) Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc.

C) Government Employees Insurance Company v. Google, Inc.

D) E. & J. Gallo Winery v. Spider Webs Ltd.

C

 

 

 

69) Which of the following involves bypassing the target site's home page and going directly to a content page?

A) cybersquatting

B) metatagging

C) framing

D) deep linking

D

 

 

70) All of the following cases involved the doctrine of fair use except:

A) Spokeo v. Robins

B) Perfect 10, Inc. v. Amazon.com, Inc. et al.

C) Field v. Google, Inc.

D) Kelly v. Arriba Soft.

A

 

 

71) Copyright protection protects against others copying the underlying ideas in a work.

FALSE

 

 

 

72) Owners of gTLDs have the right to create and sell new domains with the gTLD suffix.

TRUE

 

 

73) Google defended its Library Project on the grounds of fair use.

TRUE

 

 

76) Which of the following involves the issue of social control?

A) information rights

B) governance

C) public safety and welfare

D) property rights

B

 

 

77) Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?

A) South Dakota v. Wayfair

B) Bilski et al. v. Kappos

C) Quill v. North Dakota

D) Alice Corporation v. CLS Bank International

A

 

 

78) Which of the following statements is not true?

A) Currently, the United States is in a mixed-mode policy environment with respect to the Internet where self-regulation co-exists with limited government regulation.

B) The Internet is technically very difficult to control, monitor, and regulate from a central location.

C) Early Internet advocates argued that the Internet was different from all previous technologies.

D) Controlling e-commerce also involves regulating the Internet.

B

 

 

79) Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.

TRUE

 

 

81) Which of the following is not an e-commerce public safety and welfare issue?

A) regulation of gambling

B) regulation of cigarette sales

C) regulation of pornography

D) regulation of taxation

D

 

 

82) The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.

FALSE

 

 

 

83) Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.

TRUE

 

 

84) Online gambling is now legal throughout the United States.

FALSE

 

1.23) Which of the following uses software installed at the ISP level to track user clickstream behavior?

單選題 (2 ) 2

 

A

.

A) shopping carts

 

 

B

.

B) trusted computing environments

 

 

C

.

C) deep packet inspection

 

 

D

.

D) DRM

 

正確答案: C

答案解釋:

2.64) Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:

單選題 (2 ) 2

 

A

.

A) keywording.

 

 

B

.

B) typosquatting.

 

 

C

.

C) metatagging.

 

 

D

.

D) deep linking.

 

正確答案: B

答案解釋:

3.9) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

單選題 (2 ) 2

 

A

.

A) The Golden Rule

 

 

B

.

B) Risk Aversion

 

 

C

.

C) Slippery Slope

 

 

D

.

D) The Social Contract Rule

 

正確答案: D

答案解釋:

4.37) The California Consumer Privacy Act (CCPA) does all of the following except:

單選題 (2 ) 2

 

A

.

A) give residents the right to be informed about the kind of personal information that is collected about them.

 

 

B

.

B) gives residents the right to opt out of the sale of their information.

 

 

C

.

C) gives residents the right to access their information in a usable format so they can transfer it to another service.

 

 

D

.

D) gives residents the right to prevent government access to their personal information.

 

正確答案: D

答案解釋:

5.63) Registering a domain name similar or identical to a trademark of a legitimate site to divert web traffic to the infringing site is an example of:

單選題 (2 ) 2

 

A

.

A) keywording.

 

 

B

.

B) cyberpiracy.

 

 

C

.

C) framing.

 

 

D

.

D) metatagging.

 

正確答案: B

答案解釋:

6.67) Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all the following lawsuits except:

單選題 (2 ) 2

 

A

.

A) a lawsuit filed by the Authors Guild and five major publishing companies against Google

 

 

B

.

B) a lawsuit brought by Viacom against YouTube and Google

 

 

C

.

C) BMG Rights Management v. Cox Communications.

 

 

D

.

D) Mavrix Photographs, LLC v. LiveJournal, Inc.

 

正確答案: A

答案解釋:

7.61) Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: 回答錯誤

單選題 (2 ) 0

 

A

.

A) cybersquatting.

 

 

B

.

B) cyberpiracy.

 

 

C

.

C) framing.

 

 

D

.

D) metatagging.

 

正確答案: A

8.11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

單選題 (2 ) 2

 

A

.

A) Slippery Slope

 

 

B

.

B) Risk Aversion

 

 

C

.

C) No Free Lunch

 

 

D

.

D) The Collective Utilitarian Principle

 

正確答案: B

答案解釋:

9.36) As of 2020, the largest consumer privacy penalty issued by the Federal Trade Commission had been imposed on which of the following companies?

單選題 (2 ) 2

 

A

.

A) Google

 

 

B

.

B) Facebook

 

 

C

.

C) Uber

 

 

D

.

D) Apple

 

正確答案: B

答案解釋:

10.78) Which of the following statements is not true? 回答錯誤

單選題 (2 ) 0

 

A

.

A) Currently, the United States is in a mixed-mode policy environment with respect to the Internet where self-regulation co-exists with limited government regulation.

 

 

B

.

B) The Internet is technically very difficult to control, monitor, and regulate from a central location.

 

 

C

.

C) Early Internet advocates argued that the Internet was different from all previous technologies.

 

 

D

.

D) Controlling e-commerce also involves regulating the Internet.

 

正確答案: B

11.7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

單選題 (2 ) 2

 

A

.

A) The Golden Rule

 

 

B

.

B) Slippery Slope

 

 

C

.

C) The Social Contract Rule

 

 

D

.

D) No Free Lunch

 

正確答案: D

答案解釋:

12.69) Which of the following involves bypassing the target site's home page and going directly to a content page?

單選題 (2 ) 2

 

A

.

A) cybersquatting

 

 

B

.

B) metatagging

 

 

C

.

C) framing

 

 

D

.

D) deep linking

 

正確答案: D

答案解釋:

13.56) Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

單選題 (2 ) 2

 

A

.

A) copyright law

 

 

B

.

B) trade secret law

 

 

C

.

C) patent law

 

 

D

.

D) trademark law

 

正確答案: C

答案解釋:

14.65) In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

單選題 (2 ) 2

 

A

.

A) State Street Bank & Trust v. Signature Financial Group, Inc.

 

 

B

.

B) Bilski et al. v. Kappos

 

 

C

.

C) Alice Corporation Pty. Ltd. v. CLS Bank International

 

 

D

.

D) BMG Rights Management v. Cox Communications

 

正確答案: C

答案解釋:

15.28) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

單選題 (2 ) 2

 

A

.

A) Notice/Awareness

 

 

B

.

B) Choice/Consent

 

 

C

.

C) Access/Participation

 

 

D

.

D) Security

 

正確答案: A

答案解釋:

16.31) "Do Not Track" falls under which of the following principles in the FTC's current privacy framework?

單選題 (2 ) 2

 

A

.

A) Privacy by Design

 

 

B

.

B) Simplified Choice

 

 

C

.

C) Greater Transparency

 

 

D

.

D) Scope

 

正確答案: B

答案解釋:

17.5. WiMAX 為下列何者的應用範疇之一?(單選)

單選題 (2 ) 2

 

A

.

(A) 3GS

 

 

B

.

(B) 2G

 

 

C

.

(C) 4G

 

 

D

.

(D) 3G

 

正確答案: C

答案解釋:

18.29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

單選題 (2 ) 2

 

A

.

A) Notice/Awareness

 

 

B

.

B) Choice/Consent

 

 

C

.

C) Access/Participation

 

 

D

.

D) Security

 

正確答案: B

答案解釋:

19.1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

單選題 (2 ) 2

 

A

.

A) information density

 

 

B

.

B) interactivity

 

 

C

.

C) social technology

 

 

D

.

D) ubiquity

 

正確答案: C

答案解釋:

20.2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

單選題 (2 ) 2

 

A

.

A) ubiquity

 

 

B

.

B) interactivity

 

 

C

.

C) information density

 

 

D

.

D) global reach

 

正確答案: D

答案解釋:

21.70) All of the following cases involved the doctrine of fair use except:

單選題 (2 ) 2

 

A

.

A) Spokeo v. Robins

 

 

B

.

B) Perfect 10, Inc. v. Amazon.com, Inc. et al.

 

 

C

.

C) Field v. Google, Inc.

 

 

D

.

D) Kelly v. Arriba Soft.

 

正確答案: A

答案解釋:

22.6) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

單選題 (2 ) 2

 

A

.

A) The Golden Rule

 

 

B

.

B) Universalism

 

 

C

.

C) Collective Utilitarian principle

 

 

D

.

D) The Social Contract Rule

 

正確答案: A

答案解釋:

23.51) How long does copyright protection extend for corporate-owned works?

單選題 (2 ) 2

 

A

.

A) 25 years

 

 

B

.

B) 50 years

 

 

C

.

C) 75 years

 

 

D

.

D) 95 years

 

正確答案: D

答案解釋:

24.30) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

單選題 (2 ) 2

 

A

.

A) Require firms to have consumers affirmatively opt-in before PII is collected.

 

 

B

.

B) Require firms to allow consumers to opt-out before PII is collected.

 

 

C

.

C) Make collection of PII illegal.

 

 

D

.

D) Require robust notice only before PII is collected.

 

正確答案: A

答案解釋:

25.32) Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?

單選題 (2 ) 2

 

A

.

A) anonymous surfing

 

 

B

.

B) anonymous remailers

 

 

C

.

C) differential privacy software

 

 

D

.

D) public key encryption

 

正確答案: C

答案解釋:

26.62) Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?

單選題 (2 ) 2

 

A

.

A) ICANN

 

 

B

.

B) FTC

 

 

C

.

C) WIPO

 

 

D

.

D) USPTO

 

正確答案: C

答案解釋:

27.3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

單選題 (2 ) 2

 

A

.

A) accountability

 

 

B

.

B) privacy

 

 

C

.

C) responsibility

 

 

D

.

D) liability

 

正確答案: B

答案解釋:

28.54) All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

單選題 (2 ) 2

 

A

.

A) up to ten years imprisonment for a first offense.

 

 

B

.

B) fines up to $500,000 for a first offense.

 

 

C

.

C) fines up to $1 million for a repeat offense.

 

 

D

.

D) restitution to the injured parties for any losses due to infringement.

 

正確答案: A

答案解釋:

29.77) Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?

單選題 (2 ) 2

 

A

.

A) South Dakota v. Wayfair

 

 

B

.

B) Bilski et al. v. Kappos

 

 

C

.

C) Quill v. North Dakota

 

 

D

.

D) Alice Corporation v. CLS Bank International

 

正確答案: A

答案解釋:

30.76) Which of the following involves the issue of social control? 

單選題 (2 ) 2

 

A

.

A) information rights

 

 

B

.

B) governance

 

 

C

.

C) public safety and welfare

 

 

D

.

D) property rights

 

正確答案: B

答案解釋:

31.52) Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

單選題 (2 ) 2

 

A

.

A) A professor clips a newspaper article just before class and distributes copies of it to his class.

 

 

B

.

B) A journalist quotes a paragraph from a book in a review of the book.

 

 

C

.

C) A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

 

 

D

.

D) Google posts thumbnail images of books in the Google Book Search Project.

 

正確答案: C

答案解釋:

32.55) All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:

單選題 (2 ) 2

 

A

.

A) the DMCA makes it illegal to circumvent technological measures to protect works.

 

 

B

.

B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.

 

 

C

.

C) the DMCA requires search engines to block access to infringing sites.

 

 

D

.

D) the DMCA allows libraries to make digital copies of works for internal use only.

 

正確答案: B

答案解釋:

33.48) Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?

單選題 (2 ) 2

 

A

.

A) Field v. Google, Inc.

 

 

B

.

B) Alice Corporation Pty. Ltd. v. CLS Bank International

 

 

C

.

C) BMG Rights Management v. Cox Communications

 

 

D

.

D) Perfect 10, Inc. v. Amazon.com, Inc. et al.

 

正確答案: C

答案解釋:

34.3. 行動商務的效益包含下列何者?(單選)

單選題 (2 ) 2

 

A

.

(A) 傳輸無線化

 

 

B

.

(B) 連線快速化

 

 

C

.

(C) 追蹤便捷化

 

 

D

.

(D) 以上皆是

 

正確答案: D

答案解釋:

35.47) All of the following are required for information to be considered a trade secret except:

單選題 (2 ) 2

 

A

.

A) it must have commercial value to its owner.

 

 

B

.

B) the owner must have taken steps to protect it.

 

 

C

.

C) it must be unique.

 

 

D

.

D) it must be something that others do not know.

 

正確答案: C

答案解釋:

36.16) The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

37.39) The main objective of the European Unions General Data Protection Regulation  (GDPR) is to strengthen the rights of citizens to their own personal information and to strengthen oversight of firms to ensure that they implement these individual rights.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

38.84) Online gambling is now legal throughout the United States.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

39.73) Google defended its Library Project on the grounds of fair use.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

40.71) Copyright protection protects against others copying the underlying ideas in a work.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

41.82) The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

42.41) The Federal Communications Commission's privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

43.42) The Illinois Biometric Information Privacy Act requires firms to have user consent to collect facial information.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

44.38) In the United States, Google is not required to remove results from its search engine if requested.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

45.15) Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

46.79) Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

47.17) The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

48.72) Owners of gTLDs have the right to create and sell new domains with the gTLD suffix.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

49.83) Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

50.40) The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

 

All of the following are advantages of online retail except:

faster delivery of goods.

 

 

All of the following are challenges faced by bricks-and-clicks firms except:

building a brand name.

 

 

All of the following are challenges for catalog merchants except:

building sophisticated order entry and fulfillment systems.

 

 

All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:

high-cost structures.

 

 

All of the following are strategic factors that pertain specifically to a firm and its related businesses except:

power of customers.

 

 

All of the following are terms used to describe on-demand service companies except:

omni-channel commerce.

 

 

All of the following have introduced social commerce functionality, such as buy buttons, shoppable ads, and marketplaces, except:

Tumblr.

 

 

All of the following services require extensive personalization except:

financial services.

 

 

All of the following statements about Amazon are true except:

Amazon purchased Jet.com, one of its discount competitors, to give it a more robust network for delivering goods.

 

 

All of the following statements about the MOTO sector are true except:

the MOTO sector is also referred to as the specialty store sector.

 

 

All of the following statements about the online insurance industry are true except:

the Internet has lowered search costs, increased price comparison, and decreased prices to consumers for forms of insurance.

 

 

All of the following statements about the online real estate services market are true except:

the Internet and e-commerce have created a revolution in the real estate value chain.

 

 

All of the following were parts of the vision during the early days of e-commerce except the belief that:

new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.

 

 

Apart from Amazon, the top online retail firms in terms of online sales are all primarily ________ firms.

omni-channel.

 

 

Approximately ________% of the United States labor force is involved in providing services.

80

 

 

 

(T/F) Big data plays an important role in predictive marketing.

True

 

 

Booking Holdings owns all of the following except:

Expedia.

 

 

(T/F) Consumers are primarily price-driven when shopping on the Internet.

False

 

 

(T/F) Contrary to predictions of analysts made during the early days of e-commerce, the Internet has led to both disintermediation and hypermediation on a widespread basis.

False

 

 

Craigslist is most involved in which of the following online services market(s)?

real estate services and career services.

 

 

Current liabilities are debts of the firm that will be due within:

one year.

 

 

For a quick check of a firm's short-term financial health, examine its:

working capital.

 

 

Gross margin is defined as gross profit:

divided by net sales revenues.

 

 

(T/F) In 2020, almost 75% of the adult U.S. population was expected to use online banking.

True

 

 

In 2020, it was estimated that about what percentage of Internet users over the age of 14 would make a purchase at an online retail store?

80%

 

 

(T/F) In 2020, the number of online buyers in the United States was around 205 million.

True

 

 

In ________, all of a customer's financial (and even nonfinancial) data are pulled together into a single, personalized website.

account aggregation

 

 

In the United States, the service sector accounts for approximately ________% of the United States GDP.

80

 

 

 

Omni-channel merchants are also referred to as:

bricks-and-clicks companies.

 

 

(T/F) On-demand service companies collect a fee from both sellers and buyers who use the platform.

True

 

 

(T/F) Online retail constitutes about 20% of the total retail market today.

False

 

 

(T/F) Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.

True

 

 

Operating margin is defined as:

operating income or loss divided by net sales revenues.

 

 

(T/F) Personal consumption of retail goods and services accounts for over 80% of total gross domestic product (GDP).

False

 

 

(T/F) Service industries (i.e., finance & travel) typically are very knowledge- and information-intense.

True

 

 

(T/F) The Covid-19 pandemic has severely impacted the online travel industry.

True

 

 

The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line?

term life insurance.

 

 

 

(T/F) The existence of substitute products is a key industry strategic factor.

True

 

 

The lower the ________ compared to revenue, the higher the gross profit.

cost of sales.

 

 

(T/F) The online mortgage industry has transformed the process of obtaining a mortgage.

False

 

 

 

The online retail sector of the retail industry is most similar to the ________ sector.

mail order/telephone order (MOTO).

 

 

(T/F) The social network LinkedIn has become major player in the online recruitment market.

True

 

 

(T/F) The term fintech applies only to tech companies that are seeking use technology to unbundle traditional institutional financial services industries and instead deliver targeted solutions.

False

 

 

The term supply-push refers to:

making products prior to orders being received based on estimated demand.

 

 

Virtual merchants face potentially large costs for all of the following except:

building and maintaining physical stores.

 

 

What is another name for pro forma earnings?

earnings before income taxes, depreciation, and amortization (EBITDA).

 

 

What is the largest sector of the online travel services market in terms of revenue?

airline reservations.

 

 

Which of the following best explains why the service sector is a natural avenue for e-commerce?

Much of the value in services is based on the collection, storage, and exchange of information.

 

 

Which of the following enabled MOTO firms to make an easier transition to e-commerce?

The fact that they already had efficient customer order fulfillment processes.

 

 

Which of the following has the highest share of online retail sales?

virtual merchants.

 

 

Which of the following has the second-highest share of online retail sales?

omni-channel merchants.

 

 

Which of the following is a subscription-based retailer using predictive marketing and big data?

Stitch Fix

 

 

Which of the following is an on-demand service company focused on lodging?

Airbnb

 

 

Which of the following is not a digitally native vertical brand (D2C)?

Wayfair

 

 

Which of the following is not a key industry strategic factor?

synergies

 

 

Which of the following is not a major trend in online retail for 2020-2021?

The COVID-19 pandemic is expected to create a decrease in e-commerce retail purchases.

 

 

Which of the following is not a major trend in the online recruitment services industry?

disintermediation.

 

 

Which of the following is not an example of a transaction broker?

an accountant.

 

 

Which of the following is not an example of a virtual merchant?

Dell

 

 

Which of the following is not categorized as an operating expense?

the cost of products being sold.

 

 

Which of the following is not considered a current asset?

long-term investments.

 

 

Which of the following is not one of the central challenges facing the online retail industry?

lack of physical store presence.

 

 

Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration?

online supply-push.

 

 

Which of the following is not one of the seven major segments of the retail industry?

electronics and computers

 

 

Which of the following is not true about on-demand service firms?

On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.

 

 

Which of the following measures the percentage of sales revenue a firm can retain after all expenses are deducted from gross revenues?

net margin.

 

 

Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?

channel conflict.

 

 

Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date?

balance sheet.

 

 

Which of the following statements about online banking is not true?

More people use a tablet for mobile banking than a mobile phone.

 

 

Which of the following statements is not true about the automobile, and automobile parts and accessories, online retail category?

Most of the revenue in this category is generated from the sales of automobiles.

 

 

Which of the following statements is not true?

The online travel services sector is one of the few in which extensive disintermediation has occurred.

 

 

Within the major service industry groups, companies can be categorized generally into those that provide transaction brokering and those that involve which of the following?

providing hands-on services.

 

 

________ provides notices called Consumer Alerts to inform readers when a review is likely to be fraudulent.

Yelp

 

 

1) Which of the following is not a major trend in online retail for 2016-2017?

A) Online retail remains the fastest growing retail channel.

B) The average annual purchase of online buyers continues to increase.

C) Online retailers place an increased emphasis on providing an improved "shopping experience."

D) The number of online buyers begins to plateau.

D

 

 

2) The MOTO sector of the retail industry is most like the ________ sector.

A) specialty stores

B) general merchandise

C) online retail sales

D) consumer durables

C

 

 

 

3) Which of the following is not one of the seven major segments of the retail industry?

A) electronics and computers

B) specialty stores

C) gasoline and fuel

D) food and beverage

A

 

 

 

4) All of the following statements about the MOTO sector are true except:

A) compared to general merchandisers, the transition to e-commerce has been easier for MOTO firms.

B) the MOTO sector is also referred to as the specialty store sector.

C) MOTO was the last technological revolution that preceded e-commerce.

D) distribution of catalogs is one of MOTO retailers' biggest expenses.

B

 

 

 

5) All of the following were factors that precipitated the growth of MOTO except:

A) the national toll-free call system.

B) the growth of the cellular phone industry.

C) falling long distance telecommunications prices.

D) the growth of the credit card industry.

B

 

 

 

6) All of the following were parts of the vision during the early days of e-commerce except the belief that:

A) new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.

B) online consumers were rational and cost-driven.

C) entry costs to the online retail market would be much less than those needed to establish a physical storefront.

D) the cost of acquiring customers would be much lower.

A

 

 

 

7) All of the following have launched trials of Buy buttons except:

A) Facebook.

B) Pinterest.

C) Instagram.

D) Tumblr.

D

 

 

8) In 2016, approximately what percentage of Internet users over the age of 14 made a purchase at an online retail store?

A) 37%

B) 57%

C) 77%

D) 97%

C

 

 

9) Which of the following categories generates the highest percentage of online retail revenue?

A) computers and electronics

B) apparel and accessories

C) books/music/video

D) automobile and automobile parts and accessories

B

 

 

10) All of the following are advantages of online retail except:

A) lower supply chain costs.

B) lower cost of distribution.

C) ability to change prices.

D) faster delivery of goods.

D

 

 

11) Which of the following is not one of the central challenges facing the online retail industry?

A) lack of physical store presence

B) consumer concerns about the privacy of personal information

C) inconvenience in returning goods

D) delivery delays

A

 

 

12) Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration?

A) online catalog

B) online order, in-store pickup

C) online supply-push

D) online promotions for offline purchases

C

 

 

 

13) Which of the following statements is not true about the automobile and automobile parts and accessories online retail category?

A) Most of the revenue in this category is generated from the sales of automobiles.

B) Automobile manufacturers use the Internet to deliver branding advertising.

C) U.S. franchising law prohibits automobile manufacturers from selling cars directly to consumers.

D) Automobile retailing is dominated by dealership networks.

A

 

 

14) Approximately ________ retailers generate 90% of all retail e-commerce sales.

A) 10

B) 100

C) 1,000

D) 10,000

C

 

 

15) Which of the following had the highest online sales revenue in 2015?

A) Macy's

B) Walmart

C) Sears

D) Target

B

 

 

28) Which of the following is not a key industry strategic factor?

A) synergies

B) barriers to entry

C) industry value chain

D) existence of substitute products

A

 

 

 

29) All of the following are strategic factors that pertain specifically to a firm and its related businesses except:

A) core competencies.

B) synergies.

C) technology.

D) power of customers.

D

 

 

30) The lower the ________ compared to revenue, the higher the gross profit.

A) assets

B) cost of sales

C) gross margin

D) operating expenses

B

 

 

31) Gross margin is defined as gross profit:

A) minus total operating expenses.

B) divided by net sales revenues.

C) divided by cost of sales.

D) minus net income.

B

 

 

32) Which of the following is not categorized as an operating expense?

A) the cost of products being sold

B) marketing costs

C) administrative overhead

D) amortization of goodwill

A

 

 

 

33) Operating margin is defined as:

A) operating income or loss divided by net sales revenues.

B) operating income or loss divided by total operating expenses.

C) net sales revenues divided by net income or loss.

D) net assets divided by net liabilities.

A

 

 

 

34) What is another name for pro forma earnings?

A) net margin

B) operating income

C) earnings before income taxes, depreciation, and amortization (EBITDA)

D) generally accepted accounting principles (GAAP) earnings

C

 

 

35) Which of the following would not be considered a current asset?

A) long-term investments

B) cash

C) accounts receivable

D) marketable securities

A

 

 

36) Current liabilities are debts of the firm that will be due within:

A) three months.

B) six months.

C) one year.

D) two years.

C

 

 

37) For a quick check of a firm's short-term financial health, examine its:

A) working capital.

B) gross margin.

C) long-term debt.

D) cost of sales.

A

 

 

 

38) ________ measures the percentage of sales revenue a firm retains after all expenses are deducted from gross revenues.

A) Gross profit

B) Net margin

C) Operating margin

D) Working capital

B

 

 

 

39) Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date?

A) working capital

B) operating margin

C) balance sheet

D) gross margin

C

 

 

42) Which of the following is not an example of a virtual merchant?

A) Overstock

B) Wayfair

C) Rue La La

D) Dell

D

 

 

43) Omni-channel merchants are also referred to as:

A) virtual merchants.

B) bricks-and-clicks companies.

C) catalog merchants.

D) manufacturer-direct firms.

B

 

 

 

44) Which of the following is a subscription-based retailer using predictive marketing and Big Data?

A) Macy's

B) Birchbox

C) Dell

D) Lands' End

B

 

 

 

45) Virtual merchants face potentially large costs for all of the following except:

A) building and maintaining a website.

B) building and maintaining physical stores.

C) building an order fulfillment infrastructure.

D) developing a brand name.

B

 

 

46) All of the following statements about Amazon are true except:

A) Amazon failed to show a profit in 2015.

B) Amazon Web Services is now a major part of Amazon's business.

C) eBay can be considered a competitor of Amazon.

D) Amazon continues to generate revenue primarily by selling products.

A

 

 

47) All of the following are challenges faced by bricks-and-clicks firms except:

A) coordinating prices across channels.

B) handling returns of online purchases at retail outlets.

C) building a credible website.

D) building a brand name.

D

 

 

48) All of the following are challenges for catalog merchants except:

A) high costs of printing and mailing.

B) building a credible website.

C) the need to bring staff in or manage new technology.

D) building sophisticated order entry and fulfillment systems.

D

 

 

49) The term supply-push refers to:

A) making products prior to orders being received based on estimated demand.

B) waiting for orders to be received before building a product.

C) channel conflict.

D) multi-channel manufacturers who sell directly online to consumers.

A

 

 

 

50) All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:

A) moving to a demand-pull model.

B) high cost structures.

C) developing a fast-response online order and fulfillment system.

D) channel conflict.

B

 

 

 

51) Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?

A) disintermediation

B) localization

C) channel conflict

D) hypermediation

C

 

 

52) Which of the following has the highest share of online retail sales?

A) omni-channel merchants

B) virtual merchants

C) catalog merchants

D) manufacturer-direct

B

 

 

 

53) Which of the following has the second-highest share of online retail sales?

A) omni-channel merchants

B) virtual merchants

C) catalog merchants

D) manufacturer-direct

A

 

 

 

57) In the United States, the service sector accounts for approximately ________% of the United States GDP.

A) 70

B) 75

C) 80

D) 85

C

 

 

58) Service industry groups are categorized generally into two groups, those that provide transaction brokering and those that involve:

A) retailing goods.

B) personalization.

C) information brokering.

D) hands-on services.

D

 

 

59) Approximately ________% of the United States labor force is involved in providing services.

A) 50

B) 60

C) 70

D) 80

D

 

 

60) Which of the following is not an example of a transaction broker?

A) a stockbroker

B) a real estate agent

C) an accountant

D) an employment agency

C

 

 

61) All of the following services require extensive personalization except:

A) financial services.

B) legal services.

C) medical services.

D) accounting services.

A

 

 

62) Which of the following best explains why the service sector is a natural avenue for e-commerce?

A) The service sector is less geographically reliant and more globally oriented.

B) The service sector has historically been more technology-reliant.

C) Much of the value in services is based on the collection, storage, and exchange of information.

D) It is not; services are difficult to translate to e-commerce because they rely on face-to-face communication and barter.

C

 

 

 

63) Which of the following statements about online banking is not true?

A) Top mobile banking activities include checking balances and bank statements and viewing recent transactions.

B) Online and mobile banking transactions provide significant costs savings for banks.

C) Millennials are adopting mobile banking at a much higher rate than those who are older.

D) More people use a tablet for mobile banking than a mobile phone.

D

 

 

64) In ________, all of a customer's financial (and even nonfinancial) data are pulled together at a single personalized website.

A) account aggregation

B) a financial portal

C) integrated financial services

D) EBPP systems

A

 

 

 

65) The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line?

A) term life insurance

B) automobile insurance

C) health insurance

D) property and casualty insurance

A

 

 

66) All of the following statements about the online insurance industry are true except:

A) the Internet has dramatically changed the insurance industry's value chain.

B) websites of almost all the major firms provide the ability to obtain an online quote.

C) Internet usage has led to a decline in term life insurance prices industry-wide.

D) the industry has been very successful in attracting visitors searching for information

A

 

 

 

67) All of the following statements about the online real estate services market are true except:

A) most people use the Internet to search for a home, but still use the services of a real estate agent to complete the purchase.

B) real estate differs from other types of online financial services because it is impossible to complete a property transaction online.

C) the primary service offered by real estate sites is a listing of houses available.

D) the Internet and e-commerce have created significant disintermediation in the real estate marketplace.

D

 

 

68) Craigslist is a player in which of the following online services markets?

A) real estate services and career services

B) insurance services and brokerage services

C) travel services

D) online accounting services

A

 

 

73) Which of the following has introduced a tool known as Consumer Alerts to inform readers when a review is likely to be fraudulent?

A) Yelp

B) TripAdvisor

C) Angie's List

D) TripExpert

A

 

 

74) What is the largest sector of the online travel services market in terms of revenue?

A) hotel reservations

B) car reservations

C) cruise/tour reservations

D) airline reservations

D

 

 

75) Which of the following statements is not true?

A) Price competition among online travel services is difficult as comparison shopping for better prices is easy.

B) Online travel services are one of the few sectors in which extensive disintermediation has occurred.

C) The ability of travel products and services to be commoditized is a significant factor in the explosive growth of the online travel services industry.

D) The online travel services industry has gone through a period of consolidation

B

 

 

 

76) Expedia owns all of the following except:

A) Travelocity.

B) Orbitz.

C) TripAdvisor.

D) CheapTickets.

C

 

 

78) Which of these job recruitment sites is not a job listing aggregator?

A) Indeed

B) SimplyHired

C) Glassdoor

D) CareerBuilder

B

 

 

79) Which of the following is not a major trend in the online recruitment services industry?

A) disintermediation

B) Millennials and GenX primarily use mobile devices to search for jobs.

C) social recruiting

D) hiring by algorithm

A

 

 

82) Which of the following is not true about on-demand service firms?

A) The growth of on-demand service firms is supported by the use of online reputation systems based on peer review.

B) It is not likely that on-demand service firms will totally escape government regulation.

C) On-demand service firms facilitate access to resources.

D) On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce

D

 

 

83) ________ is an on-demand service company focused on lodging.

A) Uber

B) Lyft

C) Airbnb

D) Task Rabbit

C

 

 

84) All of the following are terms used to describe on-demand service companies except:

A) mesh economy.

B) collaborative commerce.

C) we-commerce.

D) omni-channel commerce.

D

 

 

1.8) In 2020, it was estimated that about what percentage of Internet users over the age of 14 would make a purchase at an online retail store?

單選題 (2 ) 2

 

A

.

A) 40%

 

 

B

.

B) 60%

 

 

C

.

C) 70%

 

 

D

.

D) 80%

 

正確答案: D

答案解釋:

2.61) Which of the following statements about online banking is not true?

單選題 (2 ) 2

 

A

.

A) Top mobile banking activities include checking balances and bank statements.

 

 

B

.

B) Online and mobile banking transactions provide significant costs savings for banks.

 

 

C

.

C) Millennials are adopting mobile banking at a much higher rate than those who are older.

 

 

D

.

D) More people use a tablet for mobile banking than a mobile phone.

 

正確答案: D

答案解釋:

3.4. 網路搭售是屬於網路行銷組合 4P 決策中的哪一 P(單選) 回答錯誤

單選題 (2 ) 0

 

A

.

(A) 產品

 

 

B

.

(B) 價格

 

 

C

.

(C) 通路

 

 

D

.

(D) 促銷

 

正確答案: B

4.45) The term supply-push refers to:

單選題 (2 ) 2

 

A

.

A) making products prior to orders being received based on estimated demand.

 

 

B

.

B) waiting for orders to be received before building a product.

 

 

C

.

C) channel conflict.

 

 

D

.

D) multi-channel manufacturers who sell directly online to consumers.

 

正確答案: A

答案解釋:

5.27) Gross margin is defined as gross profit:

單選題 (2 ) 2

 

A

.

A) minus total operating expenses.

 

 

B

.

B) divided by net sales revenues.

 

 

C

.

C) divided by cost of sales.

 

 

D

.

D) minus net income.

 

正確答案: B

答案解釋:

6.48) Which of the following has the highest share of online retail sales?

單選題 (2 ) 2

 

A

.

A) omni-channel merchants

 

 

B

.

B) virtual merchants

 

 

C

.

C) catalog merchants

 

 

D

.

D) manufacturer-direct

 

正確答案: B

答案解釋:

7.34) Which of the following measures the percentage of sales revenue a firm can retain after all expenses are deducted from gross revenues?

單選題 (2 ) 2

 

A

.

A) gross profit

 

 

B

.

B) net margin

 

 

C

.

C) operating margin

 

 

D

.

D) working capital

 

正確答案: B

答案解釋:

8.73) Which of the following statements is not true?

單選題 (2 ) 2

 

A

.

A) Price competition among online travel services is difficult as comparison shopping for better prices is easy.

 

 

B

.

B) The online travel services sector is one of the few in which extensive disintermediation has occurred.

 

 

C

.

C) The ability of travel products and services to be commoditized is a significant factor in the explosive growth of the online travel services industry.

 

 

D

.

D) The online travel services industry has gone through a period of consolidation.

 

正確答案: B

答案解釋:

9.10. 下列敘述何者有誤?(單選)

單選題 (2 ) 2

 

A

.

(A) 促銷基本上是一種長期的活動

 

 

B

.

(B) 無法歸屬於人員推銷、廣告、公開報導的推廣活動都屬於促銷範圍

 

 

C

.

(C) 促銷目的在於刺激促銷對象立即購買

 

 

D

.

(D) 促銷是針對特定對象的活動,主要可分為消費者、零售商和經銷商

 

正確答案: A

答案解釋:

10.47) Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?

單選題 (2 ) 2

 

A

.

A) disintermediation

 

 

B

.

B) localization

 

 

C

.

C) channel conflict

 

 

D

.

D) hypermediation

 

正確答案: C

答案解釋:

11.14) Apart from Amazon, the top online retail firms in terms of online sales are all primarily ______ firms. 

單選題 (2 ) 2

 

A

.

A) manufacturer-direct

 

 

B

.

B) omni-channel

 

 

C

.

C) web-only

 

 

D

.

D) catalog merchant

 

正確答案: B

答案解釋:

12.58) Which of the following best explains why the service sector is a natural avenue for e-commerce?

單選題 (2 ) 2

 

A

.

A) The service sector is less geographically reliant and more globally oriented.

 

 

B

.

B) The service sector requires rich marketing messages to reach new customers.

 

 

C

.

C) Much of the value in services is based on the collection, storage, and exchange of information.

 

 

D

.

D) It is not; services are difficult to translate to e-commerce because they all rely on face-to-face communication and barter.

 

正確答案: C

答案解釋:

13.40) Which of the following is a subscription-based retailer using predictive marketing and big data?

單選題 (2 ) 2

 

A

.

A) Macy's

 

 

B

.

B) Stitch Fix

 

 

C

.

C) Dell

 

 

D

.

D) Lands' End

 

正確答案: B

答案解釋:

14.56) Which of the following is not an example of a transaction broker?

單選題 (2 ) 2

 

A

.

A) a stockbroker

 

 

B

.

B) a real estate agent

 

 

C

.

C) an accountant

 

 

D

.

D) an employment agency

 

正確答案: C

答案解釋:

15.6) All of the following were parts of the vision during the early days of e-commerce except the belief that:

單選題 (2 ) 2

 

A

.

A) new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.

 

 

B

.

B) online consumers were rational and cost-driven.

 

 

C

.

C) entry costs to the online retail market would be much less than those needed to establish a physical storefront.

 

 

D

.

D) the cost of acquiring customers would be much lower.

 

正確答案: A

答案解釋:

16.62) In ________, all of a customer's financial (and even nonfinancial) data are pulled together into a single, personalized website.

單選題 (2 ) 2

 

A

.

A) account aggregation

 

 

B

.

B) a financial portal

 

 

C

.

C) integrated financial services

 

 

D

.

D) EBPP systems

 

正確答案: A

答案解釋:

17.11) Which of the following is not one of the central challenges facing the online retail industry?

單選題 (2 ) 2

 

A

.

A) lack of physical store presence

 

 

B

.

B) consumer concerns about the privacy of personal information

 

 

C

.

C) inconvenience in returning goods

 

 

D

.

D) delivery delays

 

正確答案: A

答案解釋:

18.59) Service industries (i.e., finance & travel) typically are very knowledge- and information-intense.

單選題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

19.7) All of the following have introduced social commerce functionality, such as buy buttons, shoppable ads, and marketplaces, except:

單選題 (2 ) 2

 

A

.

A) Facebook.

 

 

B

.

B) Pinterest.

 

 

C

.

C) Instagram.

 

 

D

.

D) Tumblr.

 

正確答案: D

答案解釋:

20.35) Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date?

單選題 (2 ) 2

 

A

.

A) working capital

 

 

B

.

B) operating margin

 

 

C

.

C) balance sheet

 

 

D

.

D) gross margin

 

正確答案: C

答案解釋:

21.29) Operating margin is defined as:

單選題 (2 ) 2

 

A

.

A) operating income or loss divided by net sales revenues.

 

 

B

.

B) operating income or loss divided by total operating expenses.

 

 

C

.

C) net sales revenues divided by net income or loss.

 

 

D

.

D) net assets divided by net liabilities.

 

正確答案: A

答案解釋:

22.2. Kotler「個人和群體經由創造、提供與交易的過程,來滿足需要及欲望所做的種種活動」,是指?(單選)

單選題 (2 ) 2

 

A

.

(A) 市場

 

 

B

.

(B) 交換

 

 

C

.

(C) 交易

 

 

D

.

(D) 行銷

 

正確答案: D

答案解釋:

23.46) All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:

單選題 (2 ) 2

 

A

.

A) moving to a demand-pull model.

 

 

B

.

B) high-cost structures.

 

 

C

.

C) developing a fast-response online order and fulfillment system.

 

 

D

.

D) channel conflict.

 

正確答案: B

答案解釋:

24.65) All of the following statements about the online real estate services market are true except:

單選題 (2 ) 2

 

A

.

A) the first step in the home buying process for nearly all ages of home buyers is to look online.

 

 

B

.

B) the major impact of Internet real estate sites has been in influencing offline decisions.

 

 

C

.

C) the primary service offered by real estate sites is a listing of houses available.

 

 

D

.

D) the Internet and e-commerce have created a revolution in the real estate value chain.

 

正確答案: D

答案解釋:

25.15) Which of the following is not a digitally native vertical brand (D2C)?

單選題 (2 ) 2

 

A

.

A) Warby Parker

 

 

B

.

B) Wayfair

 

 

C

.

C) Everlane

 

 

D

.

D) Caspar

 

正確答案: B

答案解釋:

26.33) For a quick check of a firm's short-term financial health, examine its:

單選題 (2 ) 2

 

A

.

A) working capital.

 

 

B

.

B) gross margin.

 

 

C

.

C) long-term debt.

 

 

D

.

D) cost of sales.

 

正確答案: A

答案解釋:

27.28) Which of the following is not categorized as an operating expense?

單選題 (2 ) 2

 

A

.

A) the cost of products being sold

 

 

B

.

B) marketing costs

 

 

C

.

C) administrative overhead

 

 

D

.

D) amortization of goodwill

 

正確答案: A

答案解釋:

28.55) Approximately ________ % of the United States labor force is involved in providing services.

單選題 (2 ) 2

 

A

.

A) 50

 

 

B

.

B) 60

 

 

C

.

C) 70

 

 

D

.

D) 80

 

正確答案: D

答案解釋:

29.43) All of the following are challenges faced by bricks-and-clicks firms except:

單選題 (2 ) 2

 

A

.

A) coordinating prices across channels.

 

 

B

.

B) handling returns of online purchases at retail outlets.

 

 

C

.

C) building a credible website.

 

 

D

.

D) building a brand name.

 

正確答案: D

答案解釋:

30.78) Which of the following is not a major trend in the online recruitment services industry?

單選題 (2 ) 2

 

A

.

A) disintermediation

 

 

B

.

B) video and remote recruiting

 

 

C

.

C) social recruiting

 

 

D

.

D) use of artificial intelligence technologies in the hiring process

 

正確答案: A

答案解釋:

31.9) Which of the following categories generated the highest percentage of online retail revenue in 2019? 回答錯誤

單選題 (2 ) 0

 

A

.

A) computers and electronics

 

 

B

.

B) apparel and accessories

 

 

C

.

C) books/music/video

 

 

D

.

D) automobile and automobile parts and accessories

 

正確答案: A

32.74) Booking Holdings owns all of the following except:

單選題 (2 ) 2

 

A

.

A) Priceline.

 

 

B

.

B) Expedia.

 

 

C

.

C) Booking.com

 

 

D

.

D) Kayak

 

正確答案: B

答案解釋:

33.13) Which of the following statements is not true about the automobile, and automobile parts and accessories, online retail category?

單選題 (2 ) 2

 

A

.

A) Most of the revenue in this category is generated from the sales of automobiles.

 

 

B

.

B) Automobile manufacturers use the Internet to deliver branding advertising.

 

 

C

.

C) U.S. franchising law prohibits automobile manufacturers from selling cars directly to consumers.

 

 

D

.

D) Automobile retailing is dominated by dealership networks.

 

正確答案: A

答案解釋:

34.49) Which of the following has the second-highest share of online retail sales?

單選題 (2 ) 2

 

A

.

A) omni-channel merchants

 

 

B

.

B) virtual merchants

 

 

C

.

C) catalog merchants

 

 

D

.

D) manufacturer-direct

 

正確答案: A

答案解釋:

35.26) The lower the ________ compared to revenue, the higher the gross profit.

單選題 (2 ) 2

 

A

.

A) assets

 

 

B

.

B) cost of sales

 

 

C

.

C) gross margin

 

 

D

.

D) operating expenses

 

正確答案: B

答案解釋:

36.44) All of the following are challenges for catalog merchants except:

單選題 (2 ) 2

 

A

.

A) high costs of printing and mailing.

 

 

B

.

B) building a credible website.

 

 

C

.

C) the need to bring staff in or manage new technology.

 

 

D

.

D) building sophisticated order entry and fulfillment systems.

 

正確答案: D

答案解釋:

37.3) Which of the following is not one of the seven major segments of the retail industry?

單選題 (2 ) 2

 

A

.

A) electronics and computers

 

 

B

.

B) specialty stores

 

 

C

.

C) gasoline and fuel

 

 

D

.

D) food and beverage

 

正確答案: A

答案解釋:

38.31) Which of the following is not considered a current asset?

單選題 (2 ) 2

 

A

.

A) long-term investments

 

 

B

.

B) cash

 

 

C

.

C) accounts receivable

 

 

D

.

D) marketable securities

 

正確答案: A

答案解釋:

39.75) The Covid-19 pandemic has severely impacted the online travel industry.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

40.19) Contrary to predictions of analysts made during the early days of e-commerce, the Internet has led to both disintermediation and hypermediation on a widespread basis.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

41.69) The term fintech applies only to tech companies that are seeking use technology to unbundle traditional institutional financial services industries and instead deliver targeted solutions. 

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

42.18) Personal consumption of retail goods and services accounts for over 80% of total gross domestic product (GDP).

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

43.50) Big data plays an important role in predictive marketing.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

 

C

.

AACSB:  Application of knowledge

 

 

D

.

Learning Objective:  9.3: Identify the challenges faced by the different types of online retailers.

 

正確答案: A

答案解釋:

44.21) Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

45.36) The existence of substitute products is a key industry strategic factor.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

 

C

.

AACSB:  Application of knowledge

 

 

D

.

Learning Objective:  9.2: Explain how to analyze the economic viability of an online firm.

 

正確答案: A

答案解釋:

46.16) Online retail constitutes about 20% of the total retail market today.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

47.68) The online mortgage industry has transformed the process of obtaining a mortgage.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

48.20) Consumers are primarily price-driven when shopping on the Internet.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: B

答案解釋:

49.67) In 2020, almost 75% of the adult U.S. population was expected to use online banking.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

答案解釋:

50.79) The social network LinkedIn has become major player in the online recruitment market.

是非題 (2 ) 2

 

A

.

O

 

 

B

.

X

 

正確答案: A

 

1.73) In 2019, which of the following was the producer of the largest percentage of revenues in the U.S. entertainment industry?

單選題 (2 ) 2

 

A

.

A) radio

 

 

B

.

B) television

 

 

C

.

C) box office movies

 

 

D

.

D) games

 

正確答案: B

答案解釋:

2.44) Who was the first major fiction writer to create an e-book-only volume of a new work?

單選題 (2 ) 2

 

A

.

A) Hugh Howey

 

 

B

.

B) Stephen King

 

 

C

.

C) Dan Brown

 

 

D

.

D) Amanda Hocking

 

正確答案: B

答案解釋:

3.52) Zinio is an example of which of the following?

單選題 (2 ) 2

 

A

.

A) interactive book developer

 

 

B

.

B) magazine aggregator

 

 

C

.

C) e-reader platform

 

 

D

.

D) vanity press

 

正確答案: B

答案解釋:

4.11) Which of the following is not an example of industry structure convergence?

單選題 (2 ) 2

 

A

.

A) Amazons creation of Amazon Books Publishing

 

 

B

.

B) Verizons acquisition of Yahoo

 

 

C

.

C) AT&Ts acquisition of Time Warner

 

 

D

.

D) Apples development of the iPad

 

正確答案: D

答案解釋:

5.72) Which of the following statements about the music industry is not true? 回答錯誤

單選題 (2 ) 0

 

A

.

A) Music industry revenues in 2019 are still only 80% of what they were in 1999.

 

 

B

.

B) Digital revenues accounted almost 90% of all U.S. music revenues in 2019.

 

 

C

.

C) More revenue was generated by the sales of digital downloads than physical units in 2019.

 

 

D

.

D) Streaming music generated about 80% of all digital music sales in 2019.

 

正確答案: C

6.75) In 2020, which of the following comprised the largest segment of the online gaming audience?

單選題 (2 ) 2

 

A

.

A) tablet gamers

 

 

B

.

B) smartphone gamers

 

 

C

.

C) PC gamers

 

 

D

.

D) console gamers

 

正確答案: B

答案解釋:

7.3) Which of the following U.S. media channels generates the most revenue?

單選題 (2 ) 2

 

A

.

A) broadcast television/pay TV

 

 

B

.

B) video games

 

 

C

.

C) newspapers

 

 

D

.

D) box office movies

 

正確答案: A

答案解釋:

8.5) Which of the following statements about Millennials is not true?

單選題 (2 ) 2

 

A

.

A) Millennials are more likely to have read a book in the past 12 months than older adults.

 

 

B

.

B) Millennials overwhelmingly prefer e-books to printed books.

 

 

C

.

C) Almost two-thirds of Millennials view digital videos daily.

 

 

D

.

D) Millennials are much more to use streaming services such as Netflix, Hulu, and Amazon than older adults.

 

正確答案: B

答案解釋:

9.49) In 2019, book publishing revenues: 回答錯誤

單選題 (2 ) 0

 

A

.

A) were flat.

 

 

B

.

B) increased significantly.

 

 

C

.

C) experienced a sizeable decrease.

 

 

D

.

D) increased slightly.

 

正確答案: A

10.69) Which of the following statements is not true?

單選題 (2 ) 2

 

A

.

A)  iVOD revenues have grown faster than subscription streaming (SVOD) revenues.

 

 

B

.

B) Surveys indicated that a majority of people are unwilling to pay more than $20 per month for SVOD services.

 

 

C

.

C) Of all the content industries, thus far, the home entertainment and movie industry has been able to maintain its revenue stream and not be digitally destroyed by new technologies.

 

 

D

.

D) The movie industry's control of the release window of a movie is a form of price discrimination.

 

正確答案: A

答案解釋:

11.40) Which of the following is not an example of a native digital news site?

單選題 (2 ) 2

 

A

.

A) Huffington Post

 

 

B

.

B) Buzzfeed

 

 

C

.

C) Vice

 

 

D

.

D) USA Today

 

正確答案: D

答案解釋:

12.3. 人和人之間的關係是指下列何者?(單選)

單選題 (2 ) 2

 

A

.

(A) 口碑

 

 

B

.

(B) 社群

 

 

C

.

(C) 大眾關係

 

 

D

.

(D) 微區隔

 

正確答案: B

答案解釋:

13.71) Which of the following statements about the home entertainment industry is not true?

單選題 (2 ) 2

 

A

.

A) Over 55% of the U.S. population uses an over-the-top (OTT) subscription service in addition to or instead of cable/satellite TV.

 

 

B

.

B) Apple TV is the digital media device used by the most people in the United States.

 

 

C

.

C)  Both the television and movie industry share in home entertainment revenues.

 

 

D

.

D) Neither the television nor film industries have built an industry-wide Internet delivery system.

 

正確答案: B

答案解釋:

14.47) According to Amazon, around how many indie authors have earned more than $100,000 in royalties from their books? 回答錯誤

單選題 (2 ) 0

 

A

.

A) 10

 

 

B

.

B) 100

 

 

C

.

C) 1,000

 

 

D

.

D) 10,000

 

正確答案: C

15.68) ________ is the leading online television and movie distributor.

單選題 (2 ) 2

 

A

.

A) Netflix

 

 

B

.

B) Hulu

 

 

C

.

C) iTunes

 

 

D

.

D) Google Play

 

正確答案: A

答案解釋:

16.66) Which streaming gaming channel was purchased by Amazon in 2015?

單選題 (2 ) 2

 

A

.

A) Dailymotion

 

 

B

.

B) YouTube Gaming

 

 

C

.

C) Twitch

 

 

D

.

D) Mixer

 

正確答案: C

答案解釋:

17.50) When was the future of e-books firmly established?

單選題 (2 ) 2

 

A

.

A) in 2000, with the release on Amazon of Stephen King's novella, Riding the Bullet

 

 

B

.

B) in 2007, with the introduction of Amazon's Kindle

 

 

C

.

C) in 2009, when Barnes & Noble introduced its Nook e-reader

 

 

D

.

D) in 2010, when Apple introduced the first iPad

 

正確答案: B

答案解釋:

18.36) Which of the following statements about the newspaper industry is not true?

單選題 (2 ) 2

 

A

.

A) U.S. newspaper revenues totaled about $26 billion in 2019.

 

 

B

.

B) The newspaper labor force has dropped precipitously since 2006.

 

 

C

.

C) Social media sites have become a major source of unique visitors to online newspapers.

 

 

D

.

D) Newspaper circulation revenues have declined dramatically since 2000.

 

正確答案: D

答案解釋:

19.12. 有關行銷 AIDA 模式之描述,下列何者不正確?(單選)

單選題 (2 ) 2

 

A

.

(A) 第一個 A:代表「注意」(Attention)

 

 

B

.

(B) 第二個 I:代表「訊息」(Information)

 

 

C

.

(C) 第三個 D:代表「欲望」(Desire)

 

 

D

.

(D) 第四個 A:代表「行動」(Action)

 

正確答案: B

答案解釋:

20.55) The ________ model is not one of the three business models employed by newspapers between 1995 and 2018.

單選題 (2 ) 2

 

A

.

A) Print-centric

 

 

B

.

B) Integrated Print/Web

 

 

C

.

C) Digital First

 

 

D

.

D) Convergence

 

正確答案: D

答案解釋:

21.37) Which of the following statements about online magazine publishing is not true? 回答錯誤

單選題 (2 ) 0

 

A

.

A) The total magazine audience size increased by almost 25% from 2014 to 2019, due entirely to the growth of digital magazines, especially mobile web editions and video content.

 

 

B

.

B) The majority of magazine revenues derive from subscriptions.

 

 

C

.

C) Apple+ News is an example of a magazine aggregator.

 

 

D

.

D) An estimated 225 million people engage with magazine content via print/digital replica editions.

 

正確答案: B

22.34) Which of the following happened during the time period when newspapers used a print-centric business model?

單選題 (2 ) 2

 

A

.

A) Google launched its search engine.

 

 

B

.

B) Apple introduced the iPhone.

 

 

C

.

C) Facebook opened to the public.

 

 

D

.

D) The adoption of smartphones and tablets has grown rapidly.

 

正確答案: A

答案解釋:

23.16) Content convergence describes convergence in the design, production, and ________ of content.

單選題 (2 ) 2

 

A

.

A) sales

 

 

B

.

B) distribution

 

 

C

.

C) marketing

 

 

D

.

D) consumption

 

正確答案: B

答案解釋:

24.15. 有共同興趣的人,在網路上形成一個團體,團體間可藉由某些線上服務分享資訊,這是指哪個概念?(單選)

單選題 (2 ) 2

 

A

.

(A) 商務

 

 

B

.

(B) 基模

 

 

C

.

(C) 社群

 

 

D

.

(D) 內容

 

正確答案: C

答案解釋:

25.43) Which of the following statements about the online newspaper audience is not true?

單選題 (2 ) 2

 

A

.

A) The online newspaper is one of the most successful of all online media in terms of audience size.

 

 

B

.

B) Online readership of newspapers is growing at more than 30% a year

 

 

C

.

C)  People in the age 18 to 34 age group are more likely to read the news online than older people.

 

 

D

.

D) Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.

 

正確答案: B

答案解釋:

26.39) Which of the following statements about independent bookstores is not true?

單選題 (2 ) 2

 

A

.

A) The growth of national bookstore chains such as Barnes & Noble had a negative impact on independent bookstores.

 

 

B

.

B) Many independent bookstores have successfully transformed their legacy business models and technology.

 

 

C

.

C) The fate of independent bookstores remains a major question in the wake of the Covid-19 pandemic.

 

 

D

.

D) The number of independent bookstores declined by almost 50% between 2009 and 2018.

 

正確答案: D

答案解釋:

27.17) A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.

單選題 (2 ) 2

 

A

.

A) sales

 

 

B

.

B) distribution

 

 

C

.

C) a la carte

 

 

D

.

D) freemium

 

正確答案: D

答案解釋:

28.67) Which of the following statements about e-sports is not true? 回答錯誤

單選題 (2 ) 0

 

A

.

A) Many colleges now to offer scholarships for players on their video game teams.

 

 

B

.

B) YouTube Gaming accounts for over 80% of the online e-sports viewing in the United States.

 

 

C

.

C) E-sports tournaments routinely draw an online audience equal to professional football games.

 

 

D

.

D) The e-sport audience is predominantly composed of males between the ages of 21 and 34.

 

正確答案: B

29.38) Magazine digital advertising revenues are expected to _______ for the next few years.

單選題 (2 ) 2

 

A

.

A) remain relatively flat

 

 

B

.

B) more than double

 

 

C

.

C) grow over 20%

 

 

D

.

D) significantly decrease

 

正確答案: A

答案解釋:

30.80) Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:

單選題 (2 ) 2

 

A

.

A) dynamic pricing.

 

 

B

.

B) content convergence.

 

 

C

.

C) the release windows.

 

 

D

.

D) digital rights management.

 

正確答案: C

答案解釋:

31.48) ________ was sued by the Justice Department for violating antitrust laws in connection with e-books.

單選題 (2 ) 2

 

A

.

A) Amazon

 

 

B

.

B) Google

 

 

C

.

C) Apple

 

 

D

.

D) Barnes & Noble

 

正確答案: C

答案解釋:

32.46) Around what percentage do e-book revenues constitute of overall book publishing revenues? 

單選題 (2 ) 2

 

A

.

A) About 13%

 

 

B

.

B) About 23%

 

 

C

.

C) About 33%

 

 

D

.

D) About 43%

 

正確答案: D

答案解釋:

33.56) Which of the following native digital news sites has the most unique monthly visitors? 回答錯誤

單選題 (2 ) 0

 

A

.

A) HuffingtonPost.com

 

 

B

.

B) Vox Media

 

 

C

.

C) Vice Media

 

 

D

.

D) Buzzfeed

 

正確答案: B

34.8) All of the following are examples of technology convergence except:

單選題 (2 ) 2

 

A

.

A) the iPad.

 

 

B

.

B) Amazon Books Publishing.

 

 

C

.

C) Apple TV.

 

 

D

.

D) smartphones.

 

正確答案: B

答案解釋:

35.58) According to Pew Research Center, what percentage of newspaper readers often use a desktop or laptop, as opposed to a mobile device, to read the news?

單選題 (2 ) 2

 

A

.

A) 20%

 

 

B

.

B) 30%

 

 

C

.

C) 40%

 

 

D

.

D) 50%

 

正確答案: B

答案解釋:

36.59) Major newspapers withdrew from Facebooks Instant Articles program because it resulted in Facebook draining newspaper sites of visitors.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

37.27) Cannibalization is a major challenge facing book publishers.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

38.83) In 2019, digital games generated more than three times the amount of digital music revenues.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

39.21) The video game industry accounts for the second highest percentage of U.S. media revenues.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

40.61) Vox is an example of the Digital First business model.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

41.22) The time spent on desktop computers and mobile devices now exceeds time spent in front of the television.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

42.23) The a la carte revenue model allows users to pay only for what they use.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

43.25) Revenue generated by online TV and movies is expected to grow by nearly 20% between 2020 and 2022.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

44.26) Smartphones are an example of technological convergence.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

45.24) Millennials are the first generation to be born into the digital revolution of the 20th century.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

46.60) In the wholesale model of e-book distribution, pricing power is with the publisher.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

47.19) The amount of time the average American adult spends consuming media is about two-and-a half times the amount of time spent at work.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

48.20) The proliferation of mobile devices has led to a decrease in the total amount of time spent with media.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

49.18) The Covid-19 pandemic has resulted in an increase in advertising revenue for online content providers.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

50.82) Streaming has replaced downloading as the preferred consumer viewing platform for home entertainment content.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

 

1) Which of the following is not a current trend in online content?

A) Sales of music in digital form produce more revenue than sales of physical units.

B) Readership of newspapers in print form continues to exceed online readership.

C) E-book sales growth slows.

D) Explosive growth of the mobile platform accelerates the transition to digital content.

B) Readership of newspapers in print form continues to exceed online readership.

 

 

2) Cord cutters and cord shavers are shrinking the number of pay TV households yearly by approximately:

A) 1%.

B) 5%.

C) 10%.

D) 15%.

A) 1%

 

 

3) Which of the following forms of media generate the most revenue?

A) television

B) Internet

C) newspapers

D) box office

A) television

 

 

4) Music streaming is growing at ________ a year.

A) 20%

B) 30%

C) 40%

D) 50%

C) 40%

 

 

5) Well over ________ of television viewers multitask while watching television.

A) 20%

B) 40%

C) 60%

D) 80%

D) 80%

 

 

6) Which of the following is the fastest growing segment of media revenues?

A) magazines

B) home video

C) Internet media

D) radio

C) Internet Media

 

 

7) Which of the following streaming TV devices does not involve use of a remote controller?

A) Google Chromecast

B) Apple TV

C) Amazon Fire TV

D) Roku

A) Google Chromecast

 

 

8) All of the following are examples of technology convergence except:

A) the iPad.

B) Amazon Books Publishing.

C) Apple TV.

D) smartphones.

B) Amazon Books Publishing.

 

 

 

9) All of the following are aspects of content convergence except:

A) language.

B) design.

C) production.

D) distribution.

A) language

 

 

 

10) Which of the following occurs first in the process of content convergence related to books?

A) media integration

B) media migration

C) media transformation

D) media maturity

B) media migration

 

 

 

11) ________ accounted for the second largest amount of paid online content revenues in the United States in 2016.

A) Online video games

B) Internet radio

C) Online music

D) Online TV and movies

A) Online video games

 

 

12) Internet media revenue is about ________ of total entertainment and media revenue.

A) 9%

B) 18%

C) 36%

D) 40%

A) 9%

 

 

13) The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:

A) aggregation.

B) repackaging.

C) media transformation.

D) industry convergence.

D) industry convergence.

 

 

14) DRM refers to a combination of ________ for protecting digital content.

A) hardware and software methods

B) technical and legal means

C) user and publisher agreements

D) local and remote policies

B) technical and legal means

 

 

 

15) ________ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.

A) Technological

B) Content

C) Media

D) Industry

A) Technological

 

 

 

16) Content convergence describes convergence in the design, production, and ________ of content.

A) sales

B) distribution

C) marketing

D) consumption

B) distribution

 

 

17) A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.

A) sales

B) distribution

C) a la carte

D) freemium

D) freemium

 

 

 

32) Which of the following newspaper audience platforms has the highest percentage of readers?

A) print/mobile

B) Web only

C) Web/mobile

D) print

D) print

 

 

33) ________ has the highest share of the e-book market.

A) Amazon

B) Apple

C) Google

D) Barnes & Noble

A) Amazon

 

 

34) Which of the following happened when newspapers used a print-centric business model?

A) Google launched its search engine.

B) Apple introduced the iPhone.

C) Facebook opened to the public.

D) The adoption of smartphones and tablets has grown rapidly.

A) Google launched its search engine.

 

 

 

35) Which of the following was the most troubled (e.g., revenues) segment of the publishing industry in 2016?

A) books

B) magazines

C) newspapers

D) periodicals

C) newspapers

 

 

36) Which of the following statements about the newspaper industry is not true?

A) The growth of the mobile platform and social networks has potential to lessen the disruption of the newspaper industry.

B) Online readership of newspapers is increasing.

C) The emergence of search engines such as Google has had a major impact on the newspaper industry.

D) Newspaper circulation revenues have declined by 10% since 2000.

A) The growth of the mobile platform and social networks has potential to lessen the disruption of the newspaper industry.

 

 

38) Magazine print advertising revenues are expected to ________ through 2020.

A) remain relatively flat

B) more than double

C) grow 20%

D) significantly decrease

A) remain relatively flat

 

 

39) Which of the following is not one of the top three players in e-book publishing?

A) Barnes & Noble

B) Apple

C) Amazon

D) Google

D) Google

 

 

40) Which of the following is not an example of a native digital news site?

A) Huffington Post

B) Buzzfeed

C) Vice

D) USA Today

D) USA Today

 

 

41) Which of the following routes to a newspaper website generates the most digital ad revenue for the newspaper?

A) via a search engine

B) via a social media site such as Facebook

C) directly to a newspaper's home page

D) via an online video

C) directly to a newspaper's home page

 

 

42) A metered subscription model is most similar to which of the following revenue models?

A) transaction fee

B) freemium

C) advertising

D) affiliate

B) Freemium

 

 

43) Which of the following statements about the online newspaper audience is not true?

A) The online newspaper is one of the most successful of all online media in terms of audience size.

B) Most newspaper readers read the news using a combination of the Web, print and mobile.

C) Over 65% of Internet users read newspaper content online.

D) Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.

B) Most newspaper readers read the news using a combination of the Web, print and mobile.

 

 

 

44) Who was the first major fiction writer to create an e-book-only volume of a new work?

A) Hugh Howey

B) Stephen King

C) Dan Brown

D) Amanda Hocking

B) Stephen King

 

 

45) Together Amazon and Apple account for ________ of the e-book market.

A) 50%

B) 75%

C) 85%

D) 90%

C) 85%

 

 

46) Around what percentage of Amazon's top 100 selling books are now self-published?

A) 10%

B) 25%

C) 40%

D) 50%

C) 40%

 

 

47) In 2016, e-book sales are expected to constitute about ________% of all consumer book sales.

A) 15

B) 25

C) 35

D) 45

B) 25

 

 

48) Which of the following was sued by the Justice Department for violating antitrust laws in connection with e-books?

A) Amazon

B) Google

C) Apple

D) Barnes & Noble

C) Apple

 

 

49) Over the past five years, book publishing revenues have:

A) decreased slightly.

B) increased steadily.

C) remained stable.

D) decreased sharply.

C) remained stable.

 

 

50) In 2014, Amazon engaged in a trade dispute with ________ over the pricing of e-books.

A) Barnes & Noble

B) Penguin Random House

C) Hachette

D) Harper Collins

C) Hachette

 

 

51) Which of the following statements about the wholesale and agency models for selling books is not true?

A) In the wholesale model, the retailer decides at what price to sell a book to the consumer.

B) Amazon surprised traditional publishers by selling e-books for below their wholesale cost.

C) Amazon supports the agency model.

D) A result of the agency model was that Amazon's prices on e-books rose.

C) Amazon supports the agency model.

 

 

 

52) Zinio is an example of which of the following?

A) interactive book developer

B) magazine aggregator

C) e-reader platform

D) vanity press

B) magazine aggregator

 

 

53) The New York Times introduced which of the following revenue models in 2011?

A) paywall

B) metered subscription

C) advertising

D) walled garden

B) metered subscription

 

 

54) Which of the following native digital news sites is owned by AOL?

A) Vox

B) Vice

C) Reddit

D) Huffington Post

D) Huffington Post

 

 

55) Which of the following is not one of the three business models employed by newspapers between 1995 and 2015?

A) The Print-centric model

B) The Integrated Print/Web

C) The Digital First model

D) The Convergence model

D) The Convergence model

 

 

 

56) Which of the following most accurately describes the resolution of the dispute between Hachette, Simon & Schuster, and Amazon?

A) The dispute remains unresolved.

B) Publishers can set the prices of their books, but Amazon can offer incentives to publishers to reduce prices on selected books and publishers may pay Amazon to list their books.

C) Amazon can determine the prices of books sold on its platform at its sole discretion.

D) Amazon must not sell the books for any lower than the price they are offered by Apple.

B) Publishers can set the prices of their books, but Amazon can offer incentives to publishers to reduce prices on selected books and publishers may pay Amazon to list their books.

 

 

57) Which of the following is a news aggregator app that organizes stories in a magazine format, with content drawn from traditional media and social sites, and then reassembled in an easy-to-navigate, personalized format for a mobile touchscreen environment?

A) Reddit

B) Huffington Post

C) Flipboard

D) Buzzfeed

C) Flipboard

 

 

58) What percentage of people read newspapers only on a mobile device?

A) 5%

B) 7%

C) 11%

D) 14%

A) 5%

 

 

66) Which streaming gaming channel was purchased by Amazon in 2015?

A) Dailymotion

B) YouTube.com

C) Twitch.tv

D) Shield.nvidia.com

C) Twitch.tv

 

 

 

68) ________ is the largest online movie download distributor.

A) Netflix

B) Hulu

C) iTunes

D) Google Play

C) iTunes

 

 

69) Which of the following statements about the movie industry is not true?

A) Over 300 million Americans were expected to watch movies online in 2015.

B) Online movie distribution is not dominated by a single distributor.

C) Of the digital formats, the most revenue is generated by subscription streaming.

D) DVD sales make up the largest share of movie revenues.

A) Over 300 million Americans were expected to watch movies online in 2015.

 

 

70) Which of the following is not a leading factor in changing the television industry?

A) increasing broadband penetration

B) development of the mobile platform

C) increased popularity of binge watching compared to watching linear TV

D) inability to attract customers to traditional products

D) inability to attract customers to traditional products

 

 

71) Which of the following statements about the television industry is not true?

A) Netflix is the leading distributor of streaming TV.

B) The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.

C) Americans spend more time watching television on a computer or mobile device than they do on a traditional television set.

D) Over-the-top entertainment services are a threat to cable television distributors.

B) The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.

 

 

73) Which of the following is the largest producer of revenues in the entertainment industry?

A) radio

B) television

C) films

D) video games

B) television

 

 

74) In 2015, which of the following forms of entertainment produced the least amount of revenue?

A) Radio

B) Music

C) Video games

D) Television

A) Radio

 

 

75) In 2016, which of the following comprised the largest segment of the online gaming audience?

A) social gamers

B) mobile gamers

C) casual gamers

D) console gamers

B) mobile gamers

 

 

76) House of Cards is an online TV series developed by which of the following?

A) Amazon Studios

B) HBO

C) Netflix

D) Hulu

C) Netflix

 

 

77) Which of the following statements about mobile gaming is not true?

A) Mobile games generated an estimated $3 billion in 2015.

B) Mobile games have proven difficult to monetize.

C) Mobile games appeal to a younger demographic than console games.

D) Mobile games are expensive to develop.

D) Mobile games are expensive to develop.

 

 

78) Which of the following is not a type of digital gamers?

A) casual gamers

B) local gamers

C) social gamers

D) console gamers

B) local gamers

 

 

79) The leading merchants of digital games are Apple's App Store and:

A) Xbox.

B) Twitch.tv.

C) Amazon Digital.

D) the Google Play store.

D) the Google Play store.

 

 

80) Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:

A) price discrimination.

B) content convergence.

C) the release window.

D) digital rights management.

C) the release window.

 

 

81) Which of the following statements is not true about OTT?

A) To use OTT services, consumers must purchase a bundle of channels.

B) OTT entertainment services are a threat to cable television.

C) OTT refers to the fact that the entertainment service rides "on top" of other network services such as cable TV and telephone service.

D) OTT entertainment services enable binge watching.

A) To use OTT services, consumers must purchase a bundle of channels.

 

 

Streaming has replaced downloading as the preferred consumer viewing platform for home entertainment content.

True

 

 

The a la carte revenue model allows users to pay only for what they use.

True

 

 

Revenue generated by online TV and movies is expected to grow by nearly 30% between 2018 and 2021.

true

 

 

In 2017, which of the following forms of entertainment produced the least amount of revenue?

recorded music

 

 

Which of the following is not a type of digital gamer?

local gamers

 

 

Which of the following platforms was used by the fewest gamers in 2018?

console

 

 

Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:

the release windows.

 

 

Which of the following statements about the wholesale and agency models for selling books is not true?

Amazon supports the agency model.

 

 

The video game industry accounts for the second highest amount of U.S. media revenues.

True

 

 

Which of the following has the highest share of the e-book market?

Amazon

 

 

Together Amazon and Apple account for ________ of the e-book market.

92%

 

 

Which of the following statements about the newspaper industry is not true?

Newspaper circulation revenues have declined dramatically since 2000.

 

 

Which of the following types of online content is consumed by the lowest percentage of U.S. Internet users?

magazines

 

 

Smartphones are an example of technological convergence.

True

 

 

Which of the following is not an example of industry structure convergence?

Apple's development of the iPad

 

 

The majority of Americans who read newspapers online read them exclusively on mobile devices.

True

 

 

Which of the following occurs first in the process of content convergence related to books?

media migration

 

 

In 2018, time spent with digital media accounted for ________ of total media time spent

50%

 

 

________ is the leading online television and movie distributor.

Netflix

 

 

The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:

industry convergence.

 

 

Online newspapers and magazines are the largest and fastest growing forms of online content.

-True

-False

False

 

 

Which of the following U.S. media channels generates the most revenue?

-motion pictures

-Internet

-television

-newspapers

television

 

 

All of the following are aspects of content convergence except:

-production.

-design.

-distribution.

-language.

language

 

 

 

Which of the following occurs first in the process of content convergence related to books?

-media integration

-media maturity

-media transformation

-media migration

media migration

 

 

 

Which of the following statements is not true about OTT?

-OTT entertainment services enable binge watching.

-To use OTT services, consumers must purchase a bundle of channels.

-OTT entertainment services are a threat to cable television.

-OTT refers to the fact that the entertainment service rides "on top" of -other network services such as cable TV and telephone service.

To use OTT services, consumers must purchase a bundle of channels.

 

 

Which streaming gaming channel was purchased by Amazon in 2015?

-Twitch.tv

-Shield.nvidia.com

-YouTube.com

-Dailymotion

Twitch.tv

 

 

Which of the following is not a current trend in online content?

-E-book sales growth slows.

-Explosive growth of the mobile platform accelerates the transition to digital content.

-Americans continue to spend more on streaming music than downloaded music.

-Readership of newspapers in print form continues to exceed online readership.

Readership of newspapers in print form continues to exceed online readership.

 

 

The entertainment industry is generally considered to be composed of five players: television, Hollywood films, music, radio, and games.

-True

-False

True

 

 

The leading merchants of digital games includes Apple's App Store and:

-Xbox.

-the Google Play store.

-Amazon Digital.

-Twitch.tv.

the Google Play store.

 

 

Which of the following magazines underwent a digital remaking following the introduction of a metered paywall in 2014?

-The New Yorker

-Time

-Newsweek

-Sports Illustrated

The New Yorker

 

 

________ is the largest downloading service of movies a la carte (electronic sell-through (EST)).

-Google Play

-Hulu

-Netflix

-iTunes

iTunes

 

 

Online readership of newspapers is growing by more than 10% a year.

-True

-False

True

 

 

Vox is an example of the Digital First business model.

-True

-False

False

 

 

Millennials are the first generation to be born into the digital revolution of the 20th century.

-True

-False

True

 

 

The average American adult spends twice as much time-consuming media than time spent at work.

-True

-False

True

 

 

Which of the following was expected to generate the highest amount of online content revenue in the United States in 2017?

-Internet radio

-online music

-online TV and movies

-online video games

online video games

 

 

________ were the most troubled segment of the publishing industry in 2017.

-Magazines

-Periodicals

-Newspapers

-Books

Newspapers

 

 

 

What percentage of Americans who read newspapers exclusively do so on a mobile device?

-23%

-43%

-53%

-33%

53%

 

 

Which of the following statements about the online newspaper audience is not true?

-Most newspaper readers read the news using a combination of the Web, print and mobile.

-Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.

-Social networks have become a major source of readers for newspaper articles.

-The online newspaper is one of the most successful of all online media in terms of audience size.

Most newspaper readers read the news using a combination of the Web, print and mobile.

 

 

________ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.

-Media

-Content

-Technological

-Industry

Technological

 

 

 

Which of the following is not a type of digital gamers?

-casual gamers

-console gamers

-social gamers

-local gamers

local gamers

 

 

Which of the following statements about the television industry is not true?

-Netflix is the leading distributor of streaming TV.

-The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.

-Over-the-top entertainment services are a threat to cable television distributors.

-Americans spend more time watching television on a computer or mobile device than they do on a traditional television set.

The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.

 

 

Content convergence describes convergence in the design, production, and ________ of content.

-consumption

-marketing

-sales

-distribution

distribution

 

 

 

In 2017, which of the following comprised the largest segment of the online gaming audience?

-casual gamers

-console gamers

-social gamers

-mobile gamers

mobile gamers

 

 

Which of the following is the fastest growing segment of U.S. media revenues?

-magazines

-radio

-home video

-Internet media

Internet media

 

 

Over 50% of the American population watches television online.

-True

-False

True

 

 

Which of the following is not a leading factor in changing the television industry?

-increased popularity of binge watching compared to watching linear TV

-development of the mobile platform

-increasing broadband penetration

-inability to attract customers to traditional products

inability to attract customers to traditional products

 

 

Which of the following native digital news sites is owned by AOL?

-Vox

-Huffington Post

-Reddit

-Vice

Huffington Post

 

 

Which of the following has the highest share of the e-book market?

-Apple

-Barnes & Noble

-Amazon

-Google

Amazon

 

 

Smartphones are an example of technological convergence.

-True

-False

True

 

 

Which of the following statements about the movie industry is not true?

-Online movie distribution is not dominated by a single distributor.

-Over 300 million Americans were expected to watch feature-length movies online in 2017.

-Of all the content industries, thus far, the movie industry has been able to maintain its revenue stream and not be digitally destroyed by new technologies.

-The movie industry's control of the release window of a movie is a form of price discrimination.

Over 300 million Americans were expected to watch feature-length movies online in 2017.

 

 

Which of the following streaming TV devices does not involve use of a remote controller?

-Google Chromecast

-Roku

-Apple TV

-Amazon Fire TV

Google Chromecast

 

 

All of the following are examples of technology convergence except:

-smartphones.

-the iPad.

-Apple TV.

-Amazon Books Publishing.

Amazon Books Publishing.

 

 

The publishing and entertainment industries make up the largest share of the commercial content marketplace, both online and offline.

-True

-False

True

 

 

When was the future of e-books firmly established?

-in 2000, with the release on Amazon of Stephen King's novella, Riding the Bullet

-in 2010, when Apple introduced the first iPad

-in 2007, with the introduction of Amazon's Kindle

-in 2009, when Barnes & Noble introduced its Nook e-reader

in 2007, with the introduction of Amazon's Kindle

 

 

In 2016, revenue from Internet media accounted for about ________ of total entertainment and media revenue.

-9%

-18%

-36%

-40%

9%

 

 

Cord cutters and cord shavers are shrinking the number of pay TV households yearly by approximately:

-2%.

-7%.

-9%.

-5%.

2%.

 

 

Which of the following statements about the newspaper industry is not true?

-Newspaper circulation revenues have remained flat since 2000.

-The emergence of search engines such as Google has had a major impact on the newspaper industry.

-Online readership of newspapers is increasing.

-The desktop computer remains the most common way that that Americans access online newspapers.

The desktop computer remains the most common way that that Americans access online newspapers.

 

 

Which of the following happened during the time period when newspapers used a print-centric business model?

-Apple introduced the iPhone.

-The adoption of smartphones and tablets has grown rapidly.

-Facebook opened to the public.

-Google launched its search engine.

Google launched its search engine.

 

 

 

Zinio is an example of which of the following?

-e-reader platform

-vanity press

-magazine aggregator

-interactive book developer

magazine aggregator

 

 

The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:

-industry convergence.

-repackaging.

-aggregation.

-media transformation.

industry convergence.

 

 

Together Amazon and Apple account for ________ of the e-book market.

-55%

-92%

-72%

-87%

92%

 

 

Which of the following is a news aggregator app that organizes stories in a magazine format, with content drawn from traditional media and social sites, and then reassembled in an easy-to-navigate, personalized format for a mobile touchscreen environment?

-Buzzfeed

-Huffington Post

-Reddit

-Flipboard

Flipboard

 

 

Who was the first major fiction writer to create an e-book-only volume of a new work?

-Amanda Hocking

-Stephen King

-Hugh Howey

-Dan Brown

Stephen King

 

 

 

Which of the following is not one of the top three players in e-book publishing?

-Apple

-Google

-Amazon

-Barnes & Noble

Google

 

 

DRM refers to a combination of ________ for protecting digital content.

-technical and legal means

-local and remote policies

-user and publisher agreements

-hardware and software methods

technical and legal means

 

 

 

Around what percentage of Amazon's top 100 selling e-books are now self-published?

-45%

-15%

-35%

-25%

45%

 

 

________ was sued by the Justice Department for violating antitrust laws in connection with e-books.

-Amazon

-Google

-Barnes & Noble

-Apple

Apple

 

 

In 2016, the sales of downloaded music ________, compared to the previous year.

-were flat

-decreased by 10%

-increased by 10%

-decreased by 20%

decreased by 10%

 

 

 

Magazine digital advertising revenues are expected to _______ for the next few years.

-grow over 20%

-significantly decrease

-more than double

-remain relatively flat

remain relatively flat

 

 

In 2017, e-book sales were expected to constitute about ________% of total trade book sales revenues in the United States.

-40

-30

-10

-20

20

 

 

Which of the following is the most common model for online newspaper access for U.S. newspapers with circulations over 50,000?

-most content free, but subscription fee to access premium content

-paywall

-totally free

-metered subscription model

metered subscription model

 

 

In 2016, mobile games generated more revenue than console games.

-True

-False

False

 

 

Which of the following is not part of an effort by Internet distributors to ensure the survival of legitimate news sites?

-the New Media Alliance

-Google's AMP tool

-Amazon's Spark network

-Facebook Journalism Project

the New Media Alliance

 

 

 

The time spent on desktop computers and mobile devices now exceeds time spent in front of the television.

-True

-False

True

 

 

Cannibalization is a major challenge facing book publishers.

-True

-False

False

 

 

Which of the following statements about mobile gaming is not true?

-Mobile gaming is a more open platform than console gaming.

-Mobile games generated an estimated $3 billion in 2016.

-Mobile games appeal to a younger demographic than console games.

-Mobile games are expensive to develop when compared to traditional gaming systems.

Mobile games are expensive to develop when compared to traditional gaming systems.

 

 

Which of the following statements about the wholesale and agency models for selling books is not true?

-A result of the agency model was that Amazon's prices on e-books rose.

-In the wholesale model, the retailer decides at what price to sell a book to the consumer.

-Amazon surprised traditional publishers by selling e-books for below their wholesale cost.

-Amazon supports the agency model.

Amazon supports the agency model.

 

 

House of Cards is an online TV series developed by which of the following?

-Amazon Studios

-Netflix

-Hulu

-HBO

Netflix

 

 

In the wholesale model of e-book distribution, pricing power is with the publisher.

-True

-False

False

 

 

 

Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:

-content convergence.

-digital rights management.

-the release window.

-dynamic pricing.

the release window.

 

 

The a la carte revenue model allows users to pay only for what they use.

-True

-False

True

 

 

A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.

-sales

-distribution

-freemium

-a la carte

freemium

 

 

 

________ is not one of the three business models employed by newspapers between 1995 and 2017.

-The Digital First model

-The Convergence model

-The Print-centric model

-The Integrated Print/Web

The Convergence model

 

 

In 2016, which of the following forms of entertainment produced the least amount of revenue?

-television

-video games

-radio

-recorded music

recorded music

 

 

The proliferation of mobile device has led to an increase in the total amount of time spent with media.

-True

-False

True

 

 

 

Which of the following is the largest producer of revenues in the U.S. entertainment industry?

-television

-motion pictures

-radio

-video games

television

 

 

Which of the following statements about the movie industry is not true?

 

A. Of all the content industries, thus far, the movie industry has been able to maintain its revenue stream and not be digitally destroyed by new technologies.

B. The movie industry's control of the release window of a movie is a form of price discrimination.

C. Over 300 million Americans were expected to watch feature-length movies online in 2017.

D. Online movie distribution is not dominated by a single distributor.

C. Over 300 million Americans were expected to watch feature-length movies online in 2017.

 

 

A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.

 

A. Distribution

B. A la carte

C. Freemium

D. Sales

C. Freemium

 

 

 

Which of the following occurs first in the process of content convergence related to books?

 

A. Media transformation

B. Media integration

C. Media migration

D. Media maturity

C. Media migration

 

 

 

________ is not one of the three business models employed by newspapers between 1995 and 2017.

 

A. The Digital First model

B. The Convergence model

C. The Integrated Print/Web

D. The Print-centric model

B. Convergence model

 

 

 

________ was sued by the Justice Department for violating antitrust laws in connection with e-books.

 

A. Barnes & Noble

B. Amazon

C. Apple

D. Google

C. Apple

 

 

All of the following are aspects of content convergence except:

 

A. Production.

B. Language.

C. Distribution.

D. Design.

B. Language

 

 

 

Which of the following statements about mobile gaming is not true?

 

A. Mobile games generated an estimated $3 billion in 2016.

B. Mobile gaming is a more open platform than console gaming.

C. Mobile games are expensive to develop when compared to traditional gaming systems.

D. Mobile games appeal to a younger demographic than console games.

C. Mobile games are expensive to develop when compared to traditional gaming systems.

 

 

 

 

In 2017, e-book sales were expected to constitute about ________% of total trade book sales revenues in the United States.

 

A. 30

B. 40

C. 20

D. 10

C. 20

 

 

 

Which streaming gaming channel was purchased by Amazon in 2015?

 

A. Dailymotion

B. Twitch.tv

C. YouTube.com

D. Shield.nvidia.com

B. Twitch.tv

 

 

________ were the most troubled segment of the publishing industry in 2017.

 

A. Books

B. Magazines

C. Periodicals

D. Newspapers

D. Newspapers

 

 

 

Which of the following is not part of an effort by Internet distributors to ensure the survival of legitimate news sites?

 

A. Google's AMP tool

B. The New Media Alliance

C. Amazon's Spark network

D. Facebook Journalism Project

B. The New Media Alliance

 

 

In 2016, the sales of downloaded music ________, compared to the previous year.

 

A. Were flat

B. Increased by 10%

C. Decreased by 10%

D. Decreased by 20%

D. Decreased by 10%

 

 

Which of the following happened during the time period when newspapers used a print-centric business model?

 

A. Google launched its search engine.

B. The adoption of smartphones and tablets has grown rapidly.

C. Facebook opened to the public.

D. Apple introduced the iPhone.

A. Google launched its search engine.

 

 

 

 

TRUE OR FALSE

 

In the wholesale model of e-book distribution, pricing power is with the publisher.

False

 

 

TRUE OR FALSE

 

The a la carte revenue model allows users to pay only for what they use.

True

 

 

TRUE OR FALSE

 

The average American adult spends twice as much time-consuming media than time spent at work.

True

 

 

TRUE OR FALSE

 

The proliferation of mobile device has led to an increase in the total amount of time spent with media.

True

 

 

Which of the following was expected to generate the highest amount of online content revenue in the United States in 2017?

 

A. Internet radio

B. Online music

C. Online TV and movies

D. Online video games

D. Online video games

 

 

Which of the following statements about the television industry is not true?

 

A. The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.

B. Over-the-top entertainment services are a threat to cable television distributors.

C. Americans spend more time watching television on a computer or mobile device than they do on a traditional television set.

D. Netflix is the leading distributor of streaming TV.

A. The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.

 

 

Content convergence describes convergence in the design, production, and ________ of content.

 

A. Marketing

B. Distribution

C. Consumption

D. Sales

B. Distribution

 

 

 

 

 

_______ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.

 

A. Technological

B. Industry

C. Media

D. Content

A. Technological

 

 

 

Which of the following U.S. media channels generates the most revenue?

 

A. Newspapers

B. Television

C. Motion pictures

D. Internet

B. Television

 

 

Which of the following is not a leading factor in changing the television industry?

 

A. Inability to attract customers to traditional products

B. Increasing broadband penetration

C. Development of the mobile platform

D. Increased popularity of binge watching compared to watching linear TV

A. Inability to attract customers to traditional products

 

 

Which of the following magazines underwent a digital remaking following the introduction of a metered paywall in 2014?

 

A. Sports Illustrated

B. The New Yorker

C. Newsweek

D. Time

B. The New Yorker

 

 

 

All of the following are examples of technology convergence except:

 

A. The iPad.

B. Apple TV.

C. Smartphones.

D. Amazon Books Publishing.

D. Amazon Books Publishing

 

 

 

Which of the following streaming TV devices does not involve use of a remote controller?

 

A. Apple TV

B. Roku

C. Google Chromecast

D. Amazon Fire TV

C. Google Chromecast

 

 

In 2016, revenue from Internet media accounted for about ________ of total entertainment and media revenue.

 

A. 36%

B. 40%

C. 18%

D. 9%

D. 9%

 

 

Which of the following native digital news sites is owned by AOL?

 

A. Huffington Post

B. Vice

C. Reddit

D. Vox

A. Huffington Post

 

 

Which of the following statements is not true about OTT?

 

A. To use OTT services, consumers must purchase a bundle of channels.

B. OTT entertainment services are a threat to cable television.

C. OTT refers to the fact that the entertainment service rides "on top" of other network services such as cable TV and telephone service.

D. OTT entertainment services enable binge watching.

A. To use OTT services, consumers must purchase a bundle of channels.

 

 

Which of the following is not a current trend in online content?

 

A. Americans continue to spend more on streaming music than downloaded music.

B. Readership of newspapers in print form continues to exceed online readership.

C. Explosive growth of the mobile platform accelerates the transition to digital content.

D. E-book sales growth slows.

B. Readership of newspapers in print form continues to exceed online readership.

 

 

What percentage of Americans who read newspapers exclusively do so on a mobile device?

 

A. 23%

B. 33%

C. 53%

D. 43%

C. 53%

 

 

Which of the following is a news aggregator app that organizes stories in a magazine format, with content drawn from traditional media and social sites, and then reassembled in an easy-to-navigate, personalized format for a mobile touchscreen environment?

 

A. Reddit

B. Huffington Post

C. Buzzfeed

D. Flipboard

D. Flipboard

 

 

Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:

A. The release window.

B. Dynamic pricing.

C. Content convergence.

D. Digital rights management.

A. The release window.

 

 

In 2016, which of the following forms of entertainment produced the least amount of revenue?

 

A. Television

B. Recorded music

C. Radio

D. Video games

B. Recorded music

 

 

TRUE OR FALSE

 

Online readership of newspapers is growing by more than 10% a year.

True

 

 

TRUE OR FALSE

 

Cannibalization is a major challenge facing book publishers.

False

 

 

TRUE OR FALSE

 

Millennials are the first generation to be born into the digital revolution of the 20th century.

True

 

 

TRUE OR FALSE

 

Online newspapers and magazines are the largest and fastest growing forms of online content.

False

 

 

The leading merchants of digital games includes Apple's App Store and:

A. Xbox.

B. The Google Play store.

C. Twitch.tv.

D. Amazon Digital.

B. The Google Play Store

 

 

Cord cutters and cord shavers are shrinking the number of pay TV households yearly by approximately:

 

A. 5%.

B. 7%.

C. 2%.

D. 9%.

C. 2%

 

 

Which of the following statements about the online newspaper audience is not true?

 

A. Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.

B. The online newspaper is one of the most successful of all online media in terms of audience size.

C. Social networks have become a major source of readers for newspaper articles.

D. Most newspaper readers read the news using a combination of the Web, print and mobile.

D. Most newspaper readers read the news using a combination of the Web, print and mobile.

 

 

Which of the following is the fastest growing segment of U.S. media revenues?

 

A. Home video

B. Radio

C. Internet media

D. Magazines

C. Internet media

 

 

Zinio is an example of which of the following?

 

A. E-reader platform

B. Magazine aggregator

C. Interactive book developer

D. Vanity press

B. Magazine aggregator

 

 

Which of the following is the most common model for online newspaper access for U.S. newspapers with circulations over 50,000?

 

A. Totally free

B. Most content free, but subscription fee to access premium content

C. Metered subscription model

D. Paywall

C. Metered subscription model

 

 

Which of the following is not one of the top three players in e-book publishing?

 

A. Barnes & Noble

B. Google

C. Apple

D. Amazon

B. Google

 

 

Together Amazon and Apple account for ________ of the e-book market.

 

A. 72%

B. 92%

C. 55%

D. 87%

B. 92%

 

 

The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:

 

A. Industry convergence.

B. Repackaging.

C. Media transformation.

D. Aggregation.

A. Industry convergence

 

 

In 2017, which of the following comprised the largest segment of the online gaming audience?

 

A. Social gamers

B. Console gamers

C. Mobile gamers

D. Casual gamers

C. Mobile gamers

 

 

Which of the following has the highest share of the e-book market?

 

A. Amazon

B. Apple

C. Google

D. Barnes & Noble

A. Amazon

 

 

Which of the following is the largest producer of revenues in the U.S. entertainment industry?

 

A. Radio

B. Motion pictures

C. Video games

D. Television

D. Television

 

 

TRUE OR FALSE

 

In 2016, mobile games generated more revenue than console games.

False

 

 

TRUE OR FALSE

 

The entertainment industry is generally considered to be composed of five players: television, Hollywood films, music, radio, and games.

True

 

 

Which of the following is not a type of digital gamers?

 

A. Social gamers

B. Console gamers

C. Local gamers

D. Casual gamers

C. Local gamers

 

 

1) Which of the following is not a current trend in online content?

A) Sales of music in digital form produce more revenue than sales of physical units.

B) Readership of newspapers in print form continues to exceed online readership.

C) E-book sales growth slows.

D) Explosive growth of the mobile platform accelerates the transition to digital content.

B) Readership of newspapers in print form continues to exceed online readership.

 

 

2) Cord cutters and cord shavers are shrinking the number of pay TV households yearly by approximately:

A) 1%.

B) 5%.

C) 10%.

D) 15%.

A) 1%

 

 

3) Which of the following forms of media generate the most revenue?

A) television

B) Internet

C) newspapers

D) box office

A) television

 

 

4) Music streaming is growing at ________ a year.

A) 20%

B) 30%

C) 40%

D) 50%

C) 40%

 

 

5) Well over ________ of television viewers multitask while watching television.

A) 20%

B) 40%

C) 60%

D) 80%

D) 80%

 

 

6) Which of the following is the fastest growing segment of media revenues?

A) magazines

B) home video

C) Internet media

D) radio

C) Internet Media

 

 

7) Which of the following streaming TV devices does not involve use of a remote controller?

A) Google Chromecast

B) Apple TV

C) Amazon Fire TV

D) Roku

A) Google Chromecast

 

 

8) All of the following are examples of technology convergence except:

A) the iPad.

B) Amazon Books Publishing.

C) Apple TV.

D) smartphones.

B) Amazon Books Publishing.

 

 

 

9) All of the following are aspects of content convergence except:

A) language.

B) design.

C) production.

D) distribution.

A) language

 

 

 

10) Which of the following occurs first in the process of content convergence related to books?

A) media integration

B) media migration

C) media transformation

D) media maturity

B) media migration

 

 

 

11) ________ accounted for the second largest amount of paid online content revenues in the United States in 2016.

A) Online video games

B) Internet radio

C) Online music

D) Online TV and movies

A) Online video games

 

 

12) Internet media revenue is about ________ of total entertainment and media revenue.

A) 9%

B) 18%

C) 36%

D) 40%

A) 9%

 

 

13) The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:

A) aggregation.

B) repackaging.

C) media transformation.

D) industry convergence.

D) industry convergence.

 

 

14) DRM refers to a combination of ________ for protecting digital content.

A) hardware and software methods

B) technical and legal means

C) user and publisher agreements

D) local and remote policies

B) technical and legal means

 

 

 

15) ________ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.

A) Technological

B) Content

C) Media

D) Industry

A) Technological

 

 

 

16) Content convergence describes convergence in the design, production, and ________ of content.

A) sales

B) distribution

C) marketing

D) consumption

B) distribution

 

 

17) A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.

A) sales

B) distribution

C) a la carte

D) freemium

D) freemium

 

 

 

32) Which of the following newspaper audience platforms has the highest percentage of readers?

A) print/mobile

B) Web only

C) Web/mobile

D) print

D) print

 

 

33) ________ has the highest share of the e-book market.

A) Amazon

B) Apple

C) Google

D) Barnes & Noble

A) Amazon

 

 

34) Which of the following happened when newspapers used a print-centric business model?

A) Google launched its search engine.

B) Apple introduced the iPhone.

C) Facebook opened to the public.

D) The adoption of smartphones and tablets has grown rapidly.

A) Google launched its search engine.

 

 

 

35) Which of the following was the most troubled (e.g., revenues) segment of the publishing industry in 2016?

A) books

B) magazines

C) newspapers

D) periodicals

C) newspapers

 

 

36) Which of the following statements about the newspaper industry is not true?

A) The growth of the mobile platform and social networks has potential to lessen the disruption of the newspaper industry.

B) Online readership of newspapers is increasing.

C) The emergence of search engines such as Google has had a major impact on the newspaper industry.

D) Newspaper circulation revenues have declined by 10% since 2000.

A) The growth of the mobile platform and social networks has potential to lessen the disruption of the newspaper industry.

 

 

 

38) Magazine print advertising revenues are expected to ________ through 2020.

A) remain relatively flat

B) more than double

C) grow 20%

D) significantly decrease

A) remain relatively flat

 

 

39) Which of the following is not one of the top three players in e-book publishing?

A) Barnes & Noble

B) Apple

C) Amazon

D) Google

D) Google

 

 

40) Which of the following is not an example of a native digital news site?

A) Huffington Post

B) Buzzfeed

C) Vice

D) USA Today

D) USA Today

 

 

41) Which of the following routes to a newspaper website generates the most digital ad revenue for the newspaper?

A) via a search engine

B) via a social media site such as Facebook

C) directly to a newspaper's home page

D) via an online video

C) directly to a newspaper's home page

 

 

42) A metered subscription model is most similar to which of the following revenue models?

A) transaction fee

B) freemium

C) advertising

D) affiliate

B) Freemium

 

 

43) Which of the following statements about the online newspaper audience is not true?

A) The online newspaper is one of the most successful of all online media in terms of audience size.

B) Most newspaper readers read the news using a combination of the Web, print and mobile.

C) Over 65% of Internet users read newspaper content online.

D) Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.

B) Most newspaper readers read the news using a combination of the Web, print and mobile.

 

 

 

44) Who was the first major fiction writer to create an e-book-only volume of a new work?

A) Hugh Howey

B) Stephen King

C) Dan Brown

D) Amanda Hocking

B) Stephen King

 

 

45) Together Amazon and Apple account for ________ of the e-book market.

A) 50%

B) 75%

C) 85%

D) 90%

C) 85%

 

 

46) Around what percentage of Amazon's top 100 selling books are now self-published?

A) 10%

B) 25%

C) 40%

D) 50%

C) 40%

 

 

47) In 2016, e-book sales are expected to constitute about ________% of all consumer book sales.

A) 15

B) 25

C) 35

D) 45

B) 25

 

 

48) Which of the following was sued by the Justice Department for violating antitrust laws in connection with e-books?

A) Amazon

B) Google

C) Apple

D) Barnes & Noble

C) Apple

 

 

49) Over the past five years, book publishing revenues have:

A) decreased slightly.

B) increased steadily.

C) remained stable.

D) decreased sharply.

C) remained stable.

 

 

50) In 2014, Amazon engaged in a trade dispute with ________ over the pricing of e-books.

A) Barnes & Noble

B) Penguin Random House

C) Hachette

D) Harper Collins

C) Hachette

 

 

 

 

 

52) Zinio is an example of which of the following?

A) interactive book developer

B) magazine aggregator

C) e-reader platform

D) vanity press

B) magazine aggregator

 

 

53) The New York Times introduced which of the following revenue models in 2011?

A) paywall

B) metered subscription

C) advertising

D) walled garden

B) metered subscription

 

 

54) Which of the following native digital news sites is owned by AOL?

A) Vox

B) Vice

C) Reddit

D) Huffington Post

D) Huffington Post

 

 

55) Which of the following is not one of the three business models employed by newspapers between 1995 and 2015?

A) The Print-centric model

B) The Integrated Print/Web

C) The Digital First model

D) The Convergence model

D) The Convergence model

 

 

 

56) Which of the following most accurately describes the resolution of the dispute between Hachette, Simon & Schuster, and Amazon?

A) The dispute remains unresolved.

B) Publishers can set the prices of their books, but Amazon can offer incentives to publishers to reduce prices on selected books and publishers may pay Amazon to list their books.

C) Amazon can determine the prices of books sold on its platform at its sole discretion.

D) Amazon must not sell the books for any lower than the price they are offered by Apple.

B) Publishers can set the prices of their books, but Amazon can offer incentives to publishers to reduce prices on selected books and publishers may pay Amazon to list their books.

 

 

57) Which of the following is a news aggregator app that organizes stories in a magazine format, with content drawn from traditional media and social sites, and then reassembled in an easy-to-navigate, personalized format for a mobile touchscreen environment?

A) Reddit

B) Huffington Post

C) Flipboard

D) Buzzfeed

C) Flipboard

 

 

58) What percentage of people read newspapers only on a mobile device?

A) 5%

B) 7%

C) 11%

D) 14%

A) 5%

 

 

66) Which streaming gaming channel was purchased by Amazon in 2015?

A) Dailymotion

B) YouTube.com

C) Twitch.tv

D) Shield.nvidia.com

C) Twitch.tv

 

 

 

68) ________ is the largest online movie download distributor.

A) Netflix

B) Hulu

C) iTunes

D) Google Play

C) iTunes

 

 

69) Which of the following statements about the movie industry is not true?

A) Over 300 million Americans were expected to watch movies online in 2015.

B) Online movie distribution is not dominated by a single distributor.

C) Of the digital formats, the most revenue is generated by subscription streaming.

D) DVD sales make up the largest share of movie revenues.

A) Over 300 million Americans were expected to watch movies online in 2015.

 

 

70) Which of the following is not a leading factor in changing the television industry?

A) increasing broadband penetration

B) development of the mobile platform

C) increased popularity of binge watching compared to watching linear TV

D) inability to attract customers to traditional products

D) inability to attract customers to traditional products

 

 

71) Which of the following statements about the television industry is not true?

A) Netflix is the leading distributor of streaming TV.

B) The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.

C) Americans spend more time watching television on a computer or mobile device than they do on a traditional television set.

D) Over-the-top entertainment services are a threat to cable television distributors.

B) The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.

 

 

 

73) Which of the following is the largest producer of revenues in the entertainment industry?

A) radio

B) television

C) films

D) video games

B) television

 

 

74) In 2015, which of the following forms of entertainment produced the least amount of revenue?

A) Radio

B) Music

C) Video games

D) Television

A) Radio

 

 

75) In 2016, which of the following comprised the largest segment of the online gaming audience?

A) social gamers

B) mobile gamers

C) casual gamers

D) console gamers

B) mobile gamers

 

 

76) House of Cards is an online TV series developed by which of the following?

A) Amazon Studios

B) HBO

C) Netflix

D) Hulu

C) Netflix

 

 

77) Which of the following statements about mobile gaming is not true?

A) Mobile games generated an estimated $3 billion in 2015.

B) Mobile games have proven difficult to monetize.

C) Mobile games appeal to a younger demographic than console games.

D) Mobile games are expensive to develop.

D) Mobile games are expensive to develop.

 

 

78) Which of the following is not a type of digital gamers?

A) casual gamers

B) local gamers

C) social gamers

D) console gamers

B) local gamers

 

 

79) The leading merchants of digital games are Apple's App Store and:

A) Xbox.

B) Twitch.tv.

C) Amazon Digital.

D) the Google Play store.

D) the Google Play store.

 

 

80) Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:

A) price discrimination.

B) content convergence.

C) the release window.

D) digital rights management.

C) the release window.

 

 

81) Which of the following statements is not true about OTT?

A) To use OTT services, consumers must purchase a bundle of channels.

B) OTT entertainment services are a threat to cable television.

C) OTT refers to the fact that the entertainment service rides "on top" of other network services such as cable TV and telephone service.

D) OTT entertainment services enable binge watching.

A) To use OTT services, consumers must purchase a bundle of channels.

 

1) Which of the following is not a current trend in online content?

A) Americans continue to spend more on streaming music than downloaded music.

B) Readership of newspapers in print form continues to exceed online readership.

C) E-book sales growth slows.

D) Explosive growth of the mobile platform accelerates the transition to digital content.

B

 

 

2) Cord cutters and cord shavers are shrinking the number of pay TV subscribers yearly by approximately:

A) 1%.

B) 4%.

C) 10%.

D) 14%.

B

 

 

3) Which of the following U.S. media channels generates the most revenue?

A) broadcast television/pay TV

B) video games

C) newspapers

D) box office movies

A

 

 

4) In 2019, the various entertainment industries together accounted for about __% of total media industry revenues, while the print media industries collectively accounted for about ___%.

A) 23, 77

B) 77, 23

C) 89, 11

D) 11, 89

B

 

 

5) Which of the following statements about Millennials is not true?

A) Millennials are more likely to have read a book in the past 12 months than older adults.

B) Millennials overwhelmingly prefer e-books to printed books.

C) Almost two-thirds of Millennials view digital videos daily.

D) Millennials are much more to use streaming services such as Netflix, Hulu, and Amazon than older adults.

B

 

 

6) In 2020, time spent with digital media in the United States accounted for ___ of total media time spent.

A) 23%

B) 33%

C) 55%

D) 75%

C

 

 

7) Which of the following types of online content is consumed by the highest percentage of U.S. Internet users?

A) digital audio

B) video

C) digital games

D) e-books

B

 

 

8) All of the following are examples of technology convergence except:

A) the iPad.

B) Amazon Books Publishing.

C) Apple TV.

D) smartphones.

B

 

 

 

9) All of the following are aspects of content convergence except:

A) language.

B) design.

C) production.

D) distribution.

A

 

 

 

10) Which of the following occurs first in the process of content convergence related to books?

A) media integration

B) media migration

C) media transformation

D) media maturity

B

 

 

 

11) Which of the following is not an example of industry structure convergence?

A) Amazon's creation of Amazon Books Publishing

B) Verizon's acquisition of Yahoo

C) AT&T's acquisition of Time Warner

D) Apple's development of the iPad

D

 

 

 

12) Which of the following types of online content is consumed by the lowest percentage of U.S. Internet users?

A) e-books

B) magazines

C) video

D) digital audio

B

 

 

13) The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:

A) aggregation.

B) repackaging.

C) media transformation.

D) industry convergence.

D

 

 

14) DRM refers to a combination of ________ for protecting digital content.

A) hardware and software methods

B) technical and legal means

C) user and publisher agreements

D) local and remote policies

B

 

 

 

15) ________ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.

A) Technological

B) Content

C) Media

D) Industry

A

 

 

 

16) Content convergence describes convergence in the design, production, and ________ of content.

A) sales

B) distribution

C) marketing

D) consumption

B

 

 

17) A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.

A) sales

B) distribution

C) a la carte

D) freemium

D

 

 

 

18) The Covid-19 pandemic has resulted in an increase in advertising revenue for online content providers.

FALSE

 

 

19) The amount of time the average American adult spends consuming media is about two-and-a half times the amount of time spent at work.

TRUE

 

 

20) The proliferation of mobile devices has led to a decrease in the total amount of time spent with media.

FALSE

 

 

21) The video game industry accounts for the second highest percentage of U.S. media revenues.

TRUE

 

 

22) The time spent on desktop computers and mobile devices now exceeds time spent in front of the television.

TRUE

 

 

23) The a la carte revenue model allows users to pay only for what they use.

TRUE

 

 

24) Millennials are the first generation to be born into the digital revolution of the 20th century.

TRUE

 

 

25) Revenue generated by online TV and movies is expected to grow by nearly 20% between 2020 and 2022.

TRUE

 

 

26) Smartphones are an example of technological convergence.

TRUE

 

 

27) Cannibalization is a major challenge facing book publishers.

FALSE

 

 

32) Which of the following has not been purchased or invested in by a wealthy individual with ties to the technology industry?

A) Washington Post

B) Time Magazine

C) The Atlantic Magazine

D) The New Yorker

D

 

 

 

33) Which of the following has the highest share of the e-book market?

A) Amazon

B) Apple

C) Google

D) Barnes & Noble

A

 

 

34) Which of the following happened during the time period when newspapers used a print-centric business model?

A) Google launched its search engine.

B) Apple introduced the iPhone.

C) Facebook opened to the public.

D) The adoption of smartphones and tablets has grown rapidly.

A

 

 

 

35) ________ were the most troubled segment of the print publishing industry in 2020.

A) Books

B) Magazines

C) Newspapers

D) Periodicals

C

 

 

 

36) Which of the following statements about the newspaper industry is not true?

A) U.S. newspaper revenues totaled about $26 billion in 2019.

B) The newspaper labor force has dropped precipitously since 2006.

C) Social media sites have become a major source of unique visitors to online newspapers.

D) Newspaper circulation revenues have declined dramatically since 2000.

D

 

 

37) Which of the following statements about online magazine publishing is not true?

A) The total magazine audience size increased by almost 25% from 2014 to 2019, due entirely to the growth of digital magazines, especially mobile web editions and video content.

B) The majority of magazine revenues derive from subscriptions.

C) Apple+ News is an example of a magazine aggregator.

D) An estimated 225 million people engage with magazine content via print/digital replica editions.

B

 

 

 

39) Which of the following statements about independent bookstores is not true?

A) The growth of national bookstore chains such as Barnes & Noble had a negative impact on independent bookstores.

B) Many independent bookstores have successfully transformed their legacy business models and technology.

C) The fate of independent bookstores remains a major question in the wake of the Covid-19 pandemic.

D) The number of independent bookstores declined by almost 50% between 2009 and 2018.

D

 

 

40) Which of the following is not an example of a native digital news site?

A) Huffington Post

B) Buzzfeed

C) Vice

D) USA Today

D

 

 

41) Which of the following magazines underwent a digital remaking following the introduction of a metered paywall in 2014?

A) Sports Illustrated

B) The New Yorker

C) Newsweek

D) Time

B

 

 

 

42) Which of the following is the most common model for online newspaper access for U.S. newspapers?

A) totally free

B) most content free, but subscription fee to access premium content

C) paywall

D) metered subscription model

D

 

 

43) Which of the following statements about the online newspaper audience is not true?

A) The online newspaper is one of the most successful of all online media in terms of audience size.

B) Online readership of newspapers is growing at more than 30% a year

C) People in the age 18 to 34 age group are more likely to read the news online than older people.

D) Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.

B

 

 

44) Who was the first major fiction writer to create an e-book-only volume of a new work?

A) Hugh Howey

B) Stephen King

C) Dan Brown

D) Amanda Hocking

B

 

 

45) Which of the following statements about e-books is not true?

A) Most self-published e-books are not counted by the publishing industry reports on e-book sales.

B) Apple is a distant second in the e-book market.

C) E-book sales revenue in 2019 decreased significantly from the previous year.

D) The vast majority of indie authors are unable to make a living solely from e-book sales.

C

 

 

 

 

 

47) According to Amazon, around how many indie authors have earned more than $100,000 in royalties from their books?

A) 10

B) 100

C) 1,000

D) 10,000

C

 

 

48) ________ was sued by the Justice Department for violating antitrust laws in connection with e-books.

A) Amazon

B) Google

C) Apple

D) Barnes & Noble

C

 

 

49) In 2019, book publishing revenues:

A) were flat.

B) increased significantly.

C) experienced a sizeable decrease.

D) increased slightly.

A

 

 

50) When was the future of e-books firmly established?

A) in 2000, with the release on Amazon of Stephen King's novella, Riding the Bullet

B) in 2007, with the introduction of Amazon's Kindle

C) in 2009, when Barnes & Noble introduced its Nook e-reader

D) in 2010, when Apple introduced the first iPad

B

 

 

51) Which of the following statements about the wholesale and agency models for selling books is not true?

A) In the wholesale model, the retailer decides at what price to sell a book to the consumer.

B) Amazon surprised traditional publishers by selling e-books for below their wholesale cost.

C) Today, each publisher makes an agreement with Amazon about the price of their books.

D) A result of the agency model was that Amazon's prices on e-books declined.

D

 

 

52) Zinio is an example of which of the following?

A) interactive book developer

B) magazine aggregator

C) e-reader platform

D) vanity press

B

 

 

53) Which of the following is not an advantage that pure digital news sites have over print newspapers?

A) They have a lower cost structure.

B) They can create new workflows and business processes that are timelier and more efficient.

C) They offer higher quality journalism.

D) They can take advantage of newer technologies for producing the news.

C

 

 

54) Which of the following native digital news sites was purchased by AOL?

A) Vox

B) Vice

C) Reddit

D) Huffington Post

D

 

 

55) The ________ model is not one of the three business models employed by newspapers between 1995 and 2018.

A) Print-centric

B) Integrated Print/Web

C) Digital First

D) Convergence

D

 

 

 

 

 

 

57) Which of the following refers to itself as the front page of the Internet?

A) Reddit

B) Huffington Post

C) Vox

D) Buzzfeed

A

 

 

58) According to Pew Research Center, what percentage of newspaper readers often use a desktop or laptop, as opposed to a mobile device, to read the news?

A) 20%

B) 30%

C) 40%

D) 50%

B

 

 

59) Major newspapers withdrew from Facebook's Instant Articles program because it resulted in Facebook draining newspaper sites of visitors.

TRUE

 

 

60) In the wholesale model of e-book distribution, pricing power is with the publisher.

FALSE

 

 

61) Vox is an example of the Digital First business model.

FALSE

 

 

66) Which streaming gaming channel was purchased by Amazon in 2015?

A) Dailymotion

B) YouTube Gaming

C) Twitch

D) Mixer

C

 

 

67) Which of the following statements about e-sports is not true?

A) Many colleges now to offer scholarships for players on their video game teams.

B) YouTube Gaming accounts for over 80% of the online e-sports viewing in the United States.

C) E-sports tournaments routinely draw an online audience equal to professional football games.

D) The e-sport audience is predominantly composed of males between the ages of 21 and 34.

B

 

 

68) ________ is the leading online television and movie distributor.

A) Netflix

B) Hulu

C) iTunes

D) Google Play

A

 

 

69) Which of the following statements is not true?

A) iVOD revenues have grown faster than subscription streaming (SVOD) revenues.

B) Surveys indicated that a majority of people are unwilling to pay more than $20 per month for SVOD services.

C) Of all the content industries, thus far, the home entertainment and movie industry has been able to maintain its revenue stream and not be digitally destroyed by new technologies.

D) The movie industry's control of the release window of a movie is a form of price discrimination.

A

 

 

70) Which of the following statements about piracy in the movie and television industry is not true?

A) Piracy still remains a threat to the movie and television industry.

B) The most common method of piracy uses bit cyberlockers/file hosting sites.

C) The monetary amount the movie industry loses as a result of piracy is unknown.

D) There has been a significant uptick in traffic to pirate websites during the Covid-19 pandemic.

B

 

 

71) Which of the following statements about the home entertainment industry is not true?

A) Over 55% of the U.S. population uses an over-the-top (OTT) subscription service in addition to or instead of cable/satellite TV.

B) Apple TV is the digital media device used by the most people in the United States.

C) Both the television and movie industry share in home entertainment revenues.

D) Neither the television nor film industries have built an industry-wide Internet delivery system.

B

 

 

72) Which of the following statements about the music industry is not true?

A) Music industry revenues in 2019 are still only 80% of what they were in 1999.

B) Digital revenues accounted almost 90% of all U.S. music revenues in 2019.

C) More revenue was generated by the sales of digital downloads than physical units in 2019.

D) Streaming music generated about 80% of all digital music sales in 2019.

C

 

 

73) In 2019, which of the following was the producer of the largest percentage of revenues in the U.S. entertainment industry?

A) radio

B) television

C) box office movies

D) games

B

 

 

74) In 2019, which of the following forms of entertainment produced the smallest percentage of revenue?

A) home entertainment

B) recorded music

C) games

D) television

B

 

 

75) In 2020, which of the following comprised the largest segment of the online gaming audience?

A) tablet gamers

B) smartphone gamers

C) PC gamers

D) console gamers

B

 

 

76) House of Cards is an online TV series developed by which of the following?

A) Amazon Studios

B) HBO

C) Netflix

D) Hulu

C

 

 

77) All of the following are 'live'/on-demand over-the-top (OTT) services except:

A) Sling TV.

B) AT&T TV Now.

C) Netflix.

D) YouTube TV.

C

 

 

78) Which of the following is not a type of digital gamer?

A) PC gamers

B) local gamers

C) social gamers

D) MMO gamers

B

 

 

79) Which of the following platforms was used by the fewest gamers in 2020?

A) consoles

B) PCs

C) smartphones

D) tablets

D

 

 

80) Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:

A) dynamic pricing.

B) content convergence.

C) the release windows.

D) digital rights management.

C

 

 

 

81) Which of the following statements is not true about over-the-top (OTT) services?

A) To use OTT services, consumers must purchase a bundle of channels.

B) OTT entertainment services are a threat to cable/satellite television delivery systems.

C) OTT services include the ability to download content after purchase or rental, as well as subscription streaming and 'live' TV services.

D) OTT entertainment services enable binge watching.

A

 

 

82) Streaming has replaced downloading as the preferred consumer viewing platform for home entertainment content.

TRUE

 

 

83) In 2019, digital games generated more than three times the amount of digital music revenues.

TRUE

 

1.8. 廣告商是依照廣告被點選的次數來計價,而不管曝光次數的多寡。請問這是指何種模式?(單選) 回答錯誤

單選題 (2 ) 0

 

A

.

(A) 定時定價

 

 

B

.

(B) 關鍵字計費

 

 

C

.

(C) 收益定價

 

 

D

.

(D) CPC 計價

 

正確答案: D

2.6. 會隨著捲軸而不斷上下移動的廣告,稱為?(單選)

單選題 (2 ) 2

 

A

.

(A) 按鈕廣告

 

 

B

.

(B) 橫幅廣告

 

 

C

.

(C) 跳出式廣告

 

 

D

.

(D) 捲軸廣告

 

正確答案: D

答案解釋:

3.78) WebMD.com is an example of a:

單選題 (2 ) 2

 

A

.

A) general purpose portal.

 

 

B

.

B) vertical market portal based on affinity group.

 

 

C

.

C) vertical market portal based on focused content.

 

 

D

.

D) focused content portal.

 

正確答案: D

答案解釋:

4.10. 在傳統的文字廣告中加入聲光影音的效果,甚至可透過 Flash 來進行。請問上述是指?(單選)

單選題 (2 ) 2

 

A

.

(A) 多媒體廣告

 

 

B

.

(B) 電子郵件廣告

 

 

C

.

(C) 互動式廣告

 

 

D

.

(D) 按鈕廣告

 

正確答案: A

答案解釋:

5.75) Which of the following is not one of the defining functions of a portal?

單選題 (2 ) 2

 

A

.

A) commerce

 

 

B

.

B) content

 

 

C

.

C) auctions

 

 

D

.

D) navigation of the Web

 

正確答案: C

答案解釋:

6.45) Which of the following types of auctions is perfect for sellers that have many identical items to sell?

單選題 (2 ) 2

 

A

.

A) English auctions

 

 

B

.

B) Name Your Own Price auctions

 

 

C

.

C) Dutch Internet auctions

 

 

D

.

D) group buying auctions

 

正確答案: C

答案解釋:

7.24) Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace."

單選題 (2 ) 2

 

A

.

A) social networks

 

 

B

.

B) virtual communities

 

 

C

.

C) community portals

 

 

D

.

D) social forums

 

正確答案: B

答案解釋:

8.61) ________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.

單選題 (2 ) 2

 

A

.

A) Bid manipulation

 

 

B

.

B) Shill feedback

 

 

C

.

C) Shill bidding

 

 

D

.

D) Bid rigging

 

正確答案: C

答案解釋:

9.1) One of the first online virtual communities, formed in 1985, was:

單選題 (2 ) 2

 

A

.

A) The Well.

 

 

B

.

B) Myspace.

 

 

C

.

C) AOL.

 

 

D

.

D) Salon.com.

 

正確答案: A

答案解釋:

10.76) Which of the following statements best describes the potential impact of network effects with respect to portals?

單選題 (2 ) 2

 

A

.

A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market.

 

 

B

.

B) The value of the portal to advertisers and consumers increases geometrically as reach increases.

 

 

C

.

C) The greater the amount of content provided by a portal, the greater its value to the community.

 

 

D

.

D) The greater number of portals available, the greater the potential audience for each.

 

正確答案: B

答案解釋:

11.42) Which of the following types of auctions "shields the brand" of the seller?

單選題 (2 ) 2

 

A

.

A) English auction

 

 

B

.

B) Name Your Own Price auction

 

 

C

.

C) Dutch Internet auction

 

 

D

.

D) penny auction

 

正確答案: B

答案解釋:

12.18) Which of the following has the highest penetration of social network usage among Internet users? 回答錯誤

單選題 (2 ) 0

 

A

.

A) North America

 

 

B

.

B) Latin America

 

 

C

.

C) Europe

 

 

D

.

D) Asia-Pacific

 

正確答案: B

13.5) A website designed around a community of members who self-identify with a demographic or geographic category is classified as a(n):

單選題 (2 ) 2

 

A

.

A) interest-based social network.

 

 

B

.

B) affinity community.

 

 

C

.

C) practice network.

 

 

D

.

D) sponsored community.

 

正確答案: B

答案解釋:

14.12) Facebook owns which of the following?

單選題 (2 ) 2

 

A

.

A) Pinterest

 

 

B

.

B) Snapchat

 

 

C

.

C) WhatsApp

 

 

D

.

D) Tumblr

 

正確答案: C

答案解釋:

15.1. 廣告商依網路廣告被點選的次數來計價,是指?(單選)

單選題 (2 ) 2

 

A

.

(A) Cost Per Impression

 

 

B

.

(B) Cost Per Sales

 

 

C

.

(C) Cost Per Thousand

 

 

D

.

(D) Cost Per Click

 

正確答案: D

答案解釋:

16.38) ________ is the market leader in C2C auctions.

單選題 (2 ) 2

 

A

.

A) Amazon

 

 

B

.

B) eBay

 

 

C

.

C) Walmart

 

 

D

.

D) eBid

 

正確答案: B

答案解釋:

17.55) One partial solution to high monitoring costs is ________ pricing.

單選題 (2 ) 2

 

A

.

A) fixed

 

 

B

.

B) dynamic

 

 

C

.

C) allocated

 

 

D

.

D) distress

 

正確答案: A

答案解釋:

18.9. 在網路上購買的人數,有多少的百分比是由該廣告連結而來。上述是指網路廣告衡量效益的哪一種?(單選)

單選題 (2 ) 2

 

A

.

(A) 點送率

 

 

B

.

(B) 點選

 

 

C

.

(C) 購買行為

 

 

D

.

(D) 網站流量

 

正確答案: C

答案解釋:

19.2) The technology used by early online communities was limited to mostly:

單選題 (2 ) 2

 

A

.

A) instant messaging.

 

 

B

.

B) FTP.

 

 

C

.

C) e-mail.

 

 

D

.

D) bulletin boards.

 

正確答案: D

答案解釋:

20.60) ________ refers to the feeling of having been too cheap in bidding and failing to win an auction.

單選題 (2 ) 2

 

A

.

A) Winner's lament

 

 

B

.

B) Winner's regret

 

 

C

.

C) Loser's lament

 

 

D

.

D) Losers regret

 

正確答案: C

答案解釋:

21.25) A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared interest.

單選題 (2 ) 2

 

A

.

A) practice network

 

 

B

.

B) general community

 

 

C

.

C) affinity community

 

 

D

.

D) interest-based social network

 

正確答案: A

答案解釋:

22.44) ________ occurs when sellers agree informally or formally to set floor prices below which they will not sell on auction items.

單選題 (2 ) 2

 

A

.

A) Discriminatory pricing

 

 

B

.

B) Price matching

 

 

C

.

C) Bid rigging

 

 

D

.

D) Distress pricing

 

正確答案: B

答案解釋:

23.51) ________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.

單選題 (2 ) 2

 

A

.

A) Group buying

 

 

B

.

B) Winner's regret

 

 

C

.

C) Herd behavior

 

 

D

.

D) Bid rigging

 

正確答案: C

答案解釋:

24.11) Each of the following is one of the top seven social network sites in the United States, in terms of monthly unique visitors, except:

單選題 (2 ) 2

 

A

.

A) Tumblr.

 

 

B

.

B) MeWe.

 

 

C

.

C) Instagram.

 

 

D

.

D) Pinterest.

 

正確答案: B

答案解釋:

25.50) The profit a seller makes at auction is a function of all of the following except:

單選題 (2 ) 2

 

A

.

A) initial pricing.

 

 

B

.

B) auction length.

 

 

C

.

C) the number of units for auction.

 

 

D

.

D) watch lists.

 

正確答案: D

答案解釋:

26.7. 陽光基金會透過網路,在 2007 年自行拍攝一支傷友「最簡單的心願和你一樣每天工作」的廣告,運用網路傳播的方式來打廣告。廣告推出之後,一個月平均每天到超過20 通的關心電話,甚至還有台商跨海要提供援助。請問上述是屬於網路廣告的何種特性?(單選) 回答錯誤

單選題 (2 ) 0

 

A

.

(A) 區隔市場

 

 

B

.

(B) 即時更新

 

 

C

.

(C) 自行製作

 

 

D

.

(D) 提高互動

 

正確答案: C

27.79) Which of the following is not one of the typical portal revenue sources?

單選題 (2 ) 2

 

A

.

A) commissions on sales

 

 

B

.

B) subscription fees

 

 

C

.

C) tenancy deals

 

 

D

.

D) referral fees

 

正確答案: D

答案解釋:

28.20) Which of the following social networks provides an open-source alternative to Twitter?

單選題 (2 ) 2

 

A

.

A) MeWe

 

 

B

.

B) Mastadon

 

 

C

.

C) Tagged

 

 

D

.

D) Nextdoor

 

正確答案: B

答案解釋:

29.6) Instagram is an example of a(n) _______-based social network/community.

單選題 (2 ) 2

 

A

.

A) interest

 

 

B

.

B) affinity

 

 

C

.

C) general

 

 

D

.

D) practice

 

正確答案: C

答案解釋:

30.3) Which of the following is a community of members who self-identify with a demographic or geographic category? 回答錯誤

單選題 (2 ) 0

 

A

.

A) practice network

 

 

B

.

B) sponsored community

 

 

C

.

C) affinity community

 

 

D

.

D) interest-based social network

 

正確答案: C

31.2. 通常是以電子郵件行銷為基礎,在電子郵件內容最後加上「與好朋友一起分享」、「轉寄給親朋好友」等字眼的按鈕,只要填上 e-mail 地址,按下按鈕便可將信件轉寄出去,這是指?(單選)

單選題 (2 ) 2

 

A

.

(A) 許可式行銷

 

 

B

.

(B) 病毒式行銷

 

 

C

.

(C) 聯盟網站行銷

 

 

D

.

(D) 部落格行銷

 

正確答案: B

答案解釋:

32.17) Which of the following is an example of a practice network?

單選題 (2 ) 2

 

A

.

A) PredictWallstreet

 

 

B

.

B) Instagram

 

 

C

.

C) DebatePolitics

 

 

D

.

D) Doximity

 

正確答案: D

答案解釋:

33.66) Keeping bid increments low decreases the number of bidders and lowers the frequency of their bids.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

34.67) Closed bidding offers the advantage of herd effects.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

35.56) The term ________ refer(s) to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.

是非題 (2 ) 2

 

A

.

A) siphoning

 

 

B

.

B) herd behavior

 

 

C

.

C) network effects

 

 

D

.

D) channel expansion

 

正確答案: C

答案解釋:

36.64) Priceline's auctions utilize fixed pricing.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

37.28) More than three-quarters of Internet users worldwide participate in social networks.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

38.29) Facebooks current user growth is being driven by growth in the number of users in the United States.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

39.69) Consumers in auctions are driven solely by value maximization.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

40.80) The original portals in the early days of e-commerce were search engines.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

41.30) A community site created by a corporation is called a sponsored community site.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

42.58) The time spent watching and reviewing auction bids is a part of ________ costs.

是非題 (2 ) 2

 

A

.

A) pricing

 

 

B

.

B) monitoring

 

 

C

.

C) delayed consumption

 

 

D

.

D) fulfillment

 

正確答案: B

答案解釋:

43.81) The value of portals to advertisers and content owners is primarily a function of the size of the audience the portal reaches, and the length of time visitors stay on the site.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

44.57) A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.

是非題 (2 ) 2

 

A

.

A) bidding fee auction

 

 

B

.

B) channel manager

 

 

C

.

C) watch list

 

 

D

.

D) rating system

 

正確答案: C

答案解釋:

45.63) Penny auctions don't require money to bid.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

46.68) Auction prices are often higher than prices in fixed priced markets.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

47.65) In a Dutch Internet auction, a single seller puts up multiple items for bidding.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

48.62) In B2C auctions, consumers control assets and use dynamic pricing to establish the price.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

49.83) Portals are not immune to network effects.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

50.82) Vertical content portals and affinity group portals tend to be more well-known brands than general-purpose portals.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

 

 

One of the first online virtual communities was:

A) The Well

B) Myspace

C) AOL

D) Salon.com

A

 

 

The technology used by early online communities was limited to mostly:

A) instant messaging.

B) FTP.

C) e-mail.

D) bulletin boards.

D

 

 

 

Which of the following is a community of members who self-identify with a demographic or geographic category?

A) practice network

B) sponsored community

C) affinity community

D) interest-based social network

C

 

 

 

PredictWallStreet is an example of a(n):

A) interest-based social network.

B) affinity community.

C) sponsored community.

D) practice network.

A

 

 

A website designed around a community of members who self-identify with a demographic or geographic category is classified as a(n):

A) interest-based social network.

B) affinity community.

C) practice network.

D) sponsored community.

B

 

 

Instagram is an example of a(n):

A) interest-based social network.

B) affinity community/social network.

C) general community/social network.

D) practice network

C

 

 

 

Which social network functionality allows users to view a list of updates from friends as well as advertisements and notifications in chronological order?

A) message board

B) timeline

C) friends' network

D) newsfeed

D

 

 

In 2018, around what percentage of the total United States population used social networks?

A) 50%

B) 60%

C) 70%

D) 80%

C

 

 

Which of the following is the second leading social network in the United States in terms of monthly unique visitors?

A) Twitter

B) LinkedIn

C) Instagram

D) Pinterest

B

 

 

Which of the following is a leading social network in Germany?

A) Xing

B) Tuenti

C) Orkut

D) Mixi

A

 

 

Each of the following is one of the top seven social network sites in the United States, in terms of monthly unique visitors, except:

A) Tumblr.

B) Myspace.

C) Instagram.

D) Pinterest.

B

 

 

Facebook owns which of the following?

A) Pinterest

B) Snapchat

C) WhatsApp

D) Tumblr

C

 

 

In 2017, Fortune 500 companies used ________ more than Facebook.

A) Twitter

B) Tumblr

C) LinkedIn

D) Pinterest

C

 

 

On which of the following do users spent the least amount of time per day?

A) Snapchat

B) Tumblr

C) LinkedIn

D) Pinterest

C

 

 

 

When did the first online communities form?

A) the 1970s

B) the 1980s

C) the 1990s

D) the 2000s

B

 

 

 

BlackPlanet is an example of a(n) ________ social network.

A) practice-based

B) interest-based

C) affinity-based

D) general

C

 

 

Which of the following is an example of a practice network?

A) PredictWallstreet

B) Instagram

C) DebatePolitics

D) Doximity

D

 

 

Which of the following has the highest penetration of social network usage among the general population?

A) North America

B) Latin America

C) Europe

D) Asia-Pacific

A

 

 

In 2018, which age group had the fastest growing rate of Facebook usage?

A) 12-34

B) 35-45

C) 46-65

D) adults over 65

D

 

 

Which of the following early leaders in social networking has been reinvented as a music-oriented social network?

A) Vevo

B) Myspace

C) Polyvore

D) Tumblr

B

 

 

Which of the following now owns LinkedIn?

A) Facebook

B) Google

C) Microsoft

D) Verizon

C

 

 

Which of the following companies purchased Instagram?

A) Google

B) Apple

C) Facebook

D) Microsoft

C

 

 

Which of the following statements about Instagram is not true?

A) Instagram trails only Facebook in U.S. ad revenue.

B) Instagram is a social network that focuses on video and photo sharing.

C) Instagram is growing more quickly than Facebook.

D) Instagram users spend more time on Instagram than Facebook users spend on Facebook.

D

 

 

 

Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in

cyberspace."

A) social networks

B) virtual communities

C) community portals

D) social forums

B

 

 

A(n) ________ offers members focused discussion groups, help, information, and knowledge

related to an area of shared interest.

A) practice network

B) general community

C) affinity community

D) interest-based social network

A

 

 

 

The amount of time visitors spend on a site is a measure of:

A) reach.

B) loyalty.

C) conversation.

D) engagement.

D

 

 

More than two-thirds of Internet users worldwide participate in social networks.

T/F

True

 

 

Facebook is the fastest growing of the most popular social networks.

T/F

False

 

 

A community site created by a corporation is called a sponsored community site.

T/F

True

 

 

 

Describe the evolution of social networks from their earliest appearance.

The earliest social networks, in the mid-1980s and 1990s were community bulletin

boards, or discussion groups, like The Well. In the early 2000s, technology changed, bringing in

blogging, photo sharing features. As the Internet user population expanded, more and more

socially oriented sites appeared, including Facebook, allowing users to share content directly

with each other. More recently, in the late 2000s and early 2010s, as the Internet became

available to browse (and post to) via mobile devices, more and more photo and video sharing

social networks have emerged, such as Pinterest and Instagram. A new crop of social networks

launched since 2008 (i.e., Snapchat and WhatsApp) focus on messaging.

 

 

Describe four shared characteristics of social networks

Social networks involve (1) a group of people, (2) shared social interactions, (3) common ties among members, and (4) people who share an area for some period of time.

 

 

If a large number of Internet users set Facebook as their primary destination on their web browser, should Facebook be considered a portal?

Student answers will vary but should include reference to social networks broadening

their offerings to become more portal-like. An example answer is: While Facebook can be a

primary destination, the goal of Facebook is to keep users occupied and communicating with

each other. One of the main goals of a portal is to provide avenues to third party content and

other areas of the Internet. Although social networks are aiming to include portal-like features, to

keep and grow audiences, the primary goals of a portal currently don't include social sharing.

 

 

What business models do social networks use?

The most popular general social networks, such as Facebook, have adopted an

advertising model, and make money from ads displayed to users. There are number for profit and

non-profit networks that stay afloat from user donations, member dues, premium services, or

through sponsorship financing.

 

 

Discuss the impact social networks have had on how businesses operate, communicate, and serve their customers.

Social networks have had an important impact on how businesses operate,

communicate, and serve their customers. The most visible business firm use of social networks is

as a marketing and branding tool. The most popular social network tool for large corporate

businesses is LinkedIn, with 98% of the Fortune 500 using LinkedIn. Twitter is the second most

popular, used by 88%, while 85% use Facebook. A less visible marketing use of networks is as a

powerful listening tool which has strengthened the role of customers and customer feedback

systems. Social networks are where corporate brands and reputations are formed, and firms today

take very seriously the topic of "online reputation," as evidenced by social network posts,

commentary, chat sessions, and Likes. In this sense, social network sites have become an

extension of corporate customer relationship management systems and extend existing market

research programs. Beyond branding, social network sites are being used increasingly as

advertising platforms to contact a somewhat younger audience than websites and e-mail, and as

customers increasingly shift their eyeballs to social networks. Rosetta Stone, for instance, uses its

Facebook page to display videos of its learning technology, encourage discussions and reviews,

and post changes in its learning tools. Public social networks like Facebook have not been used

extensively in firms as collaboration tools thus far. However, in 2016, Facebook launched its

Workplace app, designed to spur collaboration and networking inside large firms. Over 14,000 organizations worldwide use this relatively new app.

 

 

________ of procurement officers use auctions to purchase goods.

A) Approximately 80%

B) Less than a quarter

C) Over one third

D) Approximately 25%

C

 

 

All of the following are benefits of auctions except:

A) more efficient price discovery.

B) lower transaction costs.

C) decreased price transparency.

D) increased market efficiency.

C

 

 

 

________ is the market leader in C2C auctions.

A) Amazon

B) eBay

C) uBid

D) eBid

B

 

 

Which of the following is not a risk or cost of Internet auctions?

A) delayed consumption costs

B) equipment costs

C) price transparency

D) trust risks

C

 

 

 

The fact that participating in an Internet auction means that you will need to purchase a

computer, learn to use it, and pay for Internet access, is an example of ________ costs.

A) equipment

B) fulfillment

C) delayed consumption

D) monitoring

A

 

 

All of the following are solutions to the problem of high monitoring costs except:

A) seller rating systems.

B) watch lists.

C) proxy bidding.

D) fixed pricing.

A

 

 

Which of the following types of auctions "shields the brand" of the seller?

A) English auction

B) Name Your Own Price auction

C) Dutch auction

D) penny auction

B

 

 

Which of the following allows the consumer to enter a maximum price and the auction

software automatically places incremental bids, up to that maximum price, as their original bid is

surpassed?

A) watch lists

B) proxy bidding

C) sealed bidding

D) price matching

B

 

 

________ occurs when sellers agree informally or formally to set floor prices below which

they will not sell on auction items.

A) Discriminatory pricing

B) Price matching

C) Bid rigging

D) Distress pricing

B

 

 

 

Which of the following types of auctions is perfect for sellers that have many identical items

to sell?

A) English auctions

B) Name Your Own Price auctions

C) Dutch Internet auctions

D) group buying auctions

C

 

 

 

All of the following types of auctions involve single units except:

A) an English auction.

B) a Dutch Internet auction.

C) a Name Your Own Price auction.

D) a penny auction.

B

 

 

 

A(n) ________, in which the highest bidder wins, is the most common form of auction.

A) Dutch Internet auction

B) Japanese auction

C) English auction

D) reverse auction

C

 

 

 

Priceline is an example of a(n):

A) English auction.

B) Dutch auction.

C) penny auction.

D) Name Your Own Price auction

D

 

 

Which of the following is not one of the top factors a business should consider when

planning an Internet auction?

A) type of product

B) type of auction

C) location of auction

D) bid increments

C

 

 

 

The profit a seller makes at auction is a function of all of the following except:

A) initial pricing.

B) auction length.

C) the number of units for auction.

D) watch lists

D

 

 

________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.

A) Group buying

B) Winner's regret

C) Herd behavior

D) Bid rigging

C

 

 

 

Which of the following involves the feeling after winning an auction that you paid too much for an item?

A) herd behavior

B) winner's regret

C) seller's lament

D) loser's lament

B

 

 

Which of the following involves e-mailing another seller's bidders and offering the same

product for less?

A) transaction interception

B) bid siphoning

C) shill bidding

D) persistent bidding

B

 

 

 

Threatening negative feedback in return for a benefit is an example of:

A) feedback extortion.

B) offensive shill feedback.

C) defensive shill feedback.

D) sending spam.

A

 

 

 

One partial solution to high monitoring costs is ________ pricing.

A) fixed

B) dynamic

C) allocated

D) distress

A

 

 

The term ________ refers to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.

A) siphoning

B) herd behavior

C) network effects

D) channel expansion

C

 

 

 

A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.

A) bidding fee auction

B) channel manager

C) watch list

D) rating system

C

 

 

 

The time spent watching and reviewing auction bids is a part of ________ costs.

A) pricing

B) monitoring

C) delayed consumption

D) fulfillment

B

 

 

E-mailing buyers to warn them away from a seller is a type of auction fraud known as:

A) transaction interference.

B) bid siphoning.

C) bid rigging.

D) shill bidding.

A

 

 

 

________ refers to the feeling of having been too cheap in bidding and failing to win an auction.

A) Winner's lament

B) Winner's regret

C) Loser's lament

D) Loser's regret

C

 

 

________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.

A) Bid manipulation

B) Shill feedback

C) Shill bidding

D) Bid rigging

C

 

 

In B2C auctions, consumers control assets and use dynamic pricing to establish the price.

False

 

 

Penny auctions don't require money to bid.

T/F

False

 

 

Priceline's auctions utilize fixed pricing.

T/F

True

 

 

In a Dutch Internet auction, a single seller puts up multiple items for bidding.

T/F

True

 

 

Keeping bid increments low decreases the number of bidders and lowers the frequency of their bids.

T/F

False

 

 

Closed bidding offers the advantage of herd effects.

T/F

False

 

 

Auction prices are often higher than prices in fixed priced markets.

T/F

True

 

 

Consumers in auctions are driven solely by value maximization.

T/F

False

 

 

Identify and describe the main types of portals.

There are two primary types of portals: general purpose and vertical market. General

purpose portals attempt to attract a very large general audience and then retain the audience on-

site by providing in-depth vertical content channels. Vertical market portals (sometimes also

referred to as destination sites or vortals) attempt to attract highly focused, loyal audiences with a

deep interest either in community or specialized content from sports to the weather. In

addition to their focused content, vertical market portals have recently begun adding many of the

features found in general purpose portals

 

 

Describe the four major Internet auction types discussed in the chapter and how they function.

The four major types of Internet auctions are English, Dutch Internet, Name Your Own Price, and penny (bidding fee) auctions.

 

In an English auction, a single item is up for sale from a single seller. Multiple buyers bid against

one another within a specific time frame. The highest bidder wins the object, as long as the high

bid has exceeded the reserve bid set by the seller, below which she refuses to sell.

 

In Dutch Internet auctions, sellers with many identical items to sell list a minimum price or starting bid and buyers indicate both a bid price and a quantity desired. All winning bidders pay the lowest winning bid that clears the available quantity. Those with the highest bid are assured of receiving the quantity they desire, but only pay the amount of the lowest successful bid. This

is referred to as a uniform pricing rule.

 

In Name Your Own Price or reverse auctions, buyers specify the price they are willing to pay for an item and multiple sellers bid for their business. This is one example of discriminatory pricing in which winners may pay different amounts for the same product or service depending upon how much they have bid.

 

In a penny (bidding fee auction), you typically must pay the penny auction site for bids ahead of time, typically 50 cents to $1 dollar, usually in packs costing $25-$50. Once you have purchased the bids, you can use them to bid on items listed by the penny auction site (unlike traditional auctions, items are owned by the site, not third parties). Items typically start at or near $0 and

each bid raises the price by a fixed amount, usually just a penny. Auctions are timed, and when the time runs out, the last and highest bidder wins the item. Although the price of the item itself may not be that high, the successful bidder will typically have spent much more than that. Unlike a traditional auction, it costs money to bid and that money is gone even if the bidder does not win the auction. The bidder's cumulative cost of bidding must be added to the final price of a successful bid to determine the true cost of the item.

 

 

What are the benefits of Internet auctions to sellers, buyers, and market makers in an auction?

The general benefits of auctions to sellers and buyers are liquidity, price discovery, price transparency, market efficiency, lowered transaction costs, consumer aggregation, and network effects.

 

Sellers and buyers are connected in a global marketplace where even difficult to price items can

be competitively priced based on supply and demand. Everyone in the world can see the asking and bidding prices for items, although prices can vary from auction site to auction site. Buyers are offered access to a selection of goods that would be impossible to access physically. Buyers and sellers benefit by the reduced costs of selling and purchasing goods compared to the physical marketplace. A large number of consumers who are motivated to buy are amassed in one marketplace, which is a great convenience to the seller. Network effects are achieved because the larger an auction site becomes in both the numbers of users and products, and ultimately increasing the value of the marketplace.

 

 

What are the costs and risks for buyers at an auction, and how have auction sites sought to reduce these risks?

The costs for buyers when they participate in an auction are delayed consumption, monitoring costs, equipment costs, trust risks, and fulfillment costs. Delayed consumption occurs because auctions can go on for days and the product must then be shipped to the buyer. Buyers will typically want to pay less for an item for which they cannot receive immediate gratification. Buyers must also spend time monitoring the bidding, returning to the site frequently to see if they need to raise their bid. They must also purchase, or have already purchased, computer systems and Internet service, and learned how to operate these systems. Since buyers must pay for packing, shipping, and insurance, they will factor these fulfillment costs into their bid price.

 

Consumers also face an increased risk of experiencing a loss because online auctions are a major source of Internet fraud. Auction sites have sought to reduce these trust risks through various methods including rating systems, watch lists, and proxy bidding. Rating systems are designed so that previous customers can evaluate sellers based upon their experience with them. These evaluations are posted on the site for other buyers to see. Watch lists allow buyers to monitor

specific auctions as they proceed over several days and only pay close attention in the last few minutes of bidding. In proxy bidding systems, buyers can enter the maximum price they are willing to pay, and the auction software will automatically place incremental bids as their original bid is surpassed. In addition, one partial solution to high monitoring costs is, ironically, fixed pricing. At eBay, consumers can reduce the cost of monitoring and waiting for auctions to end by simply clicking on the "Buy It Now!" button and paying a premium price.

 

 

Which of the following purchased Yahoo?

A) AT&T

B) Microsoft

C) AOL

D) Verizon

D

 

 

To address the falling price of display ads and declining user engagement, Yahoo acquired all of the following except:

A) Tumblr.

B) Flickr.

C) Aviate.

D) Instagram

D

 

 

Which of the following is not one of the defining functions of a portal?

A) commerce

B) content

C) auctions

D) navigation of the Web

C

 

 

 

Which of the following statements best describes the potential impact of network effects with respect to portals?

A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market.

B) The value of the portal to advertisers and consumers increases geometrically as reach increases.

C) The greater the amount of content provided by a portal, the greater its value to the community.

D) The greater number of portals available, the greater the potential audience for each.

B

 

 

 

After Google, the next portal/search engine site with the most unique visitors is:

A) Yahoo.

B) Microsoft.

C) AOL.

D) Facebook

A

 

 

WebMD.com is an example of a:

A) general purpose portal.

B) vertical market portal based on affinity group.

C) vertical market portal based on focused content.

D) focused content portal.

D

 

 

Facebook was the leader in U.S. ad spending revenues on social networks in 2018. What company earned the second most amount of ad spending revenue?

A) Snapchat

B) Instagram

C) Pinterest

D) Twitter

B

 

 

Which of the following is not one of the typical portal revenue sources?

A) commissions on sales

B) subscription fees

C) tenancy deals

D) referral fees

D

 

 

 

The original portals in the early days of e-commerce were search engines.

T/F

True

 

 

The value of portals to advertisers and content owners is primarily a function of the size of the audience the portal reaches, and the length of time visitors stay on the site.

T/F

True

 

 

Vertical content portals and affinity group portals tend to be more well-known brands than general-purpose portals

False

 

 

Portals are not immune to network effects.

False

 

 

The value of portals to advertisers and content owners is primarily a function of the size of the audience the portal reaches, and the length of time visitors stay on the site

True

 

 

Closed bidding offers the advantage of herd effects

False

 

 

Which of the following statements best describes the potential impact of network effects with respect to portals

The value of the portal to advertisers and consumers increases geometrically as reach increases

 

 

Which of the following involves emailing another sellers bidders and offering the same product for less

Bid siphoning

 

 

Refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item

Shill bidding

 

 

Which of the following is not one of the defining functions of a portal

Auctions

 

 

Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace."

virtual communities

 

 

One of the first online virtual communities was:

well

 

 

One partial solution to high monitoring cost is

Fixed pricing

 

 

when did the first online communities form

1980s

 

 

1) One of the first online virtual communities, formed in 1985, was:

A) The Well.

B) Myspace.

C) AOL.

D) Salon.com.

A

 

 

2) The technology used by early online communities was limited to mostly:

A) instant messaging.

B) FTP.

C) e-mail.

D) bulletin boards.

D

 

 

 

3) Which of the following is a community of members who self-identify with a demographic or geographic category?

A) practice network

B) sponsored community

C) affinity community

D) interest-based social network

C

 

 

 

4) PredictWallStreet is an example of a(n):

A) interest-based social network.

B) affinity community.

C) sponsored community.

D) practice network.

A

 

 

 

 

 

6) Instagram is an example of a(n) _______-based social network/community.

A) interest

B) affinity

C) general

D) practice

C

 

 

 

7) Which social network functionality allows users to view a list of updates from friends as well as advertisements and notifications in chronological order?

A) message board

B) timeline

C) friends' network

D) newsfeed

D

 

 

8) In 2020, around what percentage of the total U.S. population uses social networks?

A) 53%

B) 63%

C) 73%

D) 83%

B

 

 

9) Which of the following is the second leading social network in the United States in terms of monthly unique visitors?

A) Twitter

B) LinkedIn

C) Instagram

D) Pinterest

C

 

 

10) Which of the following is a leading social network in Germany?

A) Xing

B) Tuenti

C) Orkut

D) Mixi

A

 

 

11) Each of the following is one of the top seven social network sites in the United States, in terms of monthly unique visitors, except:

A) Tumblr.

B) MeWe.

C) Instagram.

D) Pinterest.

B

 

 

12) Facebook owns which of the following?

A) Pinterest

B) Snapchat

C) WhatsApp

D) Tumblr

C

 

 

13) A survey of Fortune 500 companies found that 98% of those companies used:

A) Twitter.

B) Facebook.

C) LinkedIn.

D) Instagram.

C

 

 

14) On which of the following do users spent the least amount of time per month?

A) Snapchat

B) Tumblr

C) LinkedIn

D) Pinterest

C

 

 

15) When did the first online communities form?

A) the 1970s

B) the 1980s

C) the 1990s

D) the 2000s

B

 

 

 

16) BlackPlanet is an example of a(n) ________ social network.

A) practice-based

B) interest-based

C) affinity-based

D) general

C

 

 

17) Which of the following is an example of a practice network?

A) PredictWallstreet

B) Instagram

C) DebatePolitics

D) Doximity

D

 

 

18) Which of the following has the highest penetration of social network usage among Internet users?

A) North America

B) Latin America

C) Europe

D) Asia-Pacific

B

 

 

19) Which age group has the fastest growing rate of Facebook usage?

A) 12-34

B) 35-45

C) 46-65

D) adults over 65

D

 

 

20) Which of the following social networks provides an open-source alternative to Twitter?

A) MeWe

B) Mastadon

C) Tagged

D) Nextdoor

B

 

 

21) Which of the following owns LinkedIn?

A) Facebook

B) Google

C) Microsoft

D) Verizon

C

 

 

22) Which of the following companies purchased Instagram?

A) Google

B) Apple

C) Facebook

D) Microsoft

C

 

 

23) Which of the following statements about Instagram is not true?

A) Instagram trails only Facebook in U.S. ad revenue.

B) Instagram is a social network that focuses on video and photo sharing.

C) Instagram is growing more quickly than Facebook.

D) Instagram users spend more time on Instagram than Facebook users spend on Facebook.

D

 

 

 

24) Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to 'cultural aggregations that emerge when enough people bump into each other often enough in cyberspace.'

A) social networks

B) virtual communities

C) community portals

D) social forums

B

 

 

25) A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared interest.

A) practice network

B) general community

C) affinity community

D) interest-based social network

A

 

 

26) The amount of time visitors spend on a site is a measure of:

A) reach.

B) loyalty.

C) conversation.

D) engagement.

D

 

 

27) Facebook was the leader in U.S. ad spending revenues on social networks in 2019. What company earned the second most amount of ad spending revenue?

A) Snapchat

B) Instagram

C) Pinterest

D) Twitter

B

 

 

28) More than three-quarters of Internet users worldwide participate in social networks.

TRUE

 

 

29) Facebook's current user growth is being driven by growth in the number of users in the United States.

FALSE

 

 

30) A community site created by a corporation is called a sponsored community site.

TRUE

 

 

36) Which of the following statements about auctions is not true?

A) Most of the listings on eBay today use auction pricing.

B) The popularity of online auctions has significantly declined.

C) Online auctions were among the most successful early business models in retail and B2B e-commerce.

D) The marketplace for online auctions is highly concentrated.

A

 

 

37) All of the following are benefits of auctions except:

A) more efficient price discovery.

B) lower transaction costs.

C) decreased price transparency.

D) increased market efficiency.

C

 

 

38) ________ is the market leader in C2C auctions.

A) Amazon

B) eBay

C) Walmart

D) eBid

B

 

 

39) Which of the following is not a risk or cost of Internet auctions?

A) delayed consumption costs

B) equipment costs

C) price transparency

D) trust risks

C

 

 

 

40) The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ________ costs.

A) equipment

B) fulfillment

C) delayed consumption

D) monitoring

A

 

 

41) All of the following are solutions to the problem of high monitoring costs except:

A) seller rating systems.

B) watch lists.

C) proxy bidding.

D) fixed pricing.

A

 

 

42) Which of the following types of auctions 'shields the brand' of the seller?

A) English auction

B) Name Your Own Price auction

C) Dutch Internet auction

D) penny auction

B

 

 

43) Which of the following allows the consumer to enter a maximum price and the auction software automatically places incremental bids, up to that maximum price, as their original bid is surpassed?

A) watch lists

B) proxy bidding

C) sealed bidding

D) price matching

B

 

 

44) ________ occurs when sellers agree informally or formally to set floor prices below which they will not sell on auction items.

A) Discriminatory pricing

B) Price matching

C) Bid rigging

D) Distress pricing

B

 

 

 

45) Which of the following types of auctions is perfect for sellers that have many identical items to sell?

A) English auctions

B) Name Your Own Price auctions

C) Dutch Internet auctions

D) group buying auctions

C

 

 

46) All of the following types of auctions involve single units except:

A) an English auction.

B) a Dutch Internet auction.

C) a Name Your Own Price auction.

D) a penny auction.

B

 

 

47) A(n) ________, in which the highest bidder wins, is the most common form of auction.

A) Dutch Internet auction

B) Japanese auction

C) English auction

D) reverse auction

C

 

 

 

48) Priceline is an example of a(n):

A) English auction.

B) Dutch Internet auction.

C) penny auction.

D) Name Your Own Price auction.

D

 

 

49) Which of the following is not one of the top factors a business should consider when planning an Internet auction?

A) type of product

B) type of auction

C) location of auction

D) bid increments

C

 

 

 

50) The profit a seller makes at auction is a function of all of the following except:

A) initial pricing.

B) auction length.

C) the number of units for auction.

D) watch lists.

D

 

 

51) ________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.

A) Group buying

B) Winner's regret

C) Herd behavior

D) Bid rigging

C

 

 

 

52) Which of the following involves the feeling after winning an auction that you paid too much for an item?

A) herd behavior

B) winner's regret

C) seller's lament

D) loser's lament

B

 

 

53) Which of the following involves e-mailing another seller's bidders and offering the same product for less?

A) transaction interception

B) bid siphoning

C) shill bidding

D) persistent bidding

B

 

 

54) Threatening negative feedback in return for a benefit is an example of:

A) feedback extortion.

B) offensive shill feedback.

C) defensive shill feedback.

D) sending spam.

A

 

 

 

55) One partial solution to high monitoring costs is ________ pricing.

A) fixed

B) dynamic

C) allocated

D) distress

A

 

 

56) The term ________ refer(s) to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.

A) siphoning

B) herd behavior

C) network effects

D) channel expansion

C

 

 

 

57) A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.

A) bidding fee auction

B) channel manager

C) watch list

D) rating system

C

 

 

 

58) The time spent watching and reviewing auction bids is a part of ________ costs.

A) pricing

B) monitoring

C) delayed consumption

D) fulfillment

B

 

 

59) E-mailing buyers to warn them away from a seller is a type of auction fraud known as:

A) transaction interference.

B) bid siphoning.

C) bid rigging.

D) shill bidding.

A

 

 

 

60) ________ refers to the feeling of having been too cheap in bidding and failing to win an auction.

A) Winner's lament

B) Winner's regret

C) Loser's lament

D) Loser's regret

C

 

 

61) ________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.

A) Bid manipulation

B) Shill feedback

C) Shill bidding

D) Bid rigging

C

 

 

62) In B2C auctions, consumers control assets and use dynamic pricing to establish the price.

FALSE

 

 

63) Penny auctions don't require money to bid.

FALSE

 

 

64) Priceline's auctions utilize fixed pricing.

TRUE

 

 

65) In a Dutch Internet auction, a single seller puts up multiple items for bidding.

TRUE

 

 

66) Keeping bid increments low decreases the number of bidders and lowers the frequency of their bids.

FALSE

 

 

67) Closed bidding offers the advantage of herd effects.

FALSE

 

 

68) Auction prices are often higher than prices in fixed priced markets.

TRUE

 

 

69) Consumers in auctions are driven solely by value maximization.

FALSE

 

 

73) Which of the following owns Yahoo?

A) AT&T

B) Microsoft

C) AOL

D) Verizon Media

D

 

 

74) To address the falling price of display ads and declining user engagement, Yahoo acquired all of the following except:

A) Tumblr.

B) Flickr.

C) Aviate.

D) Instagram.

D

 

 

75) Which of the following is not one of the defining functions of a portal?

A) commerce

B) content

C) auctions

D) navigation of the Web

C

 

 

 

76) Which of the following statements best describes the potential impact of network effects with respect to portals?

A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market.

B) The value of the portal to advertisers and consumers increases geometrically as reach increases.

C) The greater the amount of content provided by a portal, the greater its value to the community.

D) The greater number of portals available, the greater the potential audience for each.

B

 

 

 

77) After Google, the portal/search engine site with the most unique visitors is:

A) Yahoo.

B) Microsoft.

C) Verizon Media.

D) Facebook.

B

 

 

78) WebMD.com is an example of a:

A) general purpose portal.

B) vertical market portal based on affinity group.

C) vertical market portal based on focused content.

D) focused content portal.

D

 

 

79) Which of the following is not one of the typical portal revenue sources?

A) commissions on sales

B) subscription fees

C) tenancy deals

D) referral fees

D

 

 

 

80) The original portals in the early days of e-commerce were search engines.

TRUE

 

 

81) The value of portals to advertisers and content owners is primarily a function of the size of the audience the portal reaches, and the length of time visitors stay on the site.

TRUE

 

 

82) Vertical content portals and affinity group portals tend to be more well-known brands than general-purpose portals.

FALSE

 

 

83) Portals are not immune to network effects.

FALSE

 

1.1. 透過網路讓使用者彼此進行資源交換,是指下列何者概念?(單選)

單選題 (2 ) 2

 

A

.

(A) 協同交換

 

 

B

.

(B) 協同設計

 

 

C

.

(C) 協同商務

 

 

D

.

(D) 協同消費

 

正確答案: D

答案解釋:

2.1) Analysts predict that B2B e-commerce in the United States will grow to approximately ________ by 2024.

單選題 (2 ) 2

 

A

.

A) $9.8 billion

 

 

B

.

B) $98 billion

 

 

C

.

C) $980 billion

 

 

D

.

D) $9.8 trillion

 

正確答案: D

答案解釋:

3.49) The term BYOD refers to employees:

單選題 (2 ) 2

 

A

.

A) working from home.

 

 

B

.

B) being allowed or encouraged to use their own mobile devices and laptops.

 

 

C

.

C) using mobile devices for work.

 

 

D

.

D) bringing work devices to the home.

 

正確答案: B

答案解釋:

4.40) Which of the following is a transaction database that operates on a distributed P2P network that connects all participant members in a single database and is highly secure, reliable, resilient, and inexpensive?

單選題 (2 ) 2

 

A

.

A) SCM system

 

 

B

.

B) blockchain

 

 

C

.

C) EDI

 

 

D

.

D) cloud-based B2B system

 

正確答案: B

答案解釋:

5.61) Which of the following primarily involve long-term sourcing?

單選題 (2 ) 2

 

A

.

A) e-distributors and exchanges

 

 

B

.

B) e-distributors and industry consortia

 

 

C

.

C) e-procurement Net marketplaces and exchanges

 

 

D

.

D) e-procurement Net marketplaces and industry consortia

 

正確答案: D

答案解釋:

6.62) An ________ provides an online catalog that represents the products of thousands of direct manufacturers.

單選題 (2 ) 2

 

A

.

A) e-distributor

 

 

B

.

B) e-procurement company

 

 

C

.

C) exchange

 

 

D

.

D) industry consortium

 

正確答案: A

答案解釋:

7.37) Which of the following is a method of inventory cost management that seeks to eliminate excess inventory?

單選題 (2 ) 2

 

A

.

A) lean production

 

 

B

.

B) sustainable production

 

 

C

.

C) just-in-time production

 

 

D

.

D) supply chain simplification

 

正確答案: C

答案解釋:

8.4) Which of the following refers to the links that connect business firms with one another to coordinate production?

單選題 (2 ) 2

 

A

.

A) supply chain

 

 

B

.

B) B2B e-commerce

 

 

C

.

C) vertical market

 

 

D

.

D) horizontal market

 

正確答案: A

答案解釋:

9.43) Which of the following is not a characteristic of the use of social networks in B2B e-commerce?

單選題 (2 ) 2

 

A

.

A) It is typically unstructured.

 

 

B

.

B) It helps develop a more personal relationship between participants in the supply chain.

 

 

C

.

C) It enables participants to make decisions based on current conditions.

 

 

D

.

D) They are always private.

 

正確答案: D

答案解釋:

10.44) Walmart is using which of the following technologies in its Food Traceability Initiative?

單選題 (2 ) 2

 

A

.

A) EDI

 

 

B

.

B) blockchain

 

 

C

.

C) cloud-based B2B system

 

 

D

.

D) collaborative commerce system

 

正確答案: B

答案解釋:

11.77) Trans-organizational business processes require _______ to perform.

單選題 (2 ) 2

 

A

.

A) one firm

 

 

B

.

B) two independent firms

 

 

C

.

C) three independent firms

 

 

D

.

D) at least ten firms

 

正確答案: B

答案解釋:

12.42) Collaborative commerce systems:

單選題 (2 ) 2

 

A

.

A) focus on structuring intra-firm communications.

 

 

B

.

B) bring customers into the product development phase.

 

 

C

.

C) provide open, competitive marketplaces.

 

 

D

.

D) foster sharing sensitive internal information with suppliers and purchasers.

 

正確答案: D

答案解釋:

13.69) NeweggBusiness is an example of a(n):

單選題 (2 ) 2

 

A

.

A) e-distributor.

 

 

B

.

B) exchange.

 

 

C

.

C) private industrial network.

 

 

D

.

D) e-procurement Net marketplace.

 

正確答案: A

答案解釋:

14.2) In 2019, B2B e-commerce accounted for approximately ___ of all B2B commerce.

單選題 (2 ) 2

 

A

.

A) 22%

 

 

B

.

B) 49%

 

 

C

.

C) 51%

 

 

D

.

D) 78%

 

正確答案: C

答案解釋:

15.60) Which of the following primarily deal with direct goods?

單選題 (2 ) 2

 

A

.

A) e-distributors and independent exchanges

 

 

B

.

B) exchanges and e-procurement Net marketplaces

 

 

C

.

C) exchanges and industry consortia

 

 

D

.

D) e-procurement Net marketplaces and industry consortia

 

正確答案: C

答案解釋:

16.65) An ________ primarily serves businesses that primarily buy indirect goods on a contract purchasing basis. 回答錯誤

單選題 (2 ) 0

 

A

.

A) e-distributor

 

 

B

.

B) e-procurement Net marketplace

 

 

C

.

C) exchange

 

 

D

.

D) industry consortium

 

正確答案: B

17.45) EDI document structures are defined by:

單選題 (2 ) 2

 

A

.

A) a single international standards body.

 

 

B

.

B) individual suppliers and buyers.

 

 

C

.

C) industry committees.

 

 

D

.

D) each purchaser.

 

正確答案: C

答案解釋:

18.14) Supply chain ________ refers to differentiating a firm's products or prices on the basis of superior supply chain management.

單選題 (2 ) 2

 

A

.

A) management

 

 

B

.

B) simplification

 

 

C

.

C) competition

 

 

D

.

D) collaboration

 

正確答案: C

答案解釋:

19.79) All of the following are forms of collaboration among businesses except:

單選題 (2 ) 2

 

A

.

A) RFQs.

 

 

B

.

B) CPFR.

 

 

C

.

C) demand chain visibility.

 

 

D

.

D) marketing coordination and product design.

 

正確答案: A

答案解釋:

20.64) E-distributors:

單選題 (2 ) 2

 

A

.

A) make money by charging a mark-up on products they distribute.

 

 

B

.

B) usually operate "private" markets.

 

 

C

.

C) operate in vertical markets.

 

 

D

.

D) focus on selling direct products.

 

正確答案: A

答案解釋:

21.10) All of the following are potential benefits of B2B e-commerce except:

單選題 (2 ) 2

 

A

.

A) lower administrative costs.

 

 

B

.

B) lower search costs.

 

 

C

.

C) lower price transparency.

 

 

D

.

D) lower transaction costs.

 

正確答案: C

答案解釋:

22.50) Which of the following statements about B2B marketing is not true?

單選題 (2 ) 2

 

A

.

A) The majority of B2B ad spending is aimed at desktops.

 

 

B

.

B) Spending on B2B digital marketing and advertising accounts for about 30% of the total amount spend on digital marketing and advertising.

 

 

C

.

C) LinkedIn is the most common social network used for B2B marketing.

 

 

D

.

D) The disparity between the amount spent on B2B marketing compared to B2C e-commerce reflects the different nature of much of B2B e-commerce when compared to B2C e-commerce.

 

正確答案: B

答案解釋:

23.66) ________ is an example of an e-procurement Net marketplace.

單選題 (2 ) 2

 

A

.

A) McMaster-Carr

 

 

B

.

B) Ariba

 

 

C

.

C) Amazon Business

 

 

D

.

D) SupplyOn

 

正確答案: B

答案解釋:

24.8. 二手產品銷售的概念,是指協同消費的哪個模式?(單選)

單選題 (2 ) 2

 

A

.

(A) 產品服務系統

 

 

B

.

(B) 市場再流通

 

 

C

.

(C) 協同式生活

 

 

D

.

(D) 消費者導向

 

正確答案: B

答案解釋:

25.11) EDI began as a(n) ________ system.

單選題 (2 ) 2

 

A

.

A) document automation

 

 

B

.

B) document exchange

 

 

C

.

C) invoice generation

 

 

D

.

D) MRP

 

正確答案: A

答案解釋:

26.80) Which of the following is not a typical barrier to the implementation of a private industrial network?

單選題 (2 ) 2

 

A

.

A) It requires participating firms to share sensitive data.

 

 

B

.

B) It requires the large network owners to give up some of its independence.

 

 

C

.

C) It requires a significant investment of time and money.

 

 

D

.

D) It requires a change of mindset and behavior of employees.

 

正確答案: B

答案解釋:

27.76) Which of the following statements about Walmart's Global Replenishment System (GRS) is not true?

單選題 (2 ) 2

 

A

.

A) GRS is an online analytics package.

 

 

B

.

B) GRS is a just-in-time inventory management system.

 

 

C

.

C) GRS is predictive, not just reflective, of past sales.

 

 

D

.

D) To use GRS and make decisions about order sizes, vendors must first input data to the system in a spreadsheet format.

 

正確答案: D

答案解釋:

28.21) What is the first step in the procurement process?

單選題 (2 ) 2

 

A

.

A) negotiate price

 

 

B

.

B) qualify the seller and its products

 

 

C

.

C) issue a purchase order

 

 

D

.

D) search for suppliers

 

正確答案: D

答案解釋:

29.4. zipcar 讓會員共同擁有汽車,隨時都可以進行租用,請問這是下列何種概念?(單選)

單選題 (2 ) 2

 

A

.

(A) 協同交換

 

 

B

.

(B) 協同設計

 

 

C

.

(C) 協同商務

 

 

D

.

(D) 協同消費

 

正確答案: D

答案解釋:

30.9. 透過平台讓使用者共同分享與交易無形的資源,是指協同消費的哪個模式?(單選)

單選題 (2 ) 2

 

A

.

(A) 產品服務系統

 

 

B

.

(B) 市場再流通

 

 

C

.

(C) 協同式生活

 

 

D

.

(D) 消費者導向

 

正確答案: C

答案解釋:

31.63) An ________ primarily serves businesses that buy indirect goods on a spot purchasing basis.

單選題 (2 ) 2

 

A

.

A) e-distributor

 

 

B

.

B) e-procurement company

 

 

C

.

C) exchange

 

 

D

.

D) industry consortium

 

正確答案: A

答案解釋:

32.3. 透過租賃服務來提供高價商品、奢侈品牌、限量商品等給有需要的使用者選購,這是下列何種概念?(單選)

單選題 (2 ) 2

 

A

.

(A) 協同交換

 

 

B

.

(B) 協同設計

 

 

C

.

(C) 協同商務

 

 

D

.

(D) 協同消費

 

正確答案: D

答案解釋:

33.67) An ________ serves businesses that primarily buy direct goods on a contract purchasing basis. 回答錯誤

單選題 (2 ) 0

 

A

.

A) e-distributor

 

 

B

.

B) e-procurement company

 

 

C

.

C) exchange

 

 

D

.

D) industry consortium

 

正確答案: D

34.30) ________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers.

單選題 (2 ) 2

 

A

.

A) Spot

 

 

B

.

B) Indirect

 

 

C

.

C) Vertical

 

 

D

.

D) Bulk

 

正確答案: A

答案解釋:

35.10. 請問協同消費的核心為何?(單選)

單選題 (2 ) 2

 

A

.

(A) 分享

 

 

B

.

(B) 個人化

 

 

C

.

(C) 服務

 

 

D

.

(D) 平台便利性

 

正確答案: A

答案解釋:

36.18) Few large firms today have Electronic Data Interchange (EDI) systems.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

37.32) Purchasing managers are key players in the procurement process.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

38.73) Exchanges are not directly tied to ERP systems used by large firms.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

39.72) Exchanges are used for spot purchasing of MRO supplies.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

40.17) B2B e-commerce websites tend to serve horizontal markets.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

41.83) Private industrial networks are usually owned collectively by the major firms participating in the network, while exchanges usually are created by a single sponsoring company.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

42.31) MRO goods are also known as direct goods.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

43.70) EDI was developed to reduce the cost, delays, and errors inherent in the manual exchanges of documents among firms.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

44.52) EDI systems generally serve vertical markets.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

45.71) E-distributors are sometimes referred to as many-to-one markets, with many sellers serving one firm.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

46.82) A private industrial network is an independently owned online marketplace that connects many suppliers and buyers.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

47.53) The primary goal of tight coupling is to reduce excess inventory to a bare minimum.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

48.81) Walmart is both the worlds largest retailer and has the worlds largest supply chain.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

答案解釋:

49.51) Highly centralized supply chains produce higher short-term costs and lower long-term risk protection.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: B

答案解釋:

50.84) Operating on a global scale is one objective of private industrial networks.

是非題 (2 ) 2

 

A

.

A

 

 

B

.

B

 

正確答案: A

 

 

1) Analysts predict that B2B e-commerce in the United States will grow to approximately ________ by 2024.

A) $9.8 billion

B) $98 billion

C) $980 billion

D) $9.8 trillion

D

 

 

2) In 2019, B2B e-commerce accounted for approximately ___ of all B2B commerce.

A) 22%

B) 49%

C) 51%

D) 78%

C

 

 

3) Which of the following was the first step in the development of B2B e-commerce?

A) Electronic Data Interchange (EDI)

B) automated order entry systems

C) computerized inventory databases

D) digital invoices

B

 

 

4) Which of the following refers to the links that connect business firms with one another to coordinate production?

A) supply chain

B) B2B e-commerce

C) vertical market

D) horizontal market

A

 

 

5) Automated order entry systems:

A) only show goods from a single seller.

B) increased the costs of inventory replenishment.

C) are typically owned by the purchasing firm.

D) no longer play an important role in B2B commerce.

A

 

 

 

6) Which of the following statements about EDI systems is true?

A) They typically serve vertical markets.

B) They are seller-side solutions.

C) They evolved from private trading exchanges.

D) They still play an important role in B2C commerce.

A

 

 

7) B2B e-commerce websites:

A) are a predecessor of industry consortia.

B) tend to serve horizontal markets.

C) are buyer-side solutions.

D) are considered a type of EDI system.

B

 

 

 

8) Which of the following is another name for a private industrial network?

A) industry consortia

B) EDI system

C) PTX

D) net marketplace

C

 

 

9) In 2019, which of the following accounted for the smallest amount of B2B commerce?

A) EDI

B) private industrial networks

C) Net marketplaces

D) traditional B2B

C

 

 

10) All of the following are potential benefits of B2B e-commerce except:

A) lower administrative costs.

B) lower search costs.

C) lower price transparency.

D) lower transaction costs.

C

 

 

11) EDI began as a(n) ________ system.

A) document automation

B) document exchange

C) invoice generation

D) MRP

A

 

 

12) All of the following are potential benefits of B2B e-commerce except:

A) increased production flexibility.

B) increased product cycle time.

C) increased opportunities to collaborate with suppliers and distributors.

D) increased visibility and real-time information sharing among all participants in the supply chain network.

B

 

 

 

13) All of the following have led to the development of outsourcing of manufacturing around the world except:

A) technology.

B) globalization of trade.

C) environmental concerns.

D) high levels of wage disparity between the developed and undeveloped worlds.

C

 

 

14) Supply chain ________ refers to differentiating a firm's products or prices on the basis of superior supply chain management.

A) management

B) simplification

C) competition

D) collaboration

C

 

 

 

15) A(n) ________ market is one that provides expertise and products for a specific industry (i.e., automobiles).

A) vertical

B) horizontal

C) indirect

D) buyer-biased

A

 

 

 

16) The essential characteristic of ________ is that they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade.

A) industry consortia

B) exchanges

C) Net marketplaces

D) horizontal markets

C

 

 

17) B2B e-commerce websites tend to serve horizontal markets.

TRUE

 

 

18) Few large firms today have Electronic Data Interchange (EDI) systems.

FALSE

 

 

21) What is the first step in the procurement process?

A) negotiate price

B) qualify the seller and its products

C) issue a purchase order

D) search for suppliers

D

 

 

 

22) The last step in the procurement process is:

A) sending a remittance payment.

B) sending the invoice.

C) shipping the goods.

D) delivering the goods.

A

 

 

23) Office supplies are an example of:

A) direct goods.

B) indirect goods.

C) MRO goods.

D) distributed goods.

B

 

 

24) The majority of inter-firm trade involves:

A) spot purchasing of direct goods.

B) contract purchasing of indirect goods.

C) contract purchasing of direct goods.

D) spot purchasing of indirect goods.

C

 

 

 

25) All of the following are examples of direct goods in the auto industry except:

A) sheet steel.

B) shatter-resistant glass.

C) rubber molding.

D) desktop computers.

D

 

 

 

26) An example of an indirect good in the fast-food industry is:

A) mustard.

B) paper napkins.

C) beef.

D) sugar.

B

 

 

27) An ________ is an independently owned, online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment.

A) exchange

B) e-distributor

C) e-procurement company

D) industry consortium

A

 

 

 

 

29) The liquidity of a market is measured by all of the following except:

A) price transparency.

B) number of buyers and sellers in market.

C) volume of transactions.

D) size of transactions.

A

 

 

30) ________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers.

A) Spot

B) Indirect

C) Vertical

D) Bulk

A

 

 

31) MRO goods are also known as direct goods.

FALSE

 

 

32) Purchasing managers are key players in the procurement process.

TRUE

 

 

35) All of the following are major technology trends in B2B e-commerce in 2020-2021, except:

A) a movement of B2B systems to cloud computing providers as a means of slowing rising technology costs.

B) a growing emphasis on the use of business analytics software (business intelligence) to understand very large data sets.

C) a growing use of the mobile platform for B2B systems.

D) a decrease in the use of social network platforms.

D

 

 

36) All of the following are weaknesses of EDI except:

A) EDI is not well suited for electronic marketplaces.

B) EDI lacks universal standards.

C) EDI does not provide a real-time communication environment.

D) EDI does not scale easily.

B

 

 

 

37) Which of the following is a method of inventory cost management that seeks to eliminate excess inventory?

A) lean production

B) sustainable production

C) just-in-time production

D) supply chain simplification

C

 

 

38) Which of the following statements about cloud-based B2B systems is not true?

A) Much of the expense of the system is shifted from the B2B network provider to the firm.

B) B2B network providers charge customers on a demand basis.

C) Network effects apply, enabling the spreading of costs.

D) Cloud-based B2B data networks can be implemented in short periods of time.

A

 

 

 

39) ________ is a method for ensuring that suppliers precisely deliver ordered parts at a specific time and to a particular location.

A) Having an adaptive supply chain

B) Tight coupling

C) Supply-chain management

D) Materials requirement planning

B

 

 

40) Which of the following is a transaction database that operates on a distributed P2P network that connects all participant members in a single database and is highly secure, reliable, resilient, and inexpensive?

A) SCM system

B) blockchain

C) EDI

D) cloud-based B2B system

B

 

 

41) A(n) ________ system continuously links the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating order entry systems.

A) EDI

B) ERP

C) CPFR

D) SCM

D

 

 

 

42) Collaborative commerce systems:

A) focus on structuring intra-firm communications.

B) bring customers into the product development phase.

C) provide open, competitive marketplaces.

D) foster sharing sensitive internal information with suppliers and purchasers.

D

 

 

 

43) Which of the following is not a characteristic of the use of social networks in B2B e-commerce?

A) It is typically unstructured.

B) It helps develop a more personal relationship between participants in the supply chain.

C) It enables participants to make decisions based on current conditions.

D) They are always private.

D

 

 

 

44) Walmart is using which of the following technologies in its Food Traceability Initiative?

A) EDI

B) blockchain

C) cloud-based B2B system

D) collaborative commerce system

B

 

 

45) EDI document structures are defined by:

A) a single international standards body.

B) individual suppliers and buyers.

C) industry committees.

D) each purchaser.

C

 

 

 

46) A(n) ________ supply chain is one in which the labor conditions in low-wage, underdeveloped producer countries are visible and morally acceptable to ultimate consumers in more developed industrial societies.

A) sustainable

B) ethical

C) lean

D) accountable

D

 

 

 

47) ________ production is a set of production methods that focuses on the elimination of waste throughout the customer value chain.

A) Green

B) Sustainable

C) Lean

D) Just-in-time

C

 

 

48) ________ is defined as the use of digital technologies to permit organizations to work together to design, develop, build, and manage products through their life cycles.

A) SCM

B) Social e-commerce

C) EDI

D) Collaborative commerce

D

 

 

49) The term BYOD refers to employees:

A) working from home.

B) being allowed or encouraged to use their own mobile devices and laptops.

C) using mobile devices for work.

D) bringing work devices to the home.

B

 

 

50) Which of the following statements about B2B marketing is not true?

A) The majority of B2B ad spending is aimed at desktops.

B) Spending on B2B digital marketing and advertising accounts for about 30% of the total amount spend on digital marketing and advertising.

C) LinkedIn is the most common social network used for B2B marketing.

D) The disparity between the amount spent on B2B marketing compared to B2C e-commerce reflects the different nature of much of B2B e-commerce when compared to B2C e-commerce.

B

 

 

51) Highly centralized supply chains produce higher short-term costs and lower long-term risk protection.

FALSE

 

 

52) EDI systems generally serve vertical markets.

TRUE

 

 

53) The primary goal of tight coupling is to reduce excess inventory to a bare minimum.

FALSE

 

 

57) Which of the following is an example of an e-distributor?

A) Grainger

B) Go2Paper

C) The Seam

D) Ariba Network

A

 

 

58) Which of the following primarily serve horizontal markets?

A) e-distributors and exchanges

B) e-distributors and e-procurement Net marketplaces

C) e-procurement Net marketplaces and industry consortia

D) exchanges and industry consortia

B

 

 

59) Which of the following primarily deal with indirect goods?

A) e-distributors and industry consortia

B) e-distributors and e-procurement Net marketplaces

C) exchanges and industry consortia

D) exchanges and e-procurement Net marketplaces

B

 

 

60) Which of the following primarily deal with direct goods?

A) e-distributors and independent exchanges

B) exchanges and e-procurement Net marketplaces

C) exchanges and industry consortia

D) e-procurement Net marketplaces and industry consortia

C

 

 

61) Which of the following primarily involve long-term sourcing?

A) e-distributors and exchanges

B) e-distributors and industry consortia

C) e-procurement Net marketplaces and exchanges

D) e-procurement Net marketplaces and industry consortia

D

 

 

 

62) An ________ provides an online catalog that represents the products of thousands of direct manufacturers.

A) e-distributor

B) e-procurement company

C) exchange

D) industry consortium

A

 

 

63) An ________ primarily serves businesses that buy indirect goods on a spot purchasing basis.

A) e-distributor

B) e-procurement company

C) exchange

D) industry consortium

A

 

 

64) E-distributors:

A) make money by charging a mark-up on products they distribute.

B) usually operate 'private' markets.

C) operate in vertical markets.

D) focus on selling direct products.

A

 

 

65) An ________ primarily serves businesses that primarily buy indirect goods on a contract purchasing basis.

A) e-distributor

B) e-procurement Net marketplace

C) exchange

D) industry consortium

B

 

 

66) ________ is an example of an e-procurement Net marketplace.

A) McMaster-Carr

B) Ariba

C) Amazon Business

D) SupplyOn

B

 

 

67) An ________ serves businesses that primarily buy direct goods on a contract purchasing basis.

A) e-distributor

B) e-procurement company

C) exchange

D) industry consortium

D

 

 

68) The Seam is an example of an:

A) exchange.

B) industry consortium.

C) e-procurement Net marketplace.

D) e-distributor.

B

 

 

69) NeweggBusiness is an example of a(n):

A) e-distributor.

B) exchange.

C) private industrial network.

D) e-procurement Net marketplace.

A

 

 

70) EDI was developed to reduce the cost, delays, and errors inherent in the manual exchanges of documents among firms.

TRUE

 

 

71) E-distributors are sometimes referred to as many-to-one markets, with many sellers serving one firm.

FALSE

 

 

72) Exchanges are used for spot purchasing of MRO supplies.

TRUE

 

 

73) Exchanges are not directly tied to ERP systems used by large firms.

TRUE

 

 

76) Which of the following statements about Walmart's Global Replenishment System (GRS) is not true?

A) GRS is an online analytics package.

B) GRS is a just-in-time inventory management system.

C) GRS is predictive, not just reflective, of past sales.

D) To use GRS and make decisions about order sizes, vendors must first input data to the system in a spreadsheet format.

D

 

 

77) Trans-organizational business processes require _______ to perform.

A) one firm

B) two independent firms

C) three independent firms

D) at least ten firms

B

 

 

 

78) Private industrial networks are direct descendants of:

A) e-procurement Net marketplaces.

B) existing EDI networks.

C) independent exchanges.

D) industry consortia.

B

 

 

79) All of the following are forms of collaboration among businesses except:

A) RFQs.

B) CPFR.

C) demand chain visibility.

D) marketing coordination and product design.

A

 

 

80) Which of the following is not a typical barrier to the implementation of a private industrial network?

A) It requires participating firms to share sensitive data.

B) It requires the large network owners to give up some of its independence.

C) It requires a significant investment of time and money.

D) It requires a change of mindset and behavior of employees.

B

 

 

81) Walmart is both the world's largest retailer and has the world's largest supply chain.

TRUE

 

 

82) A private industrial network is an independently owned online marketplace that connects many suppliers and buyers.

FALSE

 

 

83) Private industrial networks are usually owned collectively by the major firms participating in the network, while exchanges usually are created by a single sponsoring company.

FALSE

 

 

84) Operating on a global scale is one objective of private industrial networks.

TRUE

 

1.10. 消費者使用「基礎運算資源」,這是指下列何者?(單選)

單選題 (4 ) 4

 

A

.

(A) SaaS

 

 

B

.

(B) PaaS

 

 

C

.

(C) IaaS

 

 

D

.

(D) PaaS

 

正確答案: C

答案解釋:

2.10. 商業客戶導向的個人社交網路服務網站,這是指下列何者?(單選)

單選題 (4 ) 4

 

A

.

(A) Pinterest

 

 

B

.

(B) Instagram

 

 

C

.

(C) LinkedIn

 

 

D

.

(D) Facebook

 

正確答案: C

答案解釋:

3.8. 請問下列何者屬於 Pinterest 的功能?(單選)

單選題 (4 ) 4

 

A

.

(A) 個人銷售平台

 

 

B

.

(B) 群眾付款

 

 

C

.

(C) 互動影音

 

 

D

.

(D) 推薦圖釘

 

正確答案: D

答案解釋:

4.9. 請問下列何者非雲端運算的安全問題?(單選)

單選題 (4 ) 4

 

A

.

(A) 隱私

 

 

B

.

(B) 在未經授權的情況下,他人以不正當的方式進行資料侵入,獲得用戶資料

 

 

C

.

(C) 政府部門或其他權利機構為達到目的對雲端運算平台上的資訊進行檢查

 

 

D

.

(D) 不能為了取得商業利益對用戶資訊進行蒐集和處理

 

正確答案: D

答案解釋:

5.7. 關於 Pinterest 的描述,下列何者錯誤?(單選)

單選題 (4 ) 4

 

A

.

(A) 在電腦與手機平台都有的應用程式

 

 

B

.

(B) 讓照片以類別的方式呈現

 

 

C

.

(C) 用戶可以按主題分類來上傳和釘 (Pin) 圖片到自己線上相簿的社群網路服務

 

 

D

.

(D) 使用的網站布局為瀑布流布局 (Pinterest-style Layout)

 

正確答案: B

答案解釋:

6.8. 請問 Google 的無人智慧車較偏向下列何種應用?(單選)

單選題 (4 ) 4

 

A

.

(A) 協同消費

 

 

B

.

(B) 行動商務

 

 

C

.

(C) 數位匯流

 

 

D

.

(D) 物聯網

 

正確答案: D

答案解釋:

7.2. 請問格子店是屬於個人商務應用實例的哪一種?(單選)

單選題 (4 ) 4

 

A

.

(A) 個人商家

 

 

B

.

(B) 群眾募資

 

 

C

.

(C) 個人影音頻道

 

 

D

.

(D) Pinterest

 

正確答案: A

答案解釋:

8.6. 請問由感應器 (Reader) 和標籤 (Tag) 所組成的系統是指下列何者?(單選)

單選題 (4 ) 4

 

A

.

(A) 無線射頻辨識技術

 

 

B

.

(B) 無線感知網路

 

 

C

.

(C) 嵌入式智慧技術

 

 

D

.

(D) 奈米與微機電技術

 

正確答案: A

答案解釋:

9.1. 把所有的資料全部丟到網路上處理,請問這是下列哪個概念?(單選)

單選題 (4 ) 4

 

A

.

(A) 雲端運算

 

 

B

.

(B) 網路社群

 

 

C

.

(C) 長尾理論

 

 

D

.

(D) 群眾募資

 

正確答案: A

答案解釋:

10.10. 下列何者非物聯網重要的商業模式之一?(單選)

單選題 (4 ) 4

 

A

.

(A) 平台使用人數

 

 

B

.

(B) 資料販售與交換

 

 

C

.

(C) 產品即服務

 

 

D

.

(D) 產品共享

 

正確答案: A

答案解釋:

11.3. 請問淘寶網在台灣開設淘寶大學是屬於個人商務應用實例的哪一種?(單選)

單選題 (4 ) 4

 

A

.

(A) 個人商家

 

 

B

.

(B) 群眾募資

 

 

C

.

(C) 個人影音頻道

 

 

D

.

(D) Pinterest

 

正確答案: A

答案解釋:

12.7. 請問下列哪個技術可將軟體結合硬體裝置 (行動電話、遊樂器、數位家電等),使設備皆可具備接收網路訊息與處理資訊的能力?(單選)

單選題 (4 ) 4

 

A

.

(A) 無線射頻辨識技術

 

 

B

.

(B) 無線感知網路

 

 

C

.

(C) 嵌入式智慧技術

 

 

D

.

(D) 奈米與微機電技術

 

正確答案: C

答案解釋:

13.9. 關於 Instagram 的敘述,下列何者錯誤?(單選)

單選題 (4 ) 4

 

A

.

(A) 提供行動裝置的照片分享

 

 

B

.

(B) 多樣的濾鏡效果,讓使用者可以輕易地變換出美麗的圖片效果

 

 

C

.

(C) 是一個免費提供在線圖片及短影片分享的社交應用

 

 

D

.

(D) 是很好用的導購工具

 

正確答案: D

答案解釋:

14.6. 把社會資源進行測試、分類和整合,並向有需求的用戶提供相應的服務,這是雲端運算的哪個應用?(單選)

單選題 (4 ) 4

 

A

.

(A) 雲端物聯

 

 

B

.

(B) 雲端社交

 

 

C

.

(C) 雲端安全

 

 

D

.

(D) 雲端政務

 

正確答案: B

答案解釋:

15.9. 「羊毛出在狗身上,豬來買單」,是指下列何種商業模式?(單選)

單選題 (4 ) 4

 

A

.

(A) 協同消費

 

 

B

.

(B) 行動商務

 

 

C

.

(C) 數位匯流

 

 

D

.

(D) 物聯網

 

正確答案: D

答案解釋:

16.5. 請問下列何者非物聯網的關鍵技術?(單選)

單選題 (4 ) 4

 

A

.

(A) 無線射頻辨識技術

 

 

B

.

(B) 無線感知網路

 

 

C

.

(C) 嵌入式智慧技術

 

 

D

.

(D) 行動通訊設備

 

正確答案: D

答案解釋:

17.1. 建構在網路、電信等資訊媒介,讓許多植入感應器的物件能夠互聯互通的網絡模式,指的是下列哪個概念?(單選)

單選題 (4 ) 4

 

A

.

(A) 協同消費

 

 

B

.

(B) 行動商務

 

 

C

.

(C) 數位匯流

 

 

D

.

(D) 物聯網

 

正確答案: D

答案解釋:

18.5. 透過網際網路以簡短的影片來展示、宣傳原始的創意與設計,同時說明量產實現的計畫,請問這是屬於個人商務應用實例的哪一種?(單選)

單選題 (4 ) 4

 

A

.

(A) 個人商家

 

 

B

.

(B) 群眾募資

 

 

C

.

(C) 個人影音頻道

 

 

D

.

(D) Pinterest

 

正確答案: B

答案解釋:

19.7. 關於雲端儲存的描述,下列何者錯誤?(單選)

單選題 (4 ) 4

 

A

.

(A) 網際網路中大量的儲存裝置透過應用軟體共同作用協同發展

 

 

B

.

(B) 具體的儲存裝置

 

 

C

.

(C) 運算和處理海量資料

 

 

D

.

(D) 支援雲端運算系統需要配置大量的儲存裝置

 

正確答案: B

答案解釋:

20.3. 請問雲端運算中,何者是資料與程式皆在組織內管理,且不會受到網路頻寬、安全疑慮、法規限制影響?(單選)

單選題 (4 ) 4

 

A

.

(A) 公用雲

 

 

B

.

(B) 私有雲

 

 

C

.

(C) 社群雲

 

 

D

.

(D) 混合雲

 

正確答案: B

答案解釋:

21.1. 請問下列哪些屬於個人化平台?(複選)

複選題 (2 ) 2

 

A

.

(A) Pinterest

 

 

B

.

(B) Instagram

 

 

C

.

(C) YouTube

 

 

D

.

(D) Facebook

 

正確答案: A B C D

答案解釋:

22.2. 請問雲端運算分為哪幾類?(複選)

複選題 (2 ) 2

 

A

.

(A) SaaS

 

 

B

.

(B) PaaS

 

 

C

.

(C) IaaS

 

 

D

.

(D) PaaS

 

正確答案: A B C

答案解釋:

23.3. 請問物聯網涵蓋哪三大範疇?(複選)

複選題 (2 ) 2

 

A

.

(A) 人與人

 

 

B

.

(B) 物件與物件

 

 

C

.

(C) 人與物件

 

 

D

.

(D) 網路系統

 

正確答案: A B C

答案解釋:

24.8. 請問個人雲應用包括下列哪些項目?(複選)

複選題 (2 ) 2

 

A

.

(A) Dropbox

 

 

B

.

(B) Google Drive

 

 

C

.

(C) Microsoft OneDrive

 

 

D

.

(D) Apple iCloud

 

正確答案: A B C D

答案解釋:

25.5. 雲端教育的描述,下列哪些正確?(複選)

複選題 (2 ) 2

 

A

.

(A) 打破傳統教育的壟斷和原生邊界

 

 

B

.

(B) 可以通過視訊雲端運算的應用對學校特色教育課程進行直播和錄播

 

 

C

.

(C) 可汗學院 (KHAN ACADEMY) 最早提出翻轉教室的概念

 

 

D

.

(D) 可完全取代傳統教育模式

 

正確答案: A B C

答案解釋:

26.6. 群眾募資者需要注意哪些原則?(複選)

複選題 (2 ) 2

 

A

.

(A) 專案必須創造出能與他人分享的事物

 

 

B

.

(B) 專案必須誠實且清楚的呈現

 

 

C

.

(C) 如果專案是製造產品,必須要有原型產品的展示

 

 

D

.

(D) 允許慈善活動

 

正確答案: A B C

答案解釋:

27.4. 請問物聯網的四大預測包括哪些?(複選)

複選題 (2 ) 2

 

A

.

(A) 在車用以及工業用的領域加速發展

 

 

B

.

(B) 結合巨量資料讓服務更聰明

 

 

C

.

(C) 更快速的連線

 

 

D

.

(D) 更完整的規範

 

正確答案: A B C D

答案解釋:

28.4. 請問雲端運算包括哪些特徵?(複選)

複選題 (2 ) 2

 

A

.

(A) 隨需求而變的自助服務

 

 

B

.

(B) 網路使用無所不在

 

 

C

.

(C) 快速部署彈性

 

 

D

.

(D) 多人共享資源池

 

正確答案: A B C D

答案解釋:

29.4. 請問淘寶大學包括哪些課程?(複選)

複選題 (2 ) 2

 

A

.

(A) 開店流程

 

 

B

.

(B) 商品與商店美化

 

 

C

.

(C) 行銷手法

 

 

D

.

(D) 客戶服務

 

正確答案: A B C D

答案解釋:

30.2. 請問物聯網的發展可分為哪三個維度?(複選)

複選題 (2 ) 2

 

A

.

(A) 時間

 

 

B

.

(B) 網路

 

 

C

.

(C) 地點

 

 

D

.

(D) 物件

 

正確答案: A C D

 

 

1.5) ________ is the ability to ensure that an e-commerce site continues to function as intended.

C) Availability

2.11) Which system functionality must your website have to be able to personalize or customize a product for a client?

D) customer on-site tracking

3.19) Which of the following uses a subscription-based sales revenue model?

D) Dollar Shave Club

4.下列敘述何者有誤?[單選]

A. 變動性較低、需求固定的市場,可採用拉式基礎的供應鏈

5.7) What are the two most important management challenges in building a successful e-commerce presence?

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

6.77) Above all, e-commerce is a ________ phenomenon.

A) technology driven

7.13. 在電子商務交易中,買賣雙方皆為企業,為下列何種型態?[單選]

D.B2B

8.18) ________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

A) Ping

9.請問下列何者非呈現式廣告的概念?[單選]

B. 又稱為關鍵字廣告

10.SCM」是指?[單選]

B. 供應鏈管理

11.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線   速度,造成使用者點選網頁時需要花很久的時間,再加上添購電子化設備費用   昂貴,最後導致成效不如預期而收編。由上述案例來看,除了外部影響外,   NOVA在內部還遇到哪個困難?[單選]

C. 導入費用過高

12.14) The existence of many competitors in any one market segment may indicate:

B) the market is saturated.

13.台灣銀行在民國861月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]

A.電子資料交換

14.2) Which of the following uses a subscription revenue model for books?

B) Amazon Kindle Unlimited

15.52) Proxy servers are also known as __________ because they have two network interfaces.

C) dual home systems

16.37) All of the following might be part of a website's middle-tier layer except:

C) legacy corporate applications.

17.52) All of the following are involved in the effort to create standards for IoT except: 回答錯誤

D) W3C.

18.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]

D.興趣

19.22. 冷門產品的需求量不高,但匯聚多樣的冷門產品所產生之效果會大於傳統熱門產品所產生的效果,這是指?[單選] 回答錯誤

B.15

20.13) ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.

D) Cloud computing

21.30) ________ typically attack governments, organizations, and sometimes individuals for political purposes.

D) Hacktivists

22.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]

B.目錄式價格

23.導入CRM之各個時期都必須獲得公司各部門鼎力合作才能真正成功,這   是在解決顧客關係管理的哪項失敗因素?[單選]

D. 缺乏人才與共識

24.40) Which of the following would you use to verify that links on web pages are valid? 回答錯誤

D) site management tools

正確答案: D

25.24) The percentage of all e-mail that is spam averaged around ________ in 2020.

A) 55%

26.博客來網路書店承諾「中午前訂,隔天7-11取貨」,此符合B to C電子商務影響因素中的哪一個?[單選]

D.便捷的運送服務

正確答案: D

27.29) Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America’s most prominent political, entertainment and technology leaders?

C) social engineering

28.44) Which of the following is an example of a company using the content provider model?

B) Netflix

29.Call Center轉為顧客關係管理時,原先利用電話蒐集到的顧客資訊無法   和網頁整合,此時造成顧客在詢問或購買時不方便,這是屬於顧客關係管理可   能會遇到的困難的哪一種?[單選]

B. 與原系統整合不易

30.37) Which of the following is based on the idea of complete price transparency in a perfect information marketplace? 回答錯誤

A) the Law of One Price

31.27) A template test is a form of which type of testing?

D) A/B testing

正確答案: D

32.46) In general, the key to becoming a successful content provider is to:

A) own the content being provided.

33.50) M-commerce is the type of e-commerce that generates the most revenue.

B.B

正確答案: B

34.4. 智慧財產權法想要保護的是下列何者?(單選)

(A) 人類腦力辛勤創作的結晶

正確答案: A

35.3. 下列哪些是常見的網路犯罪?(複選)

(A) 網路販賣盜版光碟

(B) 網路販賣贓物

(C) 入侵他人網站

正確答案: A B C

36.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

A

.

(A) 隱私權

B

.

(B) 著作權

C

.

(C) 專利權

D

.

(D) 商標權

正確答案: B C D

37.8. 下列何者不受著作權法的保護?(單選)

B

.

(B) 中華民國憲法

C

.

(C) 學校的試題

D

.

(D) 學校的網頁

正確答案: B C D

38.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

39.6. 有關網路禮儀,下列哪些正確?(複選)

(A) 電腦禮儀的基本原則是「尊重」

(C) 轉載別人的文章時,最好註明出處

(D) 最好取得原作者的同意後再進行轉載

正確答案: A C D

40.3. 有關電子商務的定義,下列哪些錯誤?(複選)

(A) 電子商務就是不用在網路上做生意

(C) 電子商務一定要透過網路線來傳遞

正確答案: A C

41.58) Face ID is an example of which of the following?

是非題 (2 ) 2

A) biometrics

正確答案: A

42.59) WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.

是非題 (2 ) 2

B.B

正確答案: B

43.38) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

是非題 (2 ) 2

A.A

正確答案: A

44.35) Exploit kits can be purchased by users to protect their computers from malware.

是非題 (2 ) 2

B.B

正確答案: B

45.76) Scale economies are efficiencies that result from increasing the size of the business.

是非題 (2 ) 2

A.A

46.7) Research shows the two key factors shaping the decision to purchase online are utility and trust.

是非題 (2 ) 2

A.A

47.79) Interactivity that enables product customization alters industry structure by decreasing the threat of substitutes.

是非題 (2 ) 2

A.A

正確答案: A

48.58) The United States has the world’s highest average Internet connection speed. 

是非題 (2 ) 2

B.B

正確答案: B

49.34) A multi-tier architecture includes a web and database server.

是非題 (2 ) 2

B.B

正確答案: B

50.10) Online traffic is partially driven by offline brands and traditional shopping.

是非題 (2 ) 2

A.A

正確答案: A

1.79) Which of the following statements about responsive web design (RWD) is not true?

A) RWD works best for sites that have complex functionality.

正確答案: A

2.1. 下列敘述何者錯誤?(單選)

(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果

正確答案: C

3.有關專利權的敘述,下列何者正確?[單選]

C. 專利權只限於申請的國家,出了國境就不受保護

正確答案: C

4.45) All of the following statements about public key cryptography are true except:

B) public key cryptography ensures authentication of the sender.

正確答案: B

5.31) The incremental cost of building the next unit of a good is called the:

C) marginal cost.

正確答案: C

6.63) Django is based on which of the following?

B) Python

正確答案: B

7.78) View-to-cart ratio is a measure of the: 回答錯誤

B) percentage of views that lead to an add-to-cart action.

正確答案: B

8.82) Which of the following is a programming language introduced by Apple specifically for developing iOS applications?

D) Swift

正確答案: D

9.83) Applications for Android operating system-based smartphones are typically written in which of the following?

B) Java

正確答案: B

10.4. 小駱是個很認真的保險業務員,每當拜訪舊顧客時,總會拿出顧客從前留下的資料加以研讀,藉此提供最符合顧客需求的保險建議。請問這是屬於下列何種概念?(單選)

(D) 顧客關係管理

正確答案: D

11.30) The NIKEiD program is an example of which of the following marketing techniques?

A) customer co-production

正確答案: A

12.24.阿傑是個Apple的重度使用者,每天都會逛AppleApp Store搜尋最新的應用程式,請問App Store豐富的數位化內容是屬於網路商業模式的哪種特性? [單選]

B.核心面

正確答案: B

13.23) Which of the following is not a primary source of ad fraud?

D) native advertising that is displayed on a social media site

正確答案: D

14.1. 下列何者非企業電子化的主要應用範圍?(單選)

(A) 六個標準差

正確答案: A

15.9. 阿斌是 Apple 的瘋狂粉絲,在 iPad mini 尚未在台灣上市時,就透過拍賣網站先買到,請問這是屬於 C to C 網路交易模式帶來的何種效益?(單選)

(B) 特殊性

正確答案: B

16.9. 在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)

(A) 駭客

正確答案: A

17.25) Which of the following statements about CAN-SPAM is not true?

B) CAN-SPAM prohibits unsolicited e-mail (spam).

正確答案: B

18.42. 女鞋業者Grace Gift利用素人以及知名部落客合作,推出其專屬商品,成功擄獲消費者的心而使商品大賣,請問Grace Gift是考慮到網路商業模式的哪種特性?[單選] 回答錯誤

A.服務面

正確答案: A

19.1. 網站藉由銷售商品、資訊或服務給消費者而從中賺取價差,這是屬於下列哪一種收益模式?(單選)

(D) 銷售收益模式

正確答案: D

20.供應鏈上基於資訊回饋困難與前置時間的延遲,造成許多決策者容易做出   重複訂購或臨時取消訂單的決策,而產生需求放大(或縮小)的效果。請問上   述是指哪個問題?[單選]

A. 長鞭效應

正確答案: A

21.26) Which form of testing compares a control page with one that is very different?

B) new concept test

正確答案: B

22.68) Which of the following is an example of an e-commerce first mover that failed?

B) eToys

正確答案: B

23.下列何者不是顧客關係管理的關鍵成功因素?[單選]

C. 上、下游廠商配合度

正確答案: C

24.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]

C.金流

正確答案: C

25.21) Amazon's Associates program is an example of which of the following?

C) affiliate marketing

26.6) A firm's ________ describes how a firm will produce a superior return on invested capital.

B) revenue model

正確答案: B

27.將傳統拍賣方式轉換到網際網路上來進行,此模式稱為?[單選] 回答錯誤

D.Outranet

正確答案: D

28.5. 供應鏈管理的發展流程為以下何者?(單選)

(B) 單一企業階段物流管理階段運籌管理階段供應鏈管理階段

正確答案: B

29.小泰規劃著他與小仙的甜蜜旅行,並且打算在晶華酒店住下並求婚,為了以防萬一,他使用晶華酒店的線上訂房服務,請問晶華酒店提供線上訂房的服務是屬於網路交易市場的哪個角色?

B.基本的電子商務

正確答案: B

30.49) Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

B) ODBC

正確答案: B

31.8) The Internet Layer of TCP/IP is responsible for which of the following?

B) addressing, packaging, and routing messages

正確答案: B

32.ERP」是指?[單選]

A. 企業資源規劃

正確答案: A

33.14) Which of the following did the Internet Advertising Bureau urge advertisers to abandon? 回答錯誤

C) Adobe Flash

正確答案: C

34.Morgan Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選]

C.匯聚人潮

正確答案: C

35.8. 下列何者不受著作權法的保護?(單選)

(B) 中華民國憲法

(C) 學校的試題

(D) 學校的網頁

正確答案: B C D

36.3. 下列哪些是常見的網路犯罪?(複選)

(A) 網路販賣盜版光碟

(B) 網路販賣贓物

(C) 入侵他人網站

正確答案: A B C

37.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

38.3. 有關電子商務的定義,下列哪些錯誤?(複選)

(A) 電子商務就是不用在網路上做生意

(C) 電子商務一定要透過網路線來傳遞

正確答案: A C

39.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

40.6. 有關網路禮儀,下列哪些正確?(複選)

(A) 電腦禮儀的基本原則是「尊重」

(C) 轉載別人的文章時,最好註明出處

(D) 最好取得原作者的同意後再進行轉載

正確答案: A C D

41.C)72) The emergence of mobile, social, and local e-commerce occurred during the Consolidation period of e-commerce.

是非題 (2 ) 2

B.B

正確答案: B

42.84) The information systems discipline spans the technical and behavioral approaches to e-commerce.

是非題 (2 ) 2

A.A

正確答案: A

43.8) A roughly equal percentage of men and women in the United States use the Internet today.

是非題 (2 ) 2

A.A

正確答案: A

44.80) Bluetooth is the primary enabling technology for mobile wallets.

是非題 (2 ) 2

B.B

正確答案: B

45.45) Lead generation marketing firms specialize in inbound marketing.

是非題 (2 ) 2

A.A

正確答案: A

46.39) E-commerce technologies provide a unique, many-to-many model of mass communication.

是非題 (2 ) 2

A.A

正確答案: A

47.73) The current versions of most web browsers no longer support Java applets.

是非題 (2 ) 2

A.A

正確答案: A

48.59) All of the following are methods of improving the processing architecture of a website except:

是非題 (2 ) 2

D) adding web servers.

正確答案: D

49.56) Bluetooth is a high-speed, fixed broadband wireless local area network for commercial and residential use.

是非題 (2 ) 2

B.B

正確答案: B

50.65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

是非題 (2 ) 2

A.A

正確答案: A

1.25. 小仙是個愛網購的女生,每當想要買東西時,總會上愛合購揪團買東西,請問愛合購是屬於何種網路商業模式?[單選]

D.中介平台

正確答案: D

2.24) Which of the following is the best definition of transaction cost?

B) the cost of participating in a market

正確答案: B

3.5. 中華汽車為了提高公司的競爭力而導入一套系統可以建立個人知識平台並與工作管理系統進行結合,經由工作社群網路來建立不同的知識社群,進而發展出團隊的作業模式與規範。請問這套系統是?(單選)

(D) 知識管理

正確答案: D

4.45) Which of the following is not an example of an on-demand service company?

D) Facebook

正確答案: D

5.77) Recency refers to the:

B) time elapsed since the last visit made by a customer.

正確答案: B

6.66) Which of the following was the most popular mobile web browser as of June 2020?

C) Chrome

正確答案: C

7.下列何者非拉式基礎供應鏈的優點?[單選]

B. 可進行成本規劃

正確答案: B

8.26) Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

B) BGP

正確答案: B

9.28) All of the following are "traditional" online marketing tools except:

C) social marketing.

正確答案: C

10.1. 下列何者非企業電子化的主要應用範圍?(單選)

(A) 六個標準差

正確答案: A

11.2. 下列何者是對電子商務的正確認知?[單選]

D.電子商業 (e-Business) 乃是徹底的改變

正確答案: D

12.64) Ruby on Rails is based on which of the following philosophies?

B) CoC

正確答案: B

13.17) Which of the following is the leading cause of data breaches?

C) hackers

正確答案: C

14.23) Which of the following is not a primary source of ad fraud?

D) native advertising that is displayed on a social media site

正確答案: D

15.11) The address used by a browser to identify the location of content on the Web is called:

B) a Uniform Resource Locator.

正確答案: B

16.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]

D.興趣

正確答案: D

17.我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術是下列何者?[單選]

D. 影音串流

正確答案: D

18.有關專利權的敘述,下列何者正確?[單選]

C. 專利權只限於申請的國家,出了國境就不受保護

正確答案: C

19.3) During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

B) Institutional phase

正確答案: B

20.76) Acquisition rate is a measure of the:

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

正確答案: A

21.7. 阿任很想買一台 New iPad,為了以較優惠的價格買到,於是到殺價王和其他消費者競標,在這裡,以唯一最低出價者得標,請問此概念類似下列哪種拍賣模式?(單選)

(D) 荷式拍賣

正確答案: D

22.小香在一家行銷公關公司工作,分析每個不同的人在哪裡按讚、分享哪些   連結,以幫助顧客做出最佳的行銷分案。請問這屬於顧客關係管理的哪個階   段?[單選] 回答錯誤

C. 互動與修改階段

正確答案: C

23.34) E-commerce is available just about everywhere and anytime. This is known as:

C) ubiquity.

正確答案: C

24.18) Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

A) spyware.

正確答案: A

25.9. 統一超商導入銷售時點系統 (POS),藉此系統來即時記錄顧客購買的產品、時間、年齡等資訊,以改善傳統人工記錄的不便,並提供管理者在制定決策時的參考。請問上述是屬於企業電子化帶來的何種效益?(單選)

(A) 流程技術的改革

正確答案: A

26.26) All of the following can be considered examples of the market creator business model except:

D) Twitter.

正確答案: D

27.4) Which of the following is an example of an integrity violation of e-commerce security?

D) An unauthorized person intercepts an online communication and changes its contents.

正確答案: D

28.讓使用者透過網路來通話、訊息傳遞、資訊往來或分享影像的系統,這是指下列何者?[單選]

C. 即時通訊

正確答案: C

29.5) ________ is the ability to ensure that an e-commerce site continues to function as intended.

C) Availability

正確答案: C

30.根據Kalakota & Whinston (1997) 提出電子商務架構的概念,「Java」屬於 哪一種基礎架構?[單選]

D.多媒體內容及網路出版基礎架構

正確答案: D

31.Amazon.com提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一個概念?[單選]

A. 網路交易模式

正確答案: A

32.8. 下列何者不屬於Porter 的產業五力?[單選]

D.電子商務科技

正確答案: D

33.26) Which of the following is not an example of a potentially unwanted program (PUP)?

C) drive-by download

正確答案: C

34.Morgan Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選]

C.匯聚人潮

正確答案: C

35.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

36.8. 下列何者不受著作權法的保護?(單選)

(B) 中華民國憲法

(C) 學校的試題

(D) 學校的網頁

正確答案: B C D

37.3. 下列哪些是常見的網路犯罪?(複選)

(A) 網路販賣盜版光碟

(B) 網路販賣贓物

(C) 入侵他人網站

正確答案: A B C

38.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

39.6. 有關網路禮儀,下列哪些正確?(複選)

(A) 電腦禮儀的基本原則是「尊重」

(C) 轉載別人的文章時,最好註明出處

(D) 最好取得原作者的同意後再進行轉載

正確答案: A C D

40.3. 有關電子商務的定義,下列哪些錯誤?(複選)

(A) 電子商務就是不用在網路上做生意

(C) 電子商務一定要透過網路線來傳遞

正確答案: A C

41.59) Which of the following is the most common protocol for securing a digital channel of communication?

是非題 (2 ) 2

B) TLS

正確答案: B

42.34) Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

是非題 (2 ) 2

A.A

正確答案: A

43.82) Which of the following measures the percentage of times an ad is clicked?

是非題 (2 ) 2

B) CTR

正確答案: B

44.73) The Reinvention period of e-commerce is as much a sociological phenomenon as it is a technological or business phenomenon.

是非題 (2 ) 2

A.A

正確答案: A

45.37) Price transparency refers to the ease with which consumers can find out what merchants pay for products.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

46.81) There is a finite number of Bitcoins that can be created.

是非題 (2 ) 2

A.A

正確答案: A

47.32) Phishing attacks rely on browser parasites.

是非題 (2 ) 2

B.B

正確答案: B

48.61) The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

是非題 (2 ) 2

A.A

正確答案: A

49.52) Dynamic page generation enables price discrimination.

是非題 (2 ) 2

A.A

正確答案: A

50.45) Lead generation marketing firms specialize in inbound marketing.

是非題 (2 ) 2

A.A

正確答案: A

1.48) Which of the following is Google hoping to use to provide Internet access to remote parts of the world?

B) high-altitude balloons

正確答案: B

2.82) Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?

C) mobile first design

正確答案: C

3.「同一時間內,每一公司皆向供應商訂貨,造成某時段需求預測過高,而   其他時段則無需求,使供應商面臨較高的需求變異。」請問這是哪一種訂購方   式?[單選] 回答錯誤

A. 相關訂購

正確答案: A

4.22. 冷門產品的需求量不高,但匯聚多樣的冷門產品所產生之效果會大於傳統熱門產品所產生的效果,這是指?[單選]

B.15

正確答案: B

5.45) All of the following statements about public key cryptography are true except:

B) public key cryptography ensures authentication of the sender.

正確答案: B

6.3) Which element of the business model addresses what a firm provides that other firms do not and cannot?

D) value proposition

正確答案: D

7.根據市場需求預測來訂定生產計畫,請問這是哪種生產方式?[單選]

A. BTS

正確答案: A

8.「所有和Internet有關的行為都必須經過防火牆,所以防火牆可以記錄所    Internet的活動事件。」此為防火牆的哪個功用?[單選]

B. 監視活動

正確答案: B

9.43. 透過iPhone就能夠到App Stores下載軟體,使得每一支iPhone都具有獨特的個人風格,而可依照自己的想法與需求轉變成遊戲機、事務機等,創造出獨特性與特殊性。請問Apple掌握到了網路商業模式的哪種特性?[單選]

A.只要動手架設網站,其他的都會水到渠成

正確答案: A

10.14) Google introduced which of the following changes to its search algorithm to weed out low quality sites from search results?

C) Panda

正確答案: C

11.61) Which of the following may offer its customers value chain management software?

B) e-procurement companies

正確答案: B

12.46) In 2016, the United States gave up control of which of the following organizations involved with Internet governance?

D) IANA

正確答案: D

13.防火牆的設定步驟為?[單選]

A. 開啟防火牆勾選設定值新增例外連結

正確答案: A

14.79) Which of the following measures the ratio of items purchased to product views?

 

A) conversion rate

B

.

B) cart conversion rate

C

.

C) browse-to-buy ratio

D

.

D) view-to-cart ratio

正確答案: C

15.3. amazon.com 提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一個概念?(單選)

(A) 網路交易模式

正確答案: A

16.承阿宏的公司,他還考慮到員工當中會操作電腦的人數,以及要如何安排課   程以培育員工使用新的資訊科技系統。請問這類的問題較接近哪個面向?[   ]

D. 人員面

正確答案: D

17.71) Uber has been criticized for using which of the following?

C) surge pricing

正確答案: C

18.我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術是下列何者?[單選]

D. 影音串流

正確答案: D

19.71) Which of the following is not an element of friction-free commerce? 回答錯誤

D) Unfair competitive advantages are eliminated.

正確答案: D

20.41) The backbone of the Internet is formed by:

B) Tier 1 ISPs.

正確答案: B

21.Yahoo!奇摩與PChome Online的交易模式來看,其屬於電子商務的哪個階段?[單選]

B.發展交易

正確答案: B

22. 將傳統拍賣方式轉換到網際網路上來進行,此模式稱為?[單選]

D.Extranet 是指企業間網?

正確答案: D

23.4) Which of the following is an example of an integrity violation of e-commerce security?

D) An unauthorized person intercepts an online communication and changes its contents.

正確答案: D

24.15) Accessing data without authorization on Dropbox is an example of a:

B) cloud security issue.

正確答案: B

25.1. 下列敘述何者錯誤?(單選)

(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果

正確答案: C

26.70) Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

B) disintermediation

正確答案: B

27.9. 在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)

(A) 駭客

正確答案: A

28.19) Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

D) client/server computing

正確答案: D

29.60) The marketing technique known as ________ involves merchants offering many products for which there is little demand.

A) long tail marketing

正確答案: A

30.8. 博客來網路書店面對需求量不高的冷門書籍,大多是採接單後才向書商訂書,藉此降低本身的庫存成本。請問博客來網路書店是屬於何種供應鏈?(單選)

(B) 拉式基礎的供應鏈

正確答案: B

31.璿璿愛打網路遊戲,常常上遊戲基地的虛擬寶物區與網友們交換裝備。請問遊戲基地虛擬寶物區的出現,是來自虛擬社群互動基礎的哪一項?[單選] 回答錯誤

B.Plurk

正確答案: B

32.28. 網站扮演市場製造者的角色,將買賣雙方聚集起來,並從交易中抽取用,是屬於哪一種收益模式?[單選]

C.經紀模式

正確答案: C

33.42) Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

C) mobile e-commerce

正確答案: C

34.在顧客間或供應商、顧客,或競爭者之間,透過網路進行交易而成的商務行為指的是?[單選]

B.降低傳遞成本

正確答案: B

35.3. 下列哪些是常見的網路犯罪?(複選)

(A) 網路販賣盜版光碟

(B) 網路販賣贓物

(C) 入侵他人網站

正確答案: A B C

36.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

37.3. 有關電子商務的定義,下列哪些錯誤?(複選)

(A) 電子商務就是不用在網路上做生意

(C) 電子商務一定要透過網路線來傳遞

正確答案: A C

38.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

B

.

(B) 著作權

C

.

(C) 專利權

D

.

(D) 商標權

正確答案: B C D

39.8. 下列何者不受著作權法的保護?(單選)

(B) 中華民國憲法

(C) 學校的試題

(D) 學校的網頁

正確答案: B C D

40.6. 有關網路禮儀,下列哪些正確?(複選)

(A) 電腦禮儀的基本原則是「尊重」

(C) 轉載別人的文章時,最好註明出處

(D) 最好取得原作者的同意後再進行轉載

正確答案: A C D

41.47) Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.

是非題 (2 ) 2

A.A

正確答案: A

42.39) E-commerce technologies provide a unique, many-to-many model of mass communication.

是非題 (2 ) 2

A.A

正確答案: A

43.37) FREAK is an example of a software vulnerability.

是非題 (2 ) 2

A.A

正確答案: A

44.28) The term latency refers to a delay that can be experienced in packet-switched networks.

是非題 (2 ) 2

A.A

正確答案: A

45.32) Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.

是非題 (2 ) 2

A.A

正確答案: A

46.32) Phishing attacks rely on browser parasites.

是非題 (2 ) 2

B.B

正確答案: B

47.81) There is a finite number of Bitcoins that can be created.

是非題 (2 ) 2

A.A

正確答案: A

48.57) Tier 1 ISPs provide Internet access to consumers and businesses.

是非題 (2 ) 2

B.B

正確答案: B

49.33) WannaCry is an example of ransomware.

是非題 (2 ) 2

A.A

正確答案: A

50.55) T1 and T3 refer to international telephone standards for digital communication.

是非題 (2 ) 2

A.A

正確答案: A

1.70) Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

B) disintermediation

正確答案: B

2.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]

D.興趣

正確答案: D

3.56) Which of the following statements is not true?

C) A VPN uses a dedicated secure line.

正確答案: C

4.26.  amazon.com 透過網路來銷售,產品選擇範圍廣,同時在倉庫配貨運送,後來更推出網路商城,商家可以在商城開店,就像進駐百貨公司專櫃一樣」,請問上述符合網路商業模式創新的哪個條件?[單選]

C.亮眼的業績表現

正確答案: C

5.4. 下列哪一個屬於資料蒐集技術?(單選)

(C) 電話客服中心

正確答案: C

6.承阿宏的公司,他甚至還想到整個作業流程都必須改變,為防止新、舊系統   整合的問題,更設立幾個檢核點來確保過程沒有偏差。請問這類的問題較接近   哪個面向?[單選]

B. 流程面

正確答案: B

7.在線上以物易物的方式進行交易,在電子商務中屬於何種經營模式?[單選]

D.Peer to People

正確答案: D

8.28) When using multivariate testing, if you wish to test three elements, such as an image, a button, and a piece of text, each with two different versions, how many combinations will you need to test?

D) 8

正確答案: D

9.51) A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

A) firewall

正確答案: A

10.請問企業對企業間電子商務是透過?[單選]

A. Extranet

正確答案: A

11.42) Advantages of dynamic page generation include all of the following except:

D) client-side execution of programming.

正確答案: D

12.67) A ________ refers to a competitive strategy in which firms attempt to achieve lower business process costs.

A) strategy of cost competition

正確答案: A

13.下列何者不是顧客關係管理的關鍵成功因素?[單選]

C. 上、下游廠商配合度

正確答案: C

14.10. 網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關係?(單選)

(C) 網站是否提供線上購物的服務

正確答案: C

15.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]

C.金流

正確答案: C

16.42) Asymmetric key cryptography is also known as:

A) public key cryptography.

正確答案: A

17.請問下列何者非呈現式廣告的概念?[單選]

B. 又稱為關鍵字廣告

正確答案: B

18.10) The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

C) domain name system

正確答案: C

19.15) Which of the following forms of online advertising is expected to grow the most between 2020 and 2024?

D) video

正確答案: D

20.68) Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

A) global reach

正確答案: A

21.52) Which of the following describes the basic web policy of large firms during the Invention period?

D) Maintain a basic, static website depicting the firm's brand.

正確答案: D

22.66) All of the following are website design features that annoy customers except:

D) multi-browser functionality.

正確答案: D

23.30) The NIKEiD program is an example of which of the following marketing techniques?

A) customer co-production

正確答案: A

24.6) Which of the following is the core communications protocol for the Internet?

C) TCP/IP

正確答案: C

25.在設立B to B交易平台的時候,會非常注意市集的風險控管與安全無虞的付款機制,請問這是注意B to B交易平台影響因素的哪一項?[單選] 回答錯誤

D.市場接受度

正確答案: D

26.47) Which of the following is not a concern about IoT?

A) the falling cost of sensors

正確答案: A

27.38) The leading web server software is:

A) Apache.

正確答案: A

28.26) All of the following can be considered examples of the market creator business model except:

D) Twitter.

正確答案: D

29.25) Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?

D) Tracert

正確答案: D

30.65) You could expect to find all of the following services in a web server software package except:

D) an RSS aggregator.

正確答案: D

31.下列何者非數位匯流的概念?[單選]

B. 經由郵局寄送信件

正確答案: B

32.65) What is the first step in developing an e-commerce security plan?

C) Perform a risk assessment.

正確答案: C

33.78) View-to-cart ratio is a measure of the:

B) percentage of views that lead to an add-to-cart action.

正確答案: B

34.下列何者不是電子現金的特性?[單選]

B. 不可轉換性

正確答案: B

35.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

36.8. 下列何者不受著作權法的保護?(單選)

(B) 中華民國憲法

(C) 學校的試題

(D) 學校的網頁

正確答案: B C D

37.3. 有關電子商務的定義,下列哪些錯誤?(複選)

(A) 電子商務就是不用在網路上做生意

(C) 電子商務一定要透過網路線來傳遞

正確答案: A C

38.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

39.6. 有關網路禮儀,下列哪些正確?(複選)

(A) 電腦禮儀的基本原則是「尊重」

(C) 轉載別人的文章時,最好註明出處

(D) 最好取得原作者的同意後再進行轉載

正確答案: A C D

40.3. 下列哪些是常見的網路犯罪?(複選)

 

(A) 網路販賣盜版光碟

B

.

(B) 網路販賣贓物

C

.

(C) 入侵他人網站

正確答案: A B C

41.65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

是非題 (2 ) 2

A.A

正確答案: A

42.83) An HTML5 app is one designed to specifically operate using a mobile device's hardware and operating system.

是非題 (2 ) 2

B.B

正確答案: B

43.35) Slow followers are sometimes more successful than first movers.

是非題 (2 ) 2

A.A

正確答案: A

44.78) The Internet's universal standards have changed industry structure by increasing barriers to entry and decreasing competition within an industry.

是非題 (2 ) 2

B.B

正確答案: B

45.73) The current versions of most web browsers no longer support Java applets.

是非題 (2 ) 2

A.A

正確答案: A

46.33) In general, the annual system maintenance cost will roughly parallel the development cost.

是非題 (2 ) 2

A.A

正確答案: A

47.44) A significant percentage of online ad impressions served are not actually viewed or even viewable.

是非題 (2 ) 2

A.A

正確答案: A

48.59) Which of the following is the most common protocol for securing a digital channel of communication?

是非題 (2 ) 2

B) TLS

正確答案: B

49.78) About 75% of U.S. smart speaker users make voice-based purchases using those devices.

是非題 (2 ) 2

B.B

正確答案: B

50.84) The information systems discipline spans the technical and behavioral approaches to e-commerce.

是非題 (2 ) 2

A.A

正確答案: A

1.65) Which of the following is a characteristic of the Consolidation phase of e-commerce?

C) brand extension and strengthening becomes more important than creating new brands

2.6. 有關電子商務的特性,下列描述何者正確?[單選]

C.全年全天無休

3.45) Which of the following is not an example of an on-demand service company? 回答錯誤

D) Facebook

4.10) Which of the following is not a major business trend in e-commerce in 2020-2021?

B) Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

5.在電子商務的構面中,廠商將產品送至消費者手上的過程,指的是下列何者?[單選] 回答錯誤

D.顧客關係管理

6.忍忍今天想做張卡片給心愛的女友薇薇,開心的在網路上使用Picasa沖印服務,請問這是屬於電子商務的哪個範疇?[單選] 回答錯誤

C.服務電子化

7.1. 透過電腦網路進行購買、銷售、運送、產品、服務交換之過程,我們稱為?(單選)

(B) 電子商務

8.28) Interactivity in the context of e-commerce provides which of the following functionalities?

D) the enabling of two-way communication between consumer and merchant

9.64) Which of the following is a characteristic of the Reinvention phase of e-commerce?

D) expansion of e-commerce to include services as well as goods

10.79) Which of the following is an important societal issue related to e-commerce?

D) intellectual property

11.52) Which of the following describes the basic web policy of large firms during the Invention period?

D) Maintain a basic, static website depicting the firm's brand.

12.34) E-commerce is available just about everywhere and anytime. This is known as:

C) ubiquity.

13.9. amazon.com 透過資料庫以及相關資訊科技的幫助,推出推薦書單的服務,這是屬於何種理論?(單選) 回答錯誤

(D) 個人佔有率

14.50) M-commerce is the type of e-commerce that generates the most revenue.

B.B

15.13) Which of the following statements about the mobile platform is not true?

B) Over 235 million individuals in the United States used tablet computer apps in 2020.

16.14) Which of the following statements about the Web is not true?

A) The Web is the technology upon which the Internet is based.

17.57) All of the following are examples of Web 2.0 sites and applications except:

D) auction sites.

18.9. 在電子商務的構面中,廠商將產品送至消費者手上的過程,是指? [單選]

D.物流

19.一套藉由企業內部網路快速建置及整合公司採購後勤、生產、行銷、人資、財務、研發等部門機能來提升企業作業流程的系統,指的是下列何者?[單選] 回答錯誤

C.C2C

20.46) Which of the following is a platform for B2B e-commerce?

D) Go2Paper

21.16) Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

B) the Web

22.5) Which of the following is an example of e-business?

A) Amazon's inventory control system

23.23) Which of the following features of e-commerce technology allows users to participate in the creation of online content? 回答錯誤

D) social technology

24.6) Which of the following can be considered synonymous with the term e-commerce?

B) digital commerce

25.8) All of the following statements about e-commerce in the United States in 2020 are true except:

A) Social e-commerce generated more revenue than mobile e-commerce.

26.29) The cost incurred by merchants to change product prices (i.e., the costs of reentering prices into computer systems) is referred to as: 

C) Menu costs.

27.根據Kalakota & Whinston (1997) 提出電子商務架構的概念,「Java」屬於 哪一種基礎架構?[單選] 回答錯誤

D.多媒體內容及網路出版基礎架構

28.1) Analysts estimate that by 2024, consumers will be spending around _______ in digital transactions.

D) $1.8 trillion

29.7) Which of the following is not true about the use of apps?

B) Users still spend more time using mobile browsers than they do using mobile apps.

30.阿光不小心弄壞了小仙的耳機,因而上PChome Online找尋賣家,請問PChome Online拍賣是屬於電子商務的哪一類?[單選] 回答錯誤

C.金流

31.就一般而論,在電子商務交易市場中,下列何者交易金額最高? [單選]

C.B2B

32.下列何者不是電子商務的特性?[單選]

C.演算價值

33.4) Which of the following best defines e-commerce?

A) digitally enabled commercial transactions between and among organizations and individuals

34.15) In 2019, there were more than ________ Internet hosts worldwide.

D) 1 billion

35.58) Which of the following is not a characteristic of a perfect competitive market?

D) It is highly regulated.

36.3. 有關電子商務的定義,下列哪些錯誤?(複選)

(A) 電子商務就是不用在網路上做生意

(C) 電子商務一定要透過網路線來傳遞

37.2) It is likely that e-commerce will eventually impact nearly all commerce.

A. A

38.39) E-commerce technologies provide a unique, many-to-many model of mass communication.

A.A

39.74) Price dispersion has been eliminated in e-commerce.

B.B

40.C)72) The emergence of mobile, social, and local e-commerce occurred during the Consolidation period of e-commerce.

B.B

41.73) The Reinvention period of e-commerce is as much a sociological phenomenon as it is a technological or business phenomenon.

A.A

42.35) Ubiquity increases the cognitive energy required to transact in a marketspace.

B.B

43.18) E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers.

A.A

44.19) The Internet has shown similar growth patterns as other electronic technologies of the past.

B.B

45.36) Universal standards make price discovery more costly, slower, and less accurate.

B.B

46.80) E-commerce poses special challenges to methods used in the past to protect intellectual property rights.

A.A

47.38) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

A.A

48.37) Price transparency refers to the ease with which consumers can find out what merchants pay for products.

B.B

49.84) The information systems discipline spans the technical and behavioral approaches to e-commerce.

A.A

50.17) The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.

B.B

---------------------------

---------------------------

1.23) Which of the following features of e-commerce technology allows users to participate in the creation of online content?

D) social technology

2.70) Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

B) disintermediation

3.32) _________ represents the total number of users or customers an e-commerce business can obtain.

C) Reach

4.15) In 2019, there were more than ________ Internet hosts worldwide.

D) 1 billion

5.50) M-commerce is the type of e-commerce that generates the most revenue.

B.B

6.65) Which of the following is a characteristic of the Consolidation phase of e-commerce?

C) brand extension and strengthening becomes more important than creating new brands

7.10) Which of the following is not a major business trend in e-commerce in 2020-2021?

B) Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

8.63) Which of the following best describes the early years of e-commerce?

A) They were a technological success but a mixed business success.

9.阿光不小心弄壞了小仙的耳機,因而上PChome Online找尋賣家,請問PChome Online拍賣是屬於電子商務的哪一類?[單選]

C.金流

10.14. 在電子商務交易中,供應商想降低採購與工程發包成本,使用台塑網的平台來找尋另外一家廠商,這是下列何種型態?[單選]

A.B2B

11.78) Which business application is associated with the technological development of local area networks and client/server computing?

D) workgroup automation (e.g., document sharing)

12.21. 依據梅特卡夫定律(Metcalfe's Law),若網路上只有兩個人,就只有一組對話;當有三個人時,就有三組對話,當四個人時,就有六組對話;當有五個人時,就有十組對話。依此類推,請問當有六個人時,會有幾組對話?[單選] 回答錯誤

B.間接網路外部性

13.6) Which of the following can be considered synonymous with the term e-commerce?

B) digital commerce

14.28) Interactivity in the context of e-commerce provides which of the following functionalities?

D) the enabling of two-way communication between consumer and merchant

15.21) Which of the following is not a unique feature of e-commerce technology?

C) information asymmetry

16.60) Unfair competitive advantages occur when:

A) one competitor has an advantage that others cannot purchase.

17.26) Which of the following features of e-commerce technology is related to the concept of network externalities? 回答錯誤

C) universal standards

18.一套藉由企業內部網路快速建置及整合公司採購後勤、生產、行銷、人資、財務、研發等部門機能來提升企業作業流程的系統,指的是下列何者?[單選]

C.C2C

19.61) The early years of e-commerce were driven by all of the following factors except:

A) an emphasis on exploiting traditional distribution channels.

20.24) Which of the following is the best definition of transaction cost?

B) the cost of participating in a market

21.83) Which of the following statements is not true?

B) Economists take a purely technical approach to e-commerce.

22.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]

C.金流

23.31) Which of the following is a physical place you visit in order to transact?

B) marketplace

24.11) Which of the following is not a major technology trend in e-commerce in 2020-2021?

D) Growth of the Internet of Things slows down.

25.根據Kalakota & Whinston (1997) 提出電子商務架構的概念,「EDI」屬於哪一種基礎架構?[單選]

C.商業媒介收益模式

26.53) All of the following can be considered a precursor to e-commerce except:

A) the development of the smartphone.

27.在電子商務的構面中,廠商將產品送至消費者手上的過程,指的是下列何者?[單選]

D.顧客關係管理

28.16) Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

B) the Web

29.4) Which of the following best defines e-commerce?

A) digitally enabled commercial transactions between and among organizations and individuals

30.在顧客間或供應商、顧客,或競爭者之間,透過網路進行交易而成的商務行為指的是?[單選]

B.降低傳遞成本

31.13) Which of the following statements about the mobile platform is not true?

B) Over 235 million individuals in the United States used tablet computer apps in 2020.

32.59) All of the following were visions of e-commerce expressed during the early years of e-commerce except:

D) fast follower advantage.

33.7) Which of the following is not true about the use of apps?

B) Users still spend more time using mobile browsers than they do using mobile apps.

34.46) Which of the following is a platform for B2B e-commerce?

D) Go2Paper

35.25) The world's online population was estimated to be around ________ in 2020.

B) 4 billion

36.3. 有關電子商務的定義,下列哪些錯誤?(複選)

(A) 電子商務就是不用在網路上做生意

(C) 電子商務一定要透過網路線來傳遞

37.39) E-commerce technologies provide a unique, many-to-many model of mass communication.

A.A

38.17) The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.

B.B

39.84) The information systems discipline spans the technical and behavioral approaches to e-commerce.

A.A

40.73) The Reinvention period of e-commerce is as much a sociological phenomenon as it is a technological or business phenomenon.

A.A

41.37) Price transparency refers to the ease with which consumers can find out what merchants pay for products.

B.B

42.C)72) The emergence of mobile, social, and local e-commerce occurred during the Consolidation period of e-commerce.

B.B

43.2) It is likely that e-commerce will eventually impact nearly all commerce.

A.A

44.80) E-commerce poses special challenges to methods used in the past to protect intellectual property rights.

A.A

45.35) Ubiquity increases the cognitive energy required to transact in a marketspace.

B.B

46.18) E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers.

A.A

47.19) The Internet has shown similar growth patterns as other electronic technologies of the past.

B.B

48.38) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

A.A

49.36) Universal standards make price discovery more costly, slower, and less accurate.

B.B

50.74) Price dispersion has been eliminated in e-commerce.

B.B

-------------------

-------------------

1.45) Which of the following is not an example of an on-demand service company?

D) Facebook

2.12) Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021?

C) Netflix

3.60) Unfair competitive advantages occur when:

A) one competitor has an advantage that others cannot purchase.

4.52) Which of the following describes the basic web policy of large firms during the Invention period?

D) Maintain a basic, static website depicting the firm's brand.

5.4. 國內線上音樂提供者 KKBOX,其有別於一般傳統的實體商店賣 CD,而是在網路上直接付費點播下載,這是屬於電子商務的何種特性?(單選)

(A) 數位化

6.8) All of the following statements about e-commerce in the United States in 2020 are true except:

A) Social e-commerce generated more revenue than mobile e-commerce.

7.70) Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

B) disintermediation

8.31) Which of the following is a physical place you visit in order to transact?

B) marketplace

9.阿光不小心弄壞了小仙的耳機,因而上PChome Online找尋賣家,請問PChome Online拍賣是屬於電子商務的哪一類?[單選]

C.金流

10.69) Which of the following refers to the practice of researching a product online before purchasing it at a physical store?

D) webrooming

11.就一般而論,在電子商務交易市場中,下列何者交易金額最高? [單選]

C.B2B

12.21) Which of the following is not a unique feature of e-commerce technology?

C) information asymmetry

13.28) Interactivity in the context of e-commerce provides which of the following functionalities?

D) the enabling of two-way communication between consumer and merchant

14.24) Which of the following is the best definition of transaction cost?

B) the cost of participating in a market

15.83) Which of the following statements is not true?

B) Economists take a purely technical approach to e-commerce.

16.15) In 2019, there were more than ________ Internet hosts worldwide.

D) 1 billion

17.5. 電子商務交易中,供應商想降低採購與工程發包成本,便到網路上的平台找尋另外一家廠商,此為下列何種型態?(單選)

(A) B2B

18.21. 依據梅特卡夫定律(Metcalfe's Law),若網路上只有兩個人,就只有一組對話;當有三個人時,就有三組對話,當四個人時,就有六組對話;當有五個人時,就有十組對話。依此類推,請問當有六個人時,會有幾組對話?[單選]

B.間接網路外部性

19.27) Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?

C) The larger the audience reached, the less rich the message.

20.59) All of the following were visions of e-commerce expressed during the early years of e-commerce except:

D) fast follower advantage.

21.58) Which of the following is not a characteristic of a perfect competitive market?

D) It is highly regulated.

22.65) Which of the following is a characteristic of the Consolidation phase of e-commerce?

C) brand extension and strengthening becomes more important than creating new brands

23.78) Which business application is associated with the technological development of local area networks and client/server computing?

D) workgroup automation (e.g., document sharing)

24.29) The cost incurred by merchants to change product prices (i.e., the costs of reentering prices into computer systems) is referred to as: 

C) Menu costs.

25.53) All of the following can be considered a precursor to e-commerce except:

A) the development of the smartphone.

26.下列何者不是電子商務的特性?[單選]

C.演算價值

27.14) Which of the following statements about the Web is not true?

A) The Web is the technology upon which the Internet is based.

28.77) Above all, e-commerce is a ________ phenomenon.

A) technology driven

29.阿騰最近想換一台電腦,開始上MOBILE01參考許多網友的意見來幫他做最好的決定,這是屬於電子商務的何種特性?[單選] 回答錯誤

A.豐富性

30.一套藉由企業內部網路快速建置及整合公司採購後勤、生產、行銷、人資、財務、研發等部門機能來提升企業作業流程的系統,指的是下列何者?[單選]

C.C2C

31.68) Which of the following is an example of an e-commerce first mover that failed?

B) eToys

32.16) Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

B) the Web

33.22) Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

A) richness

34.阿達今天到星巴克消費得很開心,回家立刻上網加入星巴克Facebook粉絲團並推薦了很多朋友加入,請問這屬於電子商務的哪個範疇?[單選] 回答錯誤

D.演算價值

35.消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬於電子商務構面中的哪一種?[單選] 回答錯誤

C.個人化

36.3. 有關電子商務的定義,下列哪些錯誤?(複選)

(A) 電子商務就是不用在網路上做生意

(C) 電子商務一定要透過網路線來傳遞

37.73) The Reinvention period of e-commerce is as much a sociological phenomenon as it is a technological or business phenomenon.

A.A

38.37) Price transparency refers to the ease with which consumers can find out what merchants pay for products.

B.B

39.36) Universal standards make price discovery more costly, slower, and less accurate.

B.B

40.74) Price dispersion has been eliminated in e-commerce.

B.B

41.38) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

A.A

42.17) The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.

B.B

43.19) The Internet has shown similar growth patterns as other electronic technologies of the past.

B.B

44.2) It is likely that e-commerce will eventually impact nearly all commerce.

是非題 (2 ) 2

A.A

45.C)72) The emergence of mobile, social, and local e-commerce occurred during the Consolidation period of e-commerce.

B.B

46.39) E-commerce technologies provide a unique, many-to-many model of mass communication.

A.A

47.80) E-commerce poses special challenges to methods used in the past to protect intellectual property rights.

A.A

48.84) The information systems discipline spans the technical and behavioral approaches to e-commerce.

A.A

49.18) E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers.

A.A

50.35) Ubiquity increases the cognitive energy required to transact in a marketspace.

B.B

-----------------

-----------------

1.就一般而論,在電子商務交易市場中,下列何者交易金額最高? [單選]

C.B2B

2.21. 依據梅特卡夫定律(Metcalfe's Law),若網路上只有兩個人,就只有一組對話;當有三個人時,就有三組對話,當四個人時,就有六組對話;當有五個人時,就有十組對話。依此類推,請問當有六個人時,會有幾組對話?[單選]

B.間接網路外部性

3.68) Which of the following is an example of an e-commerce first mover that failed?

B) eToys

4.7. 美兆健康管理中心在進行健康檢查前會寄送生活習慣檢查問卷表給即將前來健檢的顧客,以供往後分析顧客健康狀況之用,這屬於下列何種概念?(單選)

(B) 顧客關係管理

5.21) Which of the following is not a unique feature of e-commerce technology?

C) information asymmetry

6.阿光不小心弄壞了小仙的耳機,因而上PChome Online找尋賣家,請問PChome Online拍賣是屬於電子商務的哪一類?[單選]

C.金流

7.78) Which business application is associated with the technological development of local area networks and client/server computing?

D) workgroup automation (e.g., document sharing)

8.1. 透過電腦網路進行購買、銷售、運送、產品、服務交換之過程,我們稱為?(單選)

(B) 電子商務

9.58) Which of the following is not a characteristic of a perfect competitive market?

D) It is highly regulated.

10.一套藉由企業內部網路快速建置及整合公司採購後勤、生產、行銷、人資、財務、研發等部門機能來提升企業作業流程的系統,指的是下列何者?[單選]

C.C2C

11.12) Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021?

C) Netflix

12.42) Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

C) mobile e-commerce

13.29) The cost incurred by merchants to change product prices (i.e., the costs of reentering prices into computer systems) is referred to as: 

C) Menu costs.

14.在電子商務的構面中,廠商將產品送至消費者手上的過程,指的是下列何者?[單選]

D.顧客關係管理

15.44) Business-to-consumer (B2C) e-commerce in the United States:

A) grew at double-digit rates between 2010 and 2020.

16.64) Which of the following is a characteristic of the Reinvention phase of e-commerce?

D) expansion of e-commerce to include services as well as goods

17.54) ________ was the first truly large-scale digitally enabled transaction system in the B2C arena.

C) The French Minitel

18.48) All of the following are platforms for social e-commerce except:

C) Y Combinator.

19.62) The early years of e-commerce are considered:

C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

20.70) Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

B) disintermediation

21.27) Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?

C) The larger the audience reached, the less rich the message.

22.33) Which of the following refers to the complexity and content of a message?

A) richness

23.31) Which of the following is a physical place you visit in order to transact?

B) marketplace

24.23) Which of the following features of e-commerce technology allows users to participate in the creation of online content?

D) social technology

25.9. amazon.com 透過資料庫以及相關資訊科技的幫助,推出推薦書單的服務,這是屬於何種理論?(單選)

(D) 個人佔有率

26.59) All of the following were visions of e-commerce expressed during the early years of e-commerce except:

D) fast follower advantage.

27.根據Kalakota & Whinston (1997) 提出電子商務架構的概念,「Java」屬於 哪一種基礎架構?[單選]

D.多媒體內容及網路出版基礎架構

28.9) In 2020, about ________ of Internet users in the United States accessed the Internet solely using a mobile device.

B) 21%

29.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]

C.金流

30.8. 電子商務可藉由許多的媒體與傳播管道與消費者進行溝通,以便更即時的獲得消費者的需求與購買資訊。請問這是屬於電子商務的哪個特性?[單選]

B.快速化

31.9. 在電子商務的構面中,廠商將產品送至消費者手上的過程,是指? [單選]

D.物流

32.4. 國內線上音樂提供者 KKBOX,其有別於一般傳統的實體商店賣 CD,而是在網路上直接付費點播下載,這是屬於電子商務的何種特性?(單選)

(A) 數位化

33.52) Which of the following describes the basic web policy of large firms during the Invention period?

D) Maintain a basic, static website depicting the firm's brand.

34.57) All of the following are examples of Web 2.0 sites and applications except:

D) auction sites.

35.16) Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

B.B) the Web

36.3. 有關電子商務的定義,下列哪些錯誤?(複選)

(A) 電子商務就是不用在網路上做生意

(C) 電子商務一定要透過網路線來傳遞

37.C)72) The emergence of mobile, social, and local e-commerce occurred during the Consolidation period of e-commerce.

B.B

38.38) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

A.A

39.37) Price transparency refers to the ease with which consumers can find out what merchants pay for products.

B.B

40.2) It is likely that e-commerce will eventually impact nearly all commerce.

A.A

41.84) The information systems discipline spans the technical and behavioral approaches to e-commerce.

A.A

42.19) The Internet has shown similar growth patterns as other electronic technologies of the past.

B.B

43.39) E-commerce technologies provide a unique, many-to-many model of mass communication.

A.A

44.73) The Reinvention period of e-commerce is as much a sociological phenomenon as it is a technological or business phenomenon.

A.A

45.80) E-commerce poses special challenges to methods used in the past to protect intellectual property rights.

A.A

46.74) Price dispersion has been eliminated in e-commerce.

B.B

47.17) The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.

B.B

48.18) E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers.

A.A

49.36) Universal standards make price discovery more costly, slower, and less accurate.

B.B

50.35) Ubiquity increases the cognitive energy required to transact in a marketspace.

B.B

---------

---------

What refers to the complexity and content of a message?

Richness

(T/F) Price dispersion has been eliminated in e-commerce.

False

What is not a platform for social e-commerce?

Y Combinator

What is NOT true regarding e-commerce today?

The market middlemen disappeared.

What best defines e-commerce?

Digitally enabled commercial transactions between and among organizations and individuals

What is not a major technology trend in e-commerce in 2020-2021?

Growth of the Internet of Things slows down.

What is a platform for B2B e-commerce?

Go2Paper

(T/F) Price transparency refers to the ease with which consumers can find out what merchants pay for products.

False

Analysts estimate that by 2024, consumers will be spending around ________ in digital transactions.

$1.8 trillion

Which of the following statements is not true? (1)

Overall transaction costs have dropped dramatically.

Which of the following statements is not true? (2)

Economists take a purely technical approach to e-commerce.

What was NOT a visions of e-commerce expressed during the early years of e-commerce.

Fast Follower Advantage

________ represents the total number of users or customers an e-commerce business can obtain.

Reach

The early years of e-commerce wasn't driven by:

An emphasis on exploiting traditional distribution channels.

(T/F) Universal standards make price discovery more costly, slower, and less accurate.

False

(T/F) M-commerce is the type of e-commerce that generates the most revenue.

False

________ was the first truly large-scale digitally enabled transaction system in the B2C arena.

The French Minitel

What statement is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?

The larger the audience reached, the less rich the message.

What is NOT a characteristic of a perfect competitive market?

It is highly regulated.

What is NOT an example of an on-demand service company?

Facebook

(T/F) The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.

False

What is NOT a major business trend in e-commerce in 2020-2021?

Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

What is a characteristic of the Consolidation phase of e-commerce?

Brand extension and strengthening becomes more important than creating new brands.

What is a feature of e-commerce technology that allows users to participate in the creation of online content?

Social Technology

(T/F) E-commerce poses special challenges to methods used in the past to protect intellectual property rights.

True

It is estimated that by 2024, B2B e-commerce will generate ________ in revenues.

$9.8 trillion

What canNOT be considered a precursor to e-commerce?

The development of the smartphone.

What best describes the early years of e-commerce?

They were a technological success but a mixed business success.

What is a characteristic of the Reinvention phase of e-commerce?

Expansion of e-commerce to include services as well as goods.

E-commerce is available just about everywhere and anytime. This is known as:

Ubiquity.

The text identifies which year as the year e-commerce began?

1995.

(T/F) The emergence of mobile, social, and local e-commerce occurred during the Consolidation period of e-commerce.

False

What feature of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

Richness

What is an example of e-business?

Amazon's inventory control system.

What is not true about the use of apps?

Users still spend more time using mobile browsers than they do using mobile apps.

What is NOT an example of Web 2.0 sites and applications?

Auction sites.

What refers to any disparity in relevant market information among parties in a transaction?

Information Assymetry

Which company has not been the subject of concern about its increasing market dominance in 2020-2021?

Netflix

(T/F) It is likely that e-commerce will eventually impact nearly all commerce.

True

What term can be considered synonymous with the term e-commerce?

Digital commerce.

What term refers to the practice of researching a product online before purchasing it at a physical store?

Webrooming

The cost incurred by merchants to change product prices (i.e., the costs of reentering prices into computer systems) is referred to as:

Menu Costs.

What business application is associated with the technological development of local area networks and client/server computing?

Workgroup Automation (e.g., document sharing).

What is a physical place you visit in order to transact called?

Marketplace

In 2019, there were more than ________ Internet hosts worldwide.

1 billion.

What describes the basic web policy of large firms during the Invention period?

Maintain a basic, static website depicting the firm's brand.

In 2020, about ________ of Internet users in the United States accessed the Internet solely using a mobile device.

21%

What features of e-commerce technology is related to the concept of network externalities?

Universal Standards.

What is an important societal issue related to e-commerce?

Intellectual Property.

Above all, e-commerce is a ________ phenomenon.

Technology driven.

What is NOT a correct statement about e-commerce in the United States in 2020?

Social e-commerce generated more revenue than mobile e-commerce.

What is the best definition of transaction cost?

The cost of participating in a market.

Unfair competitive advantages occur when:

One competitor has an advantage that others cannot purchase.

(T/F) The Internet has shown similar growth patterns as other electronic technologies of the past.

False

What is a characteristic of e-commerce during the Invention period?

Disintermediation.

(T/F) E-commerce technologies provide a unique, many-to-many model of mass communication.

True

What is NOT a platform for C2C e-commerce.

Walmart.

Business-to-consumer (B2C) e-commerce in the United States:

Grew at double-digit rates between 2010 and 2020.

What is an example of an e-commerce first mover that failed?

eToys.

(T/F) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

True

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

Mobile e-commerce (aka: M-commerce).

What is a leading platform for social e-commerce?

Facebook.

(T/F) Ubiquity increases the cognitive energy required to transact in a marketspace.

False.

What was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

the Web.

What is NOT a correct statement about the Web?

The Web is the technology upon which the Internet is based.

The early years of e-commerce are considered:

A stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

The world's ONLINE population was estimated to be around ________ in 2020.

4 billion.

Interactivity in the context of e-commerce provides what functionality?

The enabling of two-way communication between consumer and merchant

(T/F) The Reinvention period of e-commerce is as much a sociological phenomenon as it is a technological or business phenomenon.

True.

What is not a unique feature of e-commerce technology?

Information Asymmetry.

(T/F) E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers.

True.

What is NOT a true statement about the mobile platform?

Over 235 million individuals in the United States used tablet computer apps in 2020.

What is NOT an element of friction-free commerce?

Transaction costs are high.

(T/F) The information systems discipline spans the technical and behavioral approaches to e-commerce.

True.

What refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

Disintermediation.

E-commerce can be defined as:

A) digitally enabled commercial transactions between and among organizations and individuals.

Which of the following is an example of e-business?

A) Amazon's inventory control system

Which of the following can be considered synonymous with the term e-commerce?

B) digital commerce

Which of the following is not a unique feature of e-commerce technology?

C) information asymmetry

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

A) richness

Which of the following features of e-commerce technology allows users to participate in the creation of online content?

D) social technology

Which of the following is the best definition of transaction cost?

B) the cost of participating in a market

The world's online population was estimated to be around ________ in 2018.

B) 3.6 billion

Which of the following features of e-commerce technology is related to the concept of network externalities?

C) universal standards

Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?

C) The larger the audience reached, the less rich the message.

Interactivity in the context of e-commerce provides which of the following functionalities?

D) the enabling of two-way communication between consumer and merchant

The costs incurred by merchants in having to change product prices (such as the costs of reentering prices into computer systems) are referred to as which of the following?

C) menu costs

Which of the following refers to any disparity in relevant market information among parties in a transaction?

A) information asymmetry

Which of the following is a physical place you visit in order to transact?

B) marketplace

The total number of users or customers an e-commerce business can obtain is a measure of which of the following?

C) reach

Which of the following refers to the complexity and content of a message?

A) richness

E-commerce is available just about everywhere and anytime. This is known as:

C) ubiquity.

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

C) mobile e-commerce

Which of the following is a leading platform for social e-commerce?

D) Facebook

Business-to-consumer (B2C) e-commerce in the United States:

A) grew at double-digit rates between 2010 and 2018.

Which of the following is not true about the use of apps?

B) Users still spend less time using apps than they do using desktops or mobile websites.

Which of the following is an example of an on-demand service company?

B) Airbnb

Which of the following is a platform for B2B e-commerce?

D) Go2Paper

All of the following are platforms for C2C e-commerce except:

A) Walmart

All of the following are examples of social networks except:

C) Y Combinator.

A) social e-commerce generated more revenue than mobile e-commerce.

All of the following statements about e-commerce in the United States in 2018 are true except:

A) social e-commerce generated more revenue than mobile e-commerce.

B) mobile advertising accounted for over 70% of all digital advertising spending.

C) on-demand service firms fueled the growth of local e-commerce.

D) growth rates for retail e-commerce were higher in the Middle East than in the United States.

B) 16%

In 2018, about ________ of Americans accessed the Internet solely via a mobile device.

A) 8%

B) 16%

C) 28%

D) 34%

B) Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

Which of the following is not a major business trend in e-commerce in 2018-2019?

A) Mobile e-commerce continues to grow.

B) Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

C) On-demand service companies garner multibillion-dollar valuations.

D) Social e-commerce continues to grow.

D) Growth of the Internet of Things slows down.

Which of the following is not a major technology trend in e-commerce in 2018-2019?

A) Mobile messaging services are now used by almost two-thirds of smartphone users.

B) Firms are turning to business analytics to make sense out of big data.

C) Smart speakers provide an additional platform for e-commerce.

D) Growth of the Internet of Things slows down.

C) concerns about the U.S. Supreme Court ruling that online businesses do not need to collect state sales tax.

All of the following are major social trends in e-commerce in 2018-2019 except for:

A) concerns about the flood of temporary, poorly paid jobs without benefits being generated by on-demand service companies.

B) concerns over commercial and governmental privacy invasion.

C) concerns about the U.S. Supreme Court ruling that online businesses do not need to collect state sales tax.

D) concerns about the increasing market dominance of Facebook, Amazon, and Google.

B) Over 220 Americans used tablet computer apps in 2018.

Which of the following statements about the mobile platform is not true?

A) Over 91% of Americans used a mobile device to access the Internet at least some of the time in 2018.

B) Over 220 Americans used tablet computer apps in 2018.

C) M-commerce purchases were expected to reach almost $280 billion in 2018.

D) The time U.S. adults spend using mobile apps accounts for over 60% of total digital minutes spent.

D) Maintain a basic, static website depicting the firm's brand.

Which of the following describes the basic web policy of large firms during the Invention period?

A) Integrate social networks and the mobile platform with website marketing.

B) Emphasize the necessity for the Web to generate profits.

C) Use the Web to sell complex goods and services online.

D) Maintain a basic, static website depicting the firm's brand.

D) $7.3 trillion.

It is estimated that by 2022, the size of the B2B market will reach:

A) $730 million.

B) $7.3 billion.

C) $730 billion.

D) $7.3 trillion.

A) The Web is the technology upon which the Internet is based.

Which of the following statements about the Web is not true?

A) The Web is the technology upon which the Internet is based.

B) The Web was the original "killer app."

C) The Web provides access to pages written in Hypertext Markup Language.

D) The Web is both a communications infrastructure and an information storage system.

D) 1 billion

In 2018, there were more than ________ Internet hosts.

A) 1 million

B) 10 million

C) 100 million

D) 1 billion

A) the development of the smartphone.

All of the following can be considered a precursor to e-commerce except:

A) the development of the smartphone.

B) Baxter Healthcare's PC-based remote order entry system.

C) the French Minitel.

D) the development of Electronic Data Interchange standards.

C) The French Minitel

________ was the first truly large-scale digitally enabled transaction system in the B2C arena.

A) Telex

B) The Baxter Healthcare system

C) The French Minitel

D) Eelectronic Data Interchange (EDI)

C) 1995

In which year can e-commerce be said to have begun?

A) 1983

B) 1985

C) 1995

D) 2001

B) inability to retain users.

All of the following are issues facing Pinterest except:

A) copyright infringement.

B) inability to retain users.

C) spam.

D) scams.

C) disintermediation

Which of the following is a characteristic of e-commerce during the Invention period?

A) mobile technology

B) earnings and profit emphasis

C) disintermediation

D) extensive government surveillance

D) auction sites.

All of the following are examples of Web 2.0 sites and applications except:

A) photo-sharing sites.

B) blogs.

C) wikis.

D) auction sites.

D) It is highly regulated.

Which of the following is not a characteristic of a perfect competitive market?

A) Price, cost, and quality information are equally distributed.

B) A nearly infinite set of suppliers compete against one another.

C) Customers have access to all relevant information worldwide.

D) It is highly regulated.

D) fast follower advantage.

All of the following were visions of e-commerce expressed during the early years of e-commerce except:

A) a nearly perfect information marketspace.

B) friction-free commerce.

C) disintermediation.

D) fast follower advantage.

A) one competitor has an advantage that others cannot purchase.

Unfair competitive advantages occur when:

A) one competitor has an advantage that others cannot purchase.

B) market middlemen are displaced.

C) information is equally distributed and transaction costs are low.

D) firms are able to gather monopoly profits.

A) an emphasis on exploiting traditional distribution channels.

The early years of e-commerce were driven by all of the following factors except:

A) an emphasis on exploiting traditional distribution channels.

B) a huge infusion of venture capital funds.

C) an emphasis on quickly achieving very high market visibility.

D) visions of profiting from new technology.

C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

The early years of e-commerce are considered:

A) the most promising time in history for the successful implementation of first mover advantages.

B) an economist's dream come true, where for a brief time, consumers had access to all relevant market information and transaction costs plummeted.

C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

D) a dramatic business success as 85% of dot-coms formed since 1995 became flourishing businesses.

A) They were a technological success but a mixed business success.

Which of the following best describes the early years of e-commerce?

A) They were a technological success but a mixed business success.

B) They were a technological success but a business failure.

C) They were a technological failure but a business success.

D) They were a mixed technological and business success.

D) expansion of e-commerce to include services as well as goods

Which of the following is a characteristic of the Reinvention phase of e-commerce?

A) massive proliferation of dot-com start-ups

B) widespread adoption of broadband networks

C) rapid growth of search engine advertising

D) expansion of e-commerce to include services as well as goods

C) brand extension and strengthening becomes more important than creating new brands

Which of the following is a characteristic of the Consolidation phase of e-commerce?

A) predominance of pure online strategies

B) emphasis on revenue growth versus profits

C) brand extension and strengthening becomes more important than creating new brands

D) shift to a technology-driven approach

D) The market middlemen disappeared.

Which of the following is not true regarding e-commerce today?

A) Economists' visions of a friction-free market have not been realized.

B) Consumers are less price-sensitive than expected.

C) There remains considerable persistent price dispersion.

D) The market middlemen disappeared.

C) Overall transaction costs have dropped dramatically.

Which of the following statements is not true?

A) Information asymmetries are continually being introduced by merchants and marketers.

B) Intermediaries have not disappeared.

C) Overall transaction costs have dropped dramatically.

D) Brands remain very important in e-commerce.

B) eToys

Which of the following is an example of an e-commerce first mover that failed?

A) Etsy

B) eToys

C) eBay

D) E*Trade

D) webrooming

Which of the following refers to the practice of researching a product online before purchasing it at a physical store?

A) zooming

B) grazing

C) showrooming

D) webrooming

B) The Web

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

A) e-commerce

B) The Web

C) social networks

D) mobile apps

B) disintermediation

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

A) network effect

B) disintermediation

C) friction-free commerce

D) first mover advantage

A) technology driven

Above all, e-commerce is a ________ phenomenon.

A) technology driven

B) finance-driven

C) sociological

D) government-driven

D) workgroup automation (e.g., document sharing)

Which business application is associated with the technological development of local area networks and client/server computing?

A) transaction automation (e.g., payroll)

B) desktop automation (e.g., word processing)

C) industrial system automation (e.g., supply chain management)

D) workgroup automation (e.g., document sharing)

D) intellectual property

Which of the following is an important societal issue related to e-commerce?

A) consumer behavior

B) value webs

C) cloud computing

D) intellectual property

B) Economists take a purely technical approach to e-commerce.

Which of the following statements is not true?

A) No single academic perspective dominates research about e-commerce.

B) Economists take a purely technical approach to e-commerce.

C) There are two primary approaches to e-commerce: behavioral and technical.

D) Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.

Which of the following is an example of C2C e-commerce?

craiglist

All of the following are examples of Web 2.0 sites and applications except:

auction sites

E-commerce can be defined as:

the use of the Internet, the Web, and mobile apps to transact business.

Interactivity in the context of e-commerce provides which of the following functionalities?

the enabling of two-way communication between consumer and merchant

Which of the following is an example of an e-commerce first mover that failed?

eToys

Which of the following is not a unique feature of e-commerce technology?

info asymmetry

Which of the following is not a characteristic of a perfect competitive market?

It's highly regulated

Which of the following is an example of an on-demand service company?

Airbnb

The early years of e-commerce are considered:

a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

Which of the following statements about e-commerce, in the United States in 2017, is not true?

Social e-commerce generates more revenue than mobile e-commerce

Which of the following is the best definition of transaction cost?

the cost of participating in a market

All of the following were visions of e-commerce expressed during the early years of e-commerce except:

fast follower advantage

In 2017, almost ________ of Americans only used a mobile device to access the Internet.

15%

Which of the following is not a major technology trend in e-commerce in 2017-2018?

Mobile messaging becomes popular with users

Which of the following best describes the early years of e-commerce?

They were a technological success but a mixed business success

Which of the following describes the basic web policy of large firms during the Invention period?

Maintain a basic, static Website.

Which of the following refers to any disparity in relevant market information among parties in a transaction?

info asymmetry

The world's online population was estimated to be around ________ in 2017.

3.5 billion

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

The Web

Above all, e-commerce is a ________ phenomenon.

technology driven

Which of the following statements about the mobile platform is not true?

Size of the mobile app audience greatly exceeds that of mobile web audience

Which of the following is one of the three primary societal issues related to e-commerce?

intellectual property

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

richness

許多人利用網路虛擬世界達成現實世界無法達成的目標,這是屬於宅經濟中

的何種特色?(單選)

(D) 快速消費

11. 關電子商務為以下何種過程?

(A) 透過網際網路進行購買、銷售或交換產品

15. E-commerce is available just about everywhere and anytime. This is known as

________.

(C) ubiquity

16. E-commerce can be defined as:

(A) the use of the Internet, the Web, and mobile apps to transact business.

17. Which of the following is an example of e-business?

(A) Amazon's inventory control system

19. Which of the following is not a unique feature of e-commerce technology?

(C) information asymmetry

20. Which of the following is an example of social e-commerce?

(D) Facebook

A ________ specifically details how you plan to find customers and to sell your product.

market strategy

Which of the following companies uses a transaction fee revenue model?

E*Trade

Which of the following refers to any disparity in relevant market information among parties in a transaction?

information asymmetry

Which of the following is not considered a portal?

Amazon

Which of the following is a leading platform for social e-commerce?

Facebook

E-commerce is available just about everywhere and anytime. This is known as:

ubiquity

Which element of the business model refers to the presence of substitute products in the market?

competitive environment

Slow followers are sometimes more successful than first movers.

true

All of the following primarily use an advertising revenue model except:

Walmart

A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n):

angel investor

In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

market creator

The term e-commerce refers to the digital enabling of business processes both inside and outside the firm.

false

Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

freemium strategy

Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

true

Information asymmetries enable some firms to have an edge over others.

true

M-commerce is the type of e-commerce that generates the most revenue.

false

Which of the following is an unfair competitive advantage?

brand name

What is the primary revenue model for an e-distributor?

sales

Which type of investor typically becomes interested in a startup company after it has begun generating revenue?

venture capital investors

Which of the following refers to the practice of researching a product online before purchasing it at a physical store?

webrooming

________ and ________ are typically the most easily identifiable aspects of a company's business model.

Value proposition; revenue model

Which of the following does not use a subscription revenue model?

Twitter

Which of the following is a physical place you visit in order to transact?

marketplace

Which element of the business model addresses what a firm provides that other firms do not and cannot?

value proposition

Which of the following is another name for a revenue model?

financial model

In the subscription revenue model, a company primarily generates income from the display of ads.

false

Which of the following refers to the complexity and content of a message?

richness

All of the following are platforms for C2C e-commerce except:

Walmart

Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

incubators

A perfect market is one in which:

there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production

________ represents the total number of users or customers an e-commerce business can obtain.

reach

Which of the following are Amazon's primary value propositions?

selection and convenience

Which of the following can be considered synonymous with the term e-commerce?

digital commerce

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

mobile ecommerce

The financial services, travel services, and job placement services industries typically use the ________ business model.

transaction broker

Which of the following features of e-commerce technology allows users to participate in the creation of online content?

social technology

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

richness

Which of the following statements about the Web is not true?

The Web is the technology upon which the Internet is based.

Grainger is an example of which of the following business models?

e-distributor

第一章     電子商務的基本概念

1(B) 透過電腦網路來進行購買、銷售、運送、產品、服務交換之過程我們稱為?

        A.網路行銷         B.電子商務

        C.服務電子化     D.網路交易

2(D) 在顧客間、或供應商、顧客、或競爭者之間,透過網路進行交易而成的商務行為是指?

        A.網路行銷         B.數位內容

        C.服務電子化     C.電子商務

3(C) 下列何者不是電子商務的特性?

        A.便利性             B.全球化

        C.技術性             C.互動化

4(B) 維基百科是由網路使用者來決定其內容,這是屬於電子商務的何種特性?

        A.豐富性             B.互動化

        C.社群化             C.創新化

5(A) 國內線上音樂提供者KKBOX,有別於一般傳統的實體商店賣CD而在網路上直接付費點            播下載,這是屬於電子商務的何種特性?

         A.數位化           B.互動化

         C.標準化           D.創新化

6(A) 阿騰最近想換一臺電腦,開始上MOBILE01參考許多網有的意見,來幫他做最好的決                定,這是屬於電子商務的何種特性?

         A.社群化           B.快速化

         C.個人化           D.豐富性

7(C) 消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬於電子商務           構面中的哪一種?

         A.商流                B.物流

         C.金流                D.資訊流

8(C) 阿光不小心弄壞了小仙的耳機,因而上Pchome Online找尋賣家,請問Pchome Online             賣,是屬於電子商務的哪一類?

         A.B2B                B.B2C

         C.C2C                D.B2B2C

9(D) 在電子商務的構面中,「廠商將產品送至消費者手上的過程」,指的是下列何者?

         A.金流               B.設計流

         C.商流               D.物流

10(ABCD) 有關於電子商務,下列的敘述哪些正確?「復選」

        A.應用科技來達成企業交易及工作流程的自動化

        B.為因應公司、消費者、及管理階層的需求的工具,以便降低成本、提高品質並加速服              

        C.提供在網際網路上產品與資訊買賣以及其他線上服務的能力

        D.透過電話及電腦網路等通訊媒介來傳送資訊、產品、服務及付款

11(C) 每天,透過Facebook可以看到朋友轉發的訊息,自己也可以轉發出去,這屬於電子商務            的哪個效益?

        A.創造新商機       B.增加就業機會

        C.快速傳播資訊   D.減少回復時間   

第二章    電子商務的策略發展與商業模式

1(C) 在策略定位中,Michael Porter的價直鏈分析,是屬於哪一種分析?

         A.任務環境              B.科技環境

         C.企業內部環境      D.政治環境

2(C) 下列何者不是電子商務發展的定位時考慮到的評估因素?

         A.企業目標             B.市場分析

         C.價直鏈                 D.風險探究

3(B) 安安是個忙碌的上班族,常常沒有時間到實體店面去買衣服,只好回加上AWASEBBA          網站,在這裡她可以選擇自己的身材型態,透過虛擬人物試穿來感覺自己是不是適合該           服飾,請問AWASEBA的策略方向是屬於何種營運模式?

        A.現有營運模式      B.創新營運模式

        C.網路營運模式      D.修改營運模式

4(D) 企業在進行產品或是服務運作的過程時,常會注意到:企業的關鍵資源、對顧客的價直           主張、企業的關鍵流程、利潤公式,請問這些問題是屬於?

         A.電子商務的本質             B.電子商務的特色

         C.電子商務的經營尺度     D.商務模式的概念

5(B) 阿傑是個Apple的重度使用者,每天都會逛AppleApp Store搜尋最新的運用程式,請問           Apple Store 豐富的數位化內容,是屬於網路商業模式的哪種特性?

        A.服務面                 B.核心面

        C.策略面                 C.客訴面

6(D) 小仙是個愛網購的女生,每當想要買東西時,總會上愛合購,揪團買東西,請問愛合                購,是屬於何種網路商業模式?

         A.虛擬商城            B.線上廣告

         C.資訊分享            D.中介平臺

7(D) 下列何者非網路商業模式創新的條件?

          A.新的產品或服務        B.新的構成要素

          C.亮眼的業績表現        D.豐富的網站呈現

8(A) 請問:「Google提供搜索服務,透過關鍵字可以找到需要內容資訊、商家或產品」,符           合網路商業模式創新的哪個條件?

         A.新的產品或服務           B.新的構成要素

         C.亮眼的業績表現           D.豐富的網站呈現

9(B) 請問:「Amazon透過網路來銷售,產品選擇範圍廣,同時在倉庫配貨運送,後來更推出         網路商城,商家可以在商城開店,就像進駐百貨公司專櫃一樣」,符合網路商業模式創           新的哪個條件?

        A.新的產品或服務             B.新的構成要素

        C.亮眼的業績表現             D.豐富的網站呈現

10(ABCD) 請問下列哪些屬於網路商業創新模式的類型?

        A.新的產品或服務             B.新的構成要素

        C.亮眼的業績表現             D.豐富的網站呈現

11(B) 請問商業模式圖的核心為何?

          A.目標客層  (Customer Segments,CS )

          B.價直主張  (Value Propositions, VP )

          C.通路      (Channels, CH )

          D.顧客關係  (Customer Relatioships, CR )

第三章    電子商務的應用

1(D) 將傳統拍賣方式轉換倒網際網路上來進行,此模式稱為?

         A.線上學習             B.線上團購

         C.線上購物             D.線上拍賣

2(B) 企業架設內部網路、對夥伴使用電子採購模式以及商際網路連繫,這樣屬於哪一種概               念?

         A.企業電子化            B.B2B電子商務

         C.供應鏈管理            C.C2C電子商務

3(C) 台塑透過台塑網,提高台塑集團採購、工程發包、原料標售系統與庫存管理等作業效率

        ,進而提高台塑集團的競爭力,台塑網的發展屬於B2B電子商務發展的哪一個階段?

         A.電子資料交換網路           B.基本的電子商務

         C.電子交易市集                   D.協同商務

4(D) 台塑網出現後可與兩岸相關企業進行交易行為,不用另外以電話或傳真進行通知,減少            採購人員的負擔,這是屬於交易平臺主要功能的哪一項?

         A.提供交易管理                 B.創造收益利潤

         C.豐富的比價機制             D.簡化買賣流程

5(A) eBay 2009年與外貿協會合作,將臺灣具特色的食品企業引進中國大陸,利用金流系統          PayPal ,共同推銷臺灣商品,藉此協助臺灣的中小企業廠商能夠與全球市場接軌,進而           得到更大的發展空間,這種概念與下列何者最相近?

         A.e-Market Place             B.企業資源規劃

         C.供應鏈管理                 D.顧客關係管理

6(B) P&GWal-Mart建立分享資訊機制,讓P&G每天由Wal-mart蒐集銷售資訊,藉此管理在           Wal-Mart的存貨,請問這是屬於協同商務四大領域中的哪一種?

        A.設計協同商務          B.行銷與銷售協同商務

        C.採購協同商務          D.規劃與預測協同商務

7(B) 貴婦奈奈在PTT上針對各種議題發表自己的看法,請問,這種模式是屬於C2C商務模式的          哪一種?

         A.交易模式               B.分享模式

         C.拍賣模式               D.社群模式

8(D) 阿證最近發現CoCo都可茶飲廣告:「只要來店消費就會給予一組序號,憑著序號再到             Facebook 按讚,就有機會獲得賽德克巴萊電影票乙張。」 請問這屬於C2C網路交易模式         效益的哪一項?

        A.流動性             B.方便性

        C.透明性             D.社群性

9(B) 虛擬社群互動的基礎可分為四大類,下列何者不屬於之?

         A.興趣          B.性別

         C0幻想         D.交易

第四章    電子商務的金流與安全機制

1(ABCD) 電子交易中的參與者,主要有哪些?

         A.認證中心                B.公正第三者

         C.收單銀行                D.發行銀行

2(A) 下列何者不是電子付款系統的特性?

         A.不具有貨幣價值       B.可轉換性

         C.完整性                       D.易使用性

3(D) 下列何者不屬於網路信用卡交易的參與者?

         A.持卡人              B.網路商店

         C.收單銀行          D.警察局

4(B) 下列何者不屬於代幣式付款系統?

         A.電子現金         B.信用卡

         C.智慧卡             D.儲值卡

5(D) 關於行動支付機制,手機中保護卡片資訊的晶片,稱之為SE,可以放在手機的三個地               方,下列何者有誤?

        A.手機本身的硬體           B.手機插入一張SD記憶卡

        C.手機上的SIM            D.手機上的電池

6(ABD) 下列關於Google Wallet 服務的敘述何者正確?

        A.Google是以軟體搭配NFC晶片來模擬硬體的SE元件

        B.手機需具有NFC的功能

        C.卡片完全不會被盜用

        D.要有支援 Paypass POS

7(ABCD) 下列有關Apple Pay 服務的敘述何者正確?

        A.以隨機編碼的序號 (token) 來進行交易

        B.稱為 tokenization

        C.每支手機可以放入多張信用卡

        D.信用卡資料放在 Passbook APP

8(B) 下列何者不是網路服務安全所要的保護的?

         A.資料           B.滿意度

         C.資源           D.身分

9(BC) 有關防火牆基本防禦目的,下列哪些正確?

         A.限制外部人員離開        B.防止攻擊者接近電腦

         C.限制外部人員進入        D.可以防範內賊

10(ABC) 有關防火牆的功能敘述,下列哪些正確?

         A.防火牆可以監視活動

         B.防火牆可以集中管理

         C.防火牆可以網路把關

         D.防火牆可以徹底解決問題

第五章     電子商務的應用技術發展

1(B) 下列何者非數位匯流的概念?

          B.經由郵局寄送信件

2(ABCD) 數位匯流可以包括哪四種不同的產業

          A.IT產業                    B.電信產業

          C.消費性電子產業    D.娛樂產業

3(A) Amazon.com 提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一概念?

         A.網路交易模式

4(ABC) 第三方支付包掛下列哪些特點?

         A.靈活的支付模式                     B.嚴格的監督機制

         C.保障的獨立機構

5(C) 讓使用者透過網路來通話、訊息傳遞、資訊來往或分享影像的系統,是只下列何者?

        C.即時通訊

6(ABCD) 下列何者屬於級時通訊?

         A.MSN        B.Whatsapp

         C.WeChat    D.LINE

7(B) 請問下列何者非程現式廣告的概念?

         B.又稱關鍵字廣告

8(D) 我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術式下列何者?

         D.影音串流

9(ABC) 影音串流的三大平臺式指哪三個?

        A.Windows Media Player         B.Real Player

        C.QuickTime Player

10(ABCD) 社群往站的商業模式包括哪些?

         A.廣告收入模式             B.使用者收費模式

         C.導購模式                     D.遊戲模式

11(B) 適地性服務( Location Based ServiceLBS )就屬於環境感知所延伸出的應用,請問此服務較符合下列何者應用?

         B.行動商務

第六章        電子商務倫理與社會議題

1(BCD) 在電子商務領域中,智慧財產權主要包括下列哪些?

              B.著作權             C.專利權

              D.商標權

2(D) 網路蟑螂行為主要侵犯哪一種權力?

         D.網域名稱權

3(BCD) 電子商務消費者保護網領的基本原則包刮下列哪些?

             B.交易安全原則           C.網路資訊揭露原則

             D.隱私權保護原則

4(ABCD) 下列哪些是屬於網路犯罪?

             A.網路販賣盜版光碟                 B.網路販賣贓物

             B.入侵他人網站                         D.主動故意散布電腦病毒

5(BD) 為尊重軟體智慧財產權,下列哪些是正確的觀念?

            B.可合法暫時性重製                  D.應購買合法版權的軟體

6(A) 智慧財產權法,想要保的是下列何者?

         A.人類腦力辛勤創作的結晶

7(D) 「任何能用來識別、找出、或聯絡個人的資料」稱為?

        D.隱私權

8(D) Mason 等等學者提出「資訊技術之道德課題的架構內容」,將資訊倫理的道德議題分為四大類,不包括下列何者?

         D.使用權

9(A) 在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為什麼?

        A.駭客

10(C) 下列何者不屬於常見的盜版行為

第七章      企業電子化

1.(A) 下列何者非企業電子化的主要應用範圍? [單選]

         A. 六個標準差                   B.  SCM

         C. CRM                         D.  ERP

2.(B) 開發工業自從引進了這個系統以後,清楚整合工廠、

        上、下游的供應商、企業內部的營運流程、零售商與顧

        客,因而提升整個生產鏈的競爭力,請問是哪一套系統?

A.     企業資源規劃

B.     供應鏈管理

C.     顧客關係管理

D.    企業流程再造

3.(A) 下列何者不屬於顧客關係管理範疇?

         A. 透過系統的完整規劃與分配達成對組織資源的有效運用

         B. 透過電子化的系統,來提升企業與顧客關係的方法

         C. 藉由科技來整合資源,並發掘出顧客的可能需求

         D. 先以建立忠誠且互利的顧客關係為發展目標

4.(D) 小駱是個很認真的保險業務員,每當拜訪舊客戶時,總

         會拿出客戶從前留下的資料,加以研讀,藉此他可以提

         供最符合客戶需求的保險建議,這是屬於下列何種概念?

A.    企業資源規劃

B.     知識管理

C.     商業智慧

D.    顧客關係管理

5.(D) 中華汽車為了提高公司的競爭力,導入一套系統,這系

         統可以建立個人知識平臺,並與工作管理系統進行結合

         ,經由工作社群網路來建立不同的知識社群,進而發展

         出團隊的作業模式與規範,請問這是屬於哪一套系統?

A. 企業資源管理

B. 顧客關係管理

C. 商業智慧

D. 知識管理

6.(C) 超級市場主管常常會將消費者的消費習慣以線上分析處

         理工作分析,最後再透過決策支援系統訂出最佳化的銷

         售策略,這是屬於下列哪一個概念的應用?

         A. 企業資源管理

         B. 知識管理

         C. 商業智慧

7.(D) 企業主管在思考電子化系統時,會考慮到員工當中會操

         作電腦的人數、以及要如何安排課程,以培育員工使用

         新的資訊科技系統,這類的問題較接近哪些面向?

A.     財務面

B.      流程面

C.      資訊面

D.    人員面

8.(B) 當執行企業電子化時,想到整個作業流程都必須改變,

   為了防止新舊系統整合的問題,需設立幾個檢核點來確

   保過程沒有偏差,這類的問題較接近哪個面向?

A.     財務面

B.      流程面

C.      資訊面

E.     人員面

9.(C) NOVA 曾在2000年開始進入電子化的經營,但沒考慮

         到當時的網路連線速度,造成使用者點選網頁時需花費

         很久的時間,再加上添購電子化設備昂貴,最後導致成

         效不如預期而受編,由此可知,NOVA沒有考慮到什麼

         問題?

A.     網路使用的安全性

B.      相關廠商的配合性

C.      基礎設備的完整性

D.     目標市場的廣泛性

10.(D) 下列何者不屬於電子化導入之外部環境評估?

        A. 網路使用的安全性

          B. 相關廠商的配合性

          C. 基礎設備的完整性

          D. 消費市場的區隔性

11.(B)  ERP具備四個重要的特性,不包括下列何者?

          A. 資料的整合

          B. 市場的整合

          C. 最佳化實務

          D. 模組化軟體

12.(A) 下列何者不屬於ERP的模組?

          A. 知識管理模組

          B. 物料管理模組

          C. 生產規劃系統

          D. 財務會計系統

第八章    供應鏈管理

1.(C)  供應鏈管理具有四種特性,下列敘述何者錯誤? [單選]

         A. 協同整合                  B. 減少長邊效應

         C. 核心業務外包              D. 即時最佳化

2.(D) 美國供應鏈協會(Supply Chain Council, SCC) 提出的供

         應鏈管理操作參考模型指出,供應鏈管理的商業流程順

         序為: [單選]

D.    規劃 (Plan)、資源 (Resource)、製造 (Make)

 、運送 (Deliver) 和回收 (Return)

3.(A) 供應鏈管理是透過什麼的協助,來讓供應鏈成員間能有

          效整合,減少供應鏈體系資源的浪費與重複,並藉由緊

          密的結合來提升供應鏈的績效與服務水準,以增加各企

          業的競爭力? [單選]

          A. 資訊科技                  B. 物流管理

          C. 運籌管理                  D. 行銷管理

4.(A) Zara在全球有數個趨勢紀錄與預測的機構,以掌握衣服

          流行的趨勢變化。其將資料上傳至總部後,設計中心、

          生產中心、工廠等機構可從該資料庫中存取所需的資

          訊,以壓縮生產的製程時間。請問這是屬於供應鏈管理

          的何種特色?[單選]

          A. 減少長鞭效應               B. 協同整合

          C. 非核心業務外包             D. 洞察消費需求

5.(C)  Zara的經營總部在西班牙,產品設計後在歐洲鄰近國家

         進行生產,只有少數的量會送至亞洲地區生產,藉此為

         持生產效率。請問這是屬於供應鏈管理的何種特色?[單選]

          A. 減少長鞭效應               B. 協同整合

          C. 非核心業務外包             D. 洞察消費需求

6.(B)  供應鏈管理的發長流程為: [單選]

         B. 單一企業階段物流管理階段運籌管理階段供應

         鏈管理階段

7.(D)  這個時期主要是以顧客需求為基礎,來整合企業生產的

          活動,包括:需求預測、配送、存貨管理、產品包裝

          等,以管控產品的生產過程。請問這是供應鏈管理發展

          的哪一個時期? [單選]

A.     供應鏈管理階段             B. 單一企業階段

C. 物流管理階段               D. 運籌管理階段

8.(A)  推式基礎的供應鏈流程為:[單選]

          A. 零售商依據以往顧客訂單來預測需求製造商依據以

         往零售商訂單來預測需求顧客下單零售商下單出貨

9.(A)  訂單變動量越往上變化越大,因而無法做出精確的出貨

         預測,我們可以稱這個問題為? [單選]

A. 長鞭效應                  B. 風險鏈條效應

C. 短板效應                  D. 漣波效應

10.(D) 造成長鞭效應的現象原因有? [單選]

          A. 被誇大的訂單          B. 批次訂購的行為

          C. 價格變動的預期        D. 以上皆是

第九章  顧客關係管理

1:(B)  顧客關係管理是透過下列何種循環來執行?

A 策略 搜集  互動  區隔

B 搜集  區隔  策略  互動

C 互動  策略  搜集  區隔

D 區隔  搜集  策略  互動

2:(C)下列何者為顧客關係管理主要的行銷模式?

A  營業額 獲利數字為衡量績效指標

 B  顧客是可以取代的

C  盡量將每一件商品賣給每一位顧客.以取得顧客對企業的終身價值及最大效益

D  以部門為行銷分界點.致使行銷 .業務.客服部門接收到不同的資訊

3:(D)以下哪些可稱為忠誠顧客?

A 使用後非常滿意者

B 再次購買者

C 不但自己購買還推薦他人

D 以上皆是

4:(B)阿忠在使用Google的時候.發現Google會根據他上次搜尋關鍵字來提供建議.這是屬於顧客關係管理精神架構的哪個?

A 獲取新顧客

B 建立顧客關係

C 推薦他人

D 獲利利潤

5:(C)下列那一個屬於資料搜集技術?

A 線上分析處理

B 決策支援系統

C  電話客服中心

D  以上皆是

6:(A)資料儲存的中心.透過特定的主題來進行資料處理.藉此搜集相關資訊提供高階主管分析決策時使用。這是屬於下列何種概念?

A 資料倉儲

B 資料超市

C 資料庫

D 知識庫

7:(C)手機與電池.香煙與打火機,是屬於資料採擷中何種模式的應用?

A 分類

B 群聚/分群

C 聯合性分析

D 順序

8:(D)美兆健康管理事業.在健檢時總會針對不同客戶.提出不同的營養建議,健檢結束後.還會給予專屬個人的健康促進書。請問這是屬於建立顧客關係管理的哪個步驟?

A 確認顧客何在

B  對顧客進行區隔

C 與顧客進行互動

D 提供客製化的服務

9:(C)下列何者不是顧客關係管理的關鍵成功因素?

A 整合內部的資訊

B 強化溝通的管道

C 上下遊廠商配合度

D 處理變革的抗拒

10 (A) 巨量資料是一套協助企業大量搜集.匯整.分析資料的技術.企業會運用各種模式與策略.按照使用者的偏好.關聯性與產品種類等來擬定方案.以驗證原先擬定的發展方針之正確性.以上是屬於哪一個階段?

A 分析

B 獲取

C 組織

D 決策

11 (D) 發發發大賣場自從有了新的顧客關係管理系統後.當有促銷活動的時候.會根據以往顧客消費習慣來決定是否寄發DM.也因為這樣.新一季的營業額上升了5%.上列敘述中.不包含何種顧客關係管理帶來的效益?

A 增加收益

B 減少行銷活動

C 降低成本

D 推薦他人

第十章

知識管理與e-learning

1 (A) 指企業記錄下所有能夠觀察到的事情.從網路使用者進入網頁的網址.點選的項目.停留時間.消費的狀況等.都透過程式進行記錄.並存放在數據庫中.作為後續分析的基本素材。指的是?

A 數據

B 資訊

C 技術

D 知識

2:(C) 先設定某些分析的模式.再利用統計.分析.彙整等動作.以區分出有意義的資訊。是屬於資訊分析工具的哪一種?

A分類

B文字化

C 計算

D 精縮

3:(D) 意指資料的整理.彙整分析後的資訊.找出適合使用的部分.並且加入提要以供索引使用。是屬於資訊分析的工具的哪一種?

A 分類

B 文字化

C 計算

D 精縮

4:(B) 下列何者不是知識管理的本質?

A知識資訊化

B 知識數據化

C 只是分享化

D 知識價值化

5 (A) 知識的開發.整理.利用之過程.能發掘出新的知識.以創造出更高的價值.是屬於知識管理本質的哪一個?

A知識價值化

B 知識分享化

C知識數據化

D知識資訊化

6:(C)有關知識型產業敘述何者錯誤?

A結合企業內.外部所有的資源

B 透過網路來與上下游合作夥伴.顧客進行互動.以補強企業的知識庫藏

C 又稱為精實產業

D 知識管理模式為共同開發

7:(B) 知識管理的程序為

A 知識的吸收知識的累積知識的創造知識的擴散

B知識的吸收知識的創造知識的累積知識的擴散

C知識的創造知識的累積知識的吸收知識的擴散

D知識的擴散知識的累積知識的吸收知識的創造

8:(B) 主要是透過經驗所獲得.較無法訴諸語言.需要透過適當的方式來進行分享(外顯示).並透過知識庫來儲存與分享。而此點也是知識創造過程中.最為關鍵的一步。指的是?

A 創造觀念

B 分享內隱知識

C 確認觀念

D 跨層次的知識擴展

9 (A) 組織成員間內隱知識的移轉.透過經驗分享來傳遞彼此的內隱知識.例如:心智模式與技術技巧的分享。為知識創造模式中的?

A 共同化

B 內化

C 結合

D 內化

10 (D) 與邊做邊學息息相關.學習者可透過指導者的口語指導.經驗分享等外顯示模式來學習.並經由討論與移轉指導者的內隱知識後.將外知識轉化為專屬自己的內隱知識.即可成為有價值的知識.為知識創造模式中的?

A共同化

B外化

C結合

D內化

11:(D) 數位學習的基本要件為何?

A網路化

B資訊化

C遠距學習化

D以上皆是

12:(C) 下列何者為數位學習的特點?

A即時性的訓練較難達成

B 制式教材

C 資訊擷取速度快.無時間限制

D眾人集合於同一點的學習方式

13:(C) 翻轉教室的概念不包括下列何者?

A先將專業知識錄製成影片

B以專業知識為影片的分段

C 影片主要是課後複習使用

D師生面對面學習是解決問題

第十一章

行動商務

1:(D) 下列何者為行動商務模式之特性?

A 異變性

B 不可儲存性

C分享性

D互動性

2:(C)下列何者不是行動商務之成功因素?

A便利性

B使用性

C炫耀性

D豐富性

3:(B) 第一代行動通訊為?

A數位式

B類比式

C高速封包存取系統

D分碼多重存取系統

4 (B) 2.5GPRS行動通訊其傳輸速度可達?

A 56Kbps

B 150Kbps

C 256Kbps

D 2M

5 (D) 第三代行動通訊其傳輸速度可達?

A 1M

B 512kbps

C 256kbpa

D 2M

6 (D) 無線網路的技術規格以?

A 802.12

B 802.10

C 801.11

D 802.11為主

7:(C) 下列有關無線射頻辨識系統描述何者有誤?

A 是一種非接觸式的系統

B 簡稱RFID

C 適合長距離使用

D 辨識電子標籤的速率每秒可超過600

8:(D) 無線射頻辨識系統(RFID)包刮?

A電子標籤

B 讀取器

C天線

D以上皆是

9:(D) 下列何者不是行動商務的商務模式特性?

A隨處性

B個人性

C互動性

D匿名性

 10:(ABCD) 下列哪一項是屬於B2C行動商務領域?

A 行動廣告

B 行動學習

C 行動金融服務

D行動簡訊

第十二章

網路行銷

1:(D)有關AIDMA模式.何者有誤?

A I是指Interest誘發興趣

B D是指Desire

C M是指Memory記憶

D 兩個A都是指ACtion行動

2:(ABCD) 網路行銷在電腦.網路雨資訊科技的協助下.帶來那些新的思維?

A 可讓企業進行更為長期的行銷規劃

B 著默的重點也不只是銷售.可以同時兼顧溝通與銷售等導向

C 藉由網路能有效整合上下游產業鏈夥伴.創造出更強的競爭優勢

D 有更多的區域方式.多元市場與行銷模式

3:(C) AISAS模式中第二個S代表何種行為?

A Search搜尋

B sell銷售

C share分享

D survey調查

4 (ABCD) 有關傳統行銷與網路行銷的比較.下列那些正確?

A 傳統行銷:費時.花費大.印刷郵遞成本高

B 網路行銷:即時.花費小.數位式目錄成本低

C 傳統行銷:單向.客戶被動接受

D 網路行銷:雙向互動式.客戶主動選取

5 (ABCD) 下列哪些屬於網路行銷的方式?

A 病毒式行銷

B 電子信件行銷

C互動式廣告行銷

D部落格行銷

6 (ABCD) 有關網路行銷的方式.下列哪些正確?

A 病毒式行銷(Viral marketing)是利用口碑傳播的原理.透過網路使用者彼此進行傳遞

B電子信件行銷(email marketing)是一種利用電子信件將行銷資訊傳遞給目標客群的模式

C互動式廣告(Interactive Advertising)是利用網路互動媒體.行動裝置來達到跟消費者互動的效果

D 部落格行銷的模式是利用個人網頁來進行行銷活動

7: (ABCD) 電子信件行銷的優點有那些?

A 時效性高

B 較低的行銷成本

C 可將資訊傳遞給許多的潛在顧客

D 可以進行追蹤

8:(A) 下列互動式廣告的描述何者有誤?

A 很難增加銷售量

B 互動式廣告成為企業常用的廣告模式

C 通常可以利用圖片.文字.超連結.Flash 動畫.聲音/視頻短片等技術

D 利用網路.互動媒體.行動裝置來達到跟消費者互動的效果

9:(AB) 部落格行銷包刮下列何者?

A 部落客撰文

B 專屬部落格行銷

C 互動模式廣告

 D 社群行銷模式

 10:(ABC) 下列哪些屬於知名的SEM廠商?

A Google AdWords

B 雅虎搜尋行銷

C 微軟 adCenter

 D AWS

第十三章    社群行銷

1.(B) 人與人之間的社會關係,通常可利用網路分析圖來進行探究,請問這是描述下列哪些概念?[單選]

         B. 社會網路

2.(ABCD) 下列哪些社會網路的描述是正確的?[複選]

         A. 社會網路是人與人之間的社會關係

         B. 社會網路的模式可以分為無方向性連結與方向性連結兩種

         C. 社會網路的結構須具備角色、關係與連結

         D. 社會網路個體,可包括:個人、企業、組織等

3.(B) 人和人之間的關係是指下列何者?[單選]

         B. 社會網路

4.(AB) 社群行銷又可稱為下列哪些名稱?[複選]

         A. 社會網路行銷         B.社會媒體行銷

5.(B) 下列何者只須分析的社會網路個體,可包括:個人、企業、組織、或任何的物件等概念?[單選]

         B. 節點 (node)

6.(ABCD) 一般常見的社群網路服務包括哪些?[複選]

         A. YouTube               B. Facebook

         C. Twitter                 D. Line

7.(B) 社群中個別角色之間因某種因素而成的是指哪些概念?

         [單選]

         B. 關係

8.(ABC) 社會網路的結構須具備哪些概念?[複選]

         A. 角色                 B. 關係

         C. 連結

9.(B) 下列何者不包括在SoLoMo中?[單選]

         B. Sonet

10.(ABCD) CAMS的概念包括哪些?[複選]

         A. 雲端運算 (Cloud)

         B. 資料分析 (Analysis)

         C. 行動應用 (Mobile)

         D. 社交媒體 (Social-media)

第十四章   網路廣告

1.(BCD) 下列哪些網路廣告的描述是正確的?[複選]

         B. 網路廣告可提供更為互動的模式,將資訊傳遞給消費者

         C. 網路廣告可提供影音、聲光、互動、與主動偵測消費者需求之模式

         D. 費用收取的方式較為多元,企業可以選取較有成效的方式

2.(BCD) 有關網路廣告的特性,下列哪些正確?[複選]

     B. 透過網路廣告,消費者可與產品產生互動的關係

     C. 網路可提供廣告業者方便蒐集使用者的資訊

     D. 網路廣告可以及時更換新的廣告

3.(D) 「廣告商依網路廣告被點選的次數來計價」是指?[單選]

     D. Cost Per Click

4.(BCD) 下列哪些是網路廣告的特性?[複選]

     B. 及時更新             C. 提高互動

     D. 資訊回饋

5.(ABCD) 下列哪些是網路廣告的收費模式?[複選]

     A. CPM計價             B. CPC計價

     C. 收益定價             D. 定時定價

6.(B) 當使用者點選連結之後,會彈出另一個廣告視窗,用以播放廣告訊息,是屬於哪一類網路廣告?[單選]

     B. 插播廣告

7.(A) 下列何者不屬於廣路廣告的類型?[單選]

     A. 購物臺廣告

8.(B) 「以消費者透過網路廣告連結到網路後,實際交易的金額來支付廣告費用」此為網路廣告的何種收費方式?[

      ]

      B. 收益定價

9.(A) 「在傳統的文字廣告中加入聲光影音的效果,甚至可透過Flash來進行。」請問這是指?[單選]

A. 多媒體廣告

10.(D) 電子郵件廣告包括?[單選]

      A. 廣告贊助式的電子郵件

      B. 贊助討論區與電子新聞報

      C. 電子傳單

      D. 以上皆是

11.(B) 利用虛擬實境的方式,來讓消費者有親身體驗產品、服務或品牌的經驗屬於哪一種廣告類型?[單選]

B. 互動式廣告

12.(C) 在手機遊戲上的廣告屬於哪一種廣告類型?[單選]

            C. 行動廣告

第十五章    協同消費

1.(D) 透過網路讓使用者彼此進行資源交換是指下列何種概念?[單選]

          D. 協同消費

2.(C) 協同消費的關鍵在於下列何者?[單選]

          C. 使用者的可信度

3.(D) 透過租賃服務,來提供高價商品、奢侈品牌、限量商品等給有需要的使用者選購,這是下列何種概念?[單選]

          D. 協同消費

4.(D) Airbnb提供網路使用者只要擁有可以出租的房子或家中的空房,就能租給來自世界各地的旅客,是下列何種概念?[單選]

          D.協同式生活

5.(D) 請問下列何者非協同消費的別稱?[單選]

          D. Owned product

6.(ABC) 請問協同消費的類型包括下列哪些?[複選]

          A. 產品服務系統         B. 市場在流通

          C. 協同式生活

7.(A) 請問:Ubike依照不同時間區段收取租借的費用,這是

     協同消費的哪個類型?[單選]

A. 產品服務系統

8.(B) 請問二手產品銷售的概念是指協同消費的哪個模式?[單選]

          B. 市場在流通

9.(C) 透過平臺讓使用者共同分享與交易無形的資源是指協同消費的哪個模式?[單選]

         B. 協同式生活

10.(A) 請問協同消費的核心為何種概念?[單選]

          A. 分享

第十六章   物聯網

1.(D) 請問下列敘述:建構在網路、電信等資訊媒介,讓許多植入感應器的物件能夠互連互通的網路模式,指的是哪個概念?[單選]

B. 物聯網

2.(ACD) 請問物聯網的發展可分為哪三個維度?[複選]

      A. 時間                 C. 地點

      D. 物件              

3.(ABC) 請問物聯網涵蓋哪三大範疇?[複選]

      A. 人與人               B. 物件與物件

      C. 人與物件

4.(ABCD) 請問Vodafone 針對物聯網的四大預測包括哪些?

      A. 在車用以及工業用的領域加速發展

      B. 結合巨量資料 (Big Data) 讓服務更聰明

      C. 更快速的連線

      D. 更完整的規範

5.(D) 請問下列何者非物聯網的關鍵技術?[單選]

      D. 行動通訊設備

6.(A) 請問由感應器 (Reader) 和標籤 (Tag) 所組成的系統是指下列何者?[單選]

A. 射頻識別技術

7.(C) 請問將軟體結合硬體裝置的應用,舉凡行動電話、遊樂器、數位家電等,哪個技術使其具備接收網路訊息與處理資訊的能力?[單選]

 C. 嵌入式智慧技術

8.(D) 請問Google 的智慧加庭較偏向下列何者應用?[單選]

      D. 物聯網

9.(D) 羊毛出在狗身上,豬來買單是只下列何者商業模式?「單選」

      D.數位匯流

10.(A)下列何者非物聯網重要的商業模式之ㄧ?「單選」

      A.平臺的使用人數

The world's online population was estimated to be around ________ in 2020.

4 billion

Which of the following is not a unique feature of e-commerce technology?

information asymmetry

Which of the following is the best definition of transaction cost?

the cost of participating in a market

The Internet has shown similar growth patterns as other electronic technologies of the past.

False

Which of the following is another name for a revenue model?

financial model

Which of the following is not a major business trend in e-commerce in 2020-2021?

Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

Which of the following best defines e-commerce?

digitally enabled commercial transactions between and among organizations and individuals

Which of the following can be considered synonymous with the term e-commerce?

digital commerce

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

richness

Which of the following is not a key element of an elevator pitch?

legal structure

All of the following can be considered examples of the market creator business model except:

Twitter.

Which of the following statements about Foursquare is not true?

The growth in Foursquare's revenue has been driven primarily by significant increases in the numbers of users of its Swarm app.

Which element of the business model addresses what a firm provides that other firms do not and cannot?

value proposition

All of the following can be considered a direct competitor of Priceline except:

ESPN.

Which of the following uses a subscription-based sales revenue model?

Dollar Shave Club

Which of the following is an unfair competitive advantage?

brand name

First movers often fail because:

they lack complementary resources needed to sustain their advantages.

Which element of the business model refers to the presence of substitute products in the market?

competitive environment

Which of the following uses a subscription revenue model for books?

Amazon Kindle Unlimited

The Transport Layer of TCP/IP is responsible for which of the following?

providing communication with the application by acknowledging and sequencing the packets to and from the application

Which of the following is not a basic type of cloud computing service?

FiOS

During which period of time did the Institutionalization phase of Internet development take place?

1975-1995

Which of the following statements about cloud computing is not true?

A public cloud is typically used by companies with stringent privacy and security requirements.

Which of the following is a set of rules for transferring data?

protocol

Which of the following was the original purpose of the Internet?

to link large mainframe computers on different college campuses

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

routers

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

BGP

The Internet Layer of TCP/IP is responsible for which of the following?

addressing, packaging, and routing messages

Which of the following is the core communications protocol for the Internet?

TCP/IP

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

packet switching.

Which of the following protocols is used to send mail to a server?

SMTP

Which of the following is rarely used today, due to security concerns.

Telnet

Which of the following are central directories that list all domain names currently in use for specific domains?

root servers

Which of the following verifies that the business objectives of the system are in fact working?

acceptance testing

Which of the following details the actual hardware components to be used in a system?

physical design

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

benchmarking.

Which of the following are the two main components of a systems design?

logical design and physical design

A multi-tier architecture includes a web and database server.

False

What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

decreased dramatically

Most of the time required to maintain an e-commerce site is spent on:

general administration and making changes and enhancements to the system.

A template test is a form of which type of testing?

A/B testing

Which of the following involves testing a site's program modules one at a time?

unit testing

Confidentiality is sometimes confused with:

privacy.

________ is the ability to ensure that an e-commerce site continues to function as intended.

Availability

WannaCry is an example of ransomware.

True

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes?

botnets

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

Malware that comes with a downloaded file requested by a user is called a:

drive-by download.

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

A) digitally enabled commercial transactions between and among organizations and individuals.

E-commerce can be defined as:

A) digitally enabled commercial transactions between and among organizations and individuals.

B) the use of digital technologies in a firm's daily activities.

C) the digital enablement of transactions and processes within an organization.

D) any electronically based organizational activity that supports a firm's market exchanges.

A) Amazon's inventory control system

Which of the following is an example of e-business?

A) Amazon's inventory control system

B) the Amazon.com website

C) an Amazon mobile app

D) Amazon's Pinterest page

B) digital commerce

Which of the following can be considered synonymous with the term e-commerce?

A) e-business

B) digital commerce

C) the Internet

D) the Web

C) information asymmetry

Which of the following is not a unique feature of e-commerce technology?

A) interactivity

B) social technology

C) information asymmetry

D) richness

A) richness

Which of the following features of e-commerce technology enables merchants to market and sell "complex" goods and services to consumers via marketing messages that can integrate video, audio, and text?

A) richness

B) ubiquity

C) information density

D) personalization

D) social technology

Which of the following features of e-commerce technology allows users to participate in the creation of online content?

A) ubiquity

B) global reach

C) information density

D) social technology

B) the cost of participating in a market

Which of the following is the best definition of transaction cost?

B) the cost of participating in a market

B) 3.6 billion

The world's online population was estimated to be around ________ in 2018.

A) 360 million

B) 3.6 billion

C) 36 billion

D) 360 billion

C) universal standards

Which of the following features of e-commerce technology is related to the concept of network externalities?

A) richness

B) interactivity

C) universal standards

D) information density

C) The larger the audience reached, the less rich the message.

Which of the following statements is true about the traditional tradeoff between the richness and reach of a marketing message prior to the development of the Web?

A) Marketing messages had little richness.

B) The smaller the audience reached, the less rich the message.

C) The larger the audience reached, the less rich the message.

D) Richness was unrelated to reach.

D) the enabling of two-way communication between consumer and merchant

Interactivity in the context of e-commerce provides which of the following functionalities?

A) the ability to physically touch and manipulate a product

B) complexity and content of a message

C) the ability of consumers to create and distribute content

D) the enabling of two-way communication between consumer and merchant

C) menu costs

The costs incurred by merchants in having to change product prices (such as the costs of reentering prices into computer systems) are referred to as which of the following?

A) subscription costs

B) fixed costs

C) menu costs

D) variable costs

A) information asymmetry

Which of the following refers to any disparity in relevant market information among parties in a transaction?

A) information asymmetry

B) unfair competitive advantage

C) imperfect competition

D) dynamic pricing

B) marketplace

Which of the following is a physical place you visit in order to transact?

A) marketspace

B) marketplace

C) social network

D) the Internet

C) reach

The total number of users or customers an e-commerce business can obtain is a measure of which of the following?

A) ubiquity

B) interactivity

C) reach

D) information density

A) richness

Which of the following refers to the complexity and content of a message?

A) richness

B) reach

C) information density

D) interactivity

C) ubiquity.

E-commerce is available just about everywhere and anytime. This is known as:

A) richness.

B) information density.

C) ubiquity.

D) reach.

C) mobile e-commerce

Which type of e-commerce is distinguished by the type of technology used in the transaction rather than by the nature of the market relationship?

A) consumer-to-consumer (C2C)

B) social e-commerce

C) mobile e-commerce

D) business-to-business (B2B)

D) Facebook

Which of the following is a leading platform for social e-commerce?

A) Amazon

B) eBay

C) Wikipedia

D) Facebook

A) grew at double-digit rates between 2010 and 2018.

Business-to-consumer (B2C) e-commerce in the United States:

A) grew at double-digit rates between 2010 and 2018.

B) has less revenue than C2C e-commerce.

C) now constitutes over 50% of the overall U.S. retail market.

D) is growing more slowly as it confronts its own fundamental limitations.

B) Users still spend less time using apps than they do using desktops or mobile websites.

Which of the following is not true about the use of apps?

A) Users spend nearly 90% of their smartphone app minutes using their top five apps.

B) Users still spend less time using apps than they do using desktops or mobile websites.

C) Apps are easier to control and monetize than websites.

D) Users typically use about 20 different apps per month.

B) Airbnb

Which of the following is an example of an on-demand service company?

A) YouTube

B) Airbnb

C) Tumblr

D) Facebook

D) Go2Paper

Which of the following is a platform for B2B e-commerce?

A) Airbnb

B) Facebook

C) Groupon

D) Go2Paper

A) Walmart

All of the following are platforms for C2C e-commerce except:

A) Walmart

B) Facebook Marketplace

C) Craigslist

D) Etsy

C) Y Combinator.

All of the following are examples of social networks except:

A) Instagram.

B) Twitter.

C) Y Combinator.

D) Pinterest.

A) social e-commerce generated more revenue than mobile e-commerce.

All of the following statements about e-commerce in the United States in 2018 are true except:

A) social e-commerce generated more revenue than mobile e-commerce.

B) mobile advertising accounted for over 70% of all digital advertising spending.

C) on-demand service firms fueled the growth of local e-commerce.

D) growth rates for retail e-commerce were higher in the Middle East than in the United States.

B) 16%

In 2018, about ________ of Americans accessed the Internet solely via a mobile device.

A) 8%

B) 16%

C) 28%

D) 34%

B) Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

Which of the following is not a major business trend in e-commerce in 2018-2019?

A) Mobile e-commerce continues to grow.

B) Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.

C) On-demand service companies garner multibillion-dollar valuations.

D) Social e-commerce continues to grow.

D) Growth of the Internet of Things slows down.

Which of the following is not a major technology trend in e-commerce in 2018-2019?

A) Mobile messaging services are now used by almost two-thirds of smartphone users.

B) Firms are turning to business analytics to make sense out of big data.

C) Smart speakers provide an additional platform for e-commerce.

D) Growth of the Internet of Things slows down.

C) concerns about the U.S. Supreme Court ruling that online businesses do not need to collect state sales tax.

All of the following are major social trends in e-commerce in 2018-2019 except for:

A) concerns about the flood of temporary, poorly paid jobs without benefits being generated by on-demand service companies.

B) concerns over commercial and governmental privacy invasion.

C) concerns about the U.S. Supreme Court ruling that online businesses do not need to collect state sales tax.

D) concerns about the increasing market dominance of Facebook, Amazon, and Google.

B) Over 220 Americans used tablet computer apps in 2018.

Which of the following statements about the mobile platform is not true?

A) Over 91% of Americans used a mobile device to access the Internet at least some of the time in 2018.

B) Over 220 Americans used tablet computer apps in 2018.

C) M-commerce purchases were expected to reach almost $280 billion in 2018.

D) The time U.S. adults spend using mobile apps accounts for over 60% of total digital minutes spent.

D) Maintain a basic, static website depicting the firm's brand.

Which of the following describes the basic web policy of large firms during the Invention period?

A) Integrate social networks and the mobile platform with website marketing.

B) Emphasize the necessity for the Web to generate profits.

C) Use the Web to sell complex goods and services online.

D) Maintain a basic, static website depicting the firm's brand.

D) $7.3 trillion.

It is estimated that by 2022, the size of the B2B market will reach:

A) $730 million.

B) $7.3 billion.

C) $730 billion.

D) $7.3 trillion.

A) The Web is the technology upon which the Internet is based.

Which of the following statements about the Web is not true?

A) The Web is the technology upon which the Internet is based.

B) The Web was the original "killer app."

C) The Web provides access to pages written in Hypertext Markup Language.

D) The Web is both a communications infrastructure and an information storage system.

D) 1 billion

In 2018, there were more than ________ Internet hosts.

A) 1 million

B) 10 million

C) 100 million

D) 1 billion

A) the development of the smartphone.

All of the following can be considered a precursor to e-commerce except:

A) the development of the smartphone.

B) Baxter Healthcare's PC-based remote order entry system.

C) the French Minitel.

D) the development of Electronic Data Interchange standards.

C) The French Minitel

________ was the first truly large-scale digitally enabled transaction system in the B2C arena.

A) Telex

B) The Baxter Healthcare system

C) The French Minitel

D) Eelectronic Data Interchange (EDI)

C) 1995

In which year can e-commerce be said to have begun?

A) 1983

B) 1985

C) 1995

D) 2001

B) inability to retain users.

All of the following are issues facing Pinterest except:

A) copyright infringement.

B) inability to retain users.

C) spam.

D) scams.

C) disintermediation

Which of the following is a characteristic of e-commerce during the Invention period?

A) mobile technology

B) earnings and profit emphasis

C) disintermediation

D) extensive government surveillance

D) auction sites.

All of the following are examples of Web 2.0 sites and applications except:

A) photo-sharing sites.

B) blogs.

C) wikis.

D) auction sites.

D) It is highly regulated.

Which of the following is not a characteristic of a perfect competitive market?

A) Price, cost, and quality information are equally distributed.

B) A nearly infinite set of suppliers compete against one another.

C) Customers have access to all relevant information worldwide.

D) It is highly regulated.

D) fast follower advantage.

All of the following were visions of e-commerce expressed during the early years of e-commerce except:

A) a nearly perfect information marketspace.

B) friction-free commerce.

C) disintermediation.

D) fast follower advantage.

A) one competitor has an advantage that others cannot purchase.

Unfair competitive advantages occur when:

A) one competitor has an advantage that others cannot purchase.

B) market middlemen are displaced.

C) information is equally distributed and transaction costs are low.

D) firms are able to gather monopoly profits.

A) an emphasis on exploiting traditional distribution channels.

The early years of e-commerce were driven by all of the following factors except:

A) an emphasis on exploiting traditional distribution channels.

B) a huge infusion of venture capital funds.

C) an emphasis on quickly achieving very high market visibility.

D) visions of profiting from new technology.

C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

The early years of e-commerce are considered:

A) the most promising time in history for the successful implementation of first mover advantages.

B) an economist's dream come true, where for a brief time, consumers had access to all relevant market information and transaction costs plummeted.

C) a stunning technological success as the Internet and the Web increased from a few thousand to billions of e-commerce transactions per year.

D) a dramatic business success as 85% of dot-coms formed since 1995 became flourishing businesses.

A) They were a technological success but a mixed business success.

Which of the following best describes the early years of e-commerce?

A) They were a technological success but a mixed business success.

B) They were a technological success but a business failure.

C) They were a technological failure but a business success.

D) They were a mixed technological and business success.

D) expansion of e-commerce to include services as well as goods

Which of the following is a characteristic of the Reinvention phase of e-commerce?

A) massive proliferation of dot-com start-ups

B) widespread adoption of broadband networks

C) rapid growth of search engine advertising

D) expansion of e-commerce to include services as well as goods

C) brand extension and strengthening becomes more important than creating new brands

Which of the following is a characteristic of the Consolidation phase of e-commerce?

A) predominance of pure online strategies

B) emphasis on revenue growth versus profits

C) brand extension and strengthening becomes more important than creating new brands

D) shift to a technology-driven approach

D) The market middlemen disappeared.

Which of the following is not true regarding e-commerce today?

A) Economists' visions of a friction-free market have not been realized.

B) Consumers are less price-sensitive than expected.

C) There remains considerable persistent price dispersion.

D) The market middlemen disappeared.

C) Overall transaction costs have dropped dramatically.

Which of the following statements is not true?

A) Information asymmetries are continually being introduced by merchants and marketers.

B) Intermediaries have not disappeared.

C) Overall transaction costs have dropped dramatically.

D) Brands remain very important in e-commerce.

B) eToys

Which of the following is an example of an e-commerce first mover that failed?

A) Etsy

B) eToys

C) eBay

D) E*Trade

D) webrooming

Which of the following refers to the practice of researching a product online before purchasing it at a physical store?

A) zooming

B) grazing

C) showrooming

D) webrooming

B) The Web

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

A) e-commerce

B) The Web

C) social networks

D) mobile apps

B) disintermediation

Which of the following refers to the displacement of market middlemen and the creation of a new direct relationship between producers and consumers?

A) network effect

B) disintermediation

C) friction-free commerce

D) first mover advantage

A) technology driven

Above all, e-commerce is a ________ phenomenon.

A) technology driven

B) finance-driven

C) sociological

D) government-driven

D) workgroup automation (e.g., document sharing)

Which business application is associated with the technological development of local area networks and client/server computing?

A) transaction automation (e.g., payroll)

B) desktop automation (e.g., word processing)

C) industrial system automation (e.g., supply chain management)

D) workgroup automation (e.g., document sharing)

D) intellectual property

Which of the following is an important societal issue related to e-commerce?

A) consumer behavior

B) value webs

C) cloud computing

D) intellectual property

B) Economists take a purely technical approach to e-commerce.

Which of the following statements is not true?

A) No single academic perspective dominates research about e-commerce.

B) Economists take a purely technical approach to e-commerce.

C) There are two primary approaches to e-commerce: behavioral and technical.

D) Management scientists are interested in e-commerce as an opportunity to study how business firms can exploit the Internet to achieve more efficient business operations.

1.52) All of the following are business models employed in the online music industry except:

B) peer-to-peer streaming.

2.10) Which of the following is an example of the affiliate revenue model?

D) MyPoints

3.54) In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

A) market creator

4.37. 將企業分為主要活動與支援活動,藉此找出企業的核心能力,幫助企業決定資源的配置,這是何種理論?[單選]

C.價值鏈分析

5.3) Which element of the business model addresses what a firm provides that other firms do not and cannot?

D) value proposition

6.16) A perfect market is one in which:

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

7.7. 7-11 在網路上架設一個官方網站,以提供消費者最新資訊、活動介紹等服務,若以電子商務光譜的概念來看,7-11 的策略方向是屬於?(單選) 回答錯誤

(D) 修改營運模式

8.1) ________ and ________ are typically the most easily identifiable aspects of a company's business model.

B) Value proposition; revenue model

9.73) ________ technologies are technologies that enable the incremental improvement of products and services.

A) Sustaining

10.17) Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

C) incubators.

11.63) The Seam is an example of a(n):

C) industry consortium.

12.36.lativ希望成為網路休閒服飾的領導品牌,由此可見這家企業有明確的企業願景,請問這是屬於策略發展的哪個階段?[單選] 回答錯誤

B.策略起始

13.23. 企業在進行產品或是服務運作的過程時,常會注意到:「企業的關鍵資源?對顧客的價值主張?企業的關鍵流程?利潤公式?」請問以上這些問題是屬於?[單選]

D.商務模式的概念

14.17. 網站藉由提供訪客內容、服務或產品資訊,也提供一個廣告場所,然後向廣告主收取費用,是屬於哪一種收益模式?[單選]

A.廣告收益模式

15.11) Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

C) freemium strategy

16.74) Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

C) disruptors.

17.21. 下列何者不是電子商務發展的定位時考慮到的評估因素?[單選]

C.價值鏈

18.33. 在電子商務的交易模式中,若由賣方彼此競價,出價最低者就贏得與買方的商務交易,這是屬於?[單選]

D.逆拍賣式價格

19.20. 在策略定位中,Michael Porter的價值鏈分析,是屬於哪一種分析?[單選]

C.企業內部環境

20.43) Which of the following is not a variation of the e-tailer business model?

C) market creator

21.71) If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

A) enable individual customization of the product by consumers.

22.57) All of the following are examples of business-to-business (B2B) business models except:

D) portals.

23.18. 網站藉由提供內容或服務給會員,然後向這些會員收取訂閱費用,是屬於哪一種收益模式?[單選]

B.訂閱收益模式

24.19. 網站藉由促成或執行交易而向會員或廠商收取手續費用,是屬於哪一種收益模式?[單選]

C.手續費收益模式

25.41. 君君是amazon.com的會員,他每次使用amazon.com買書的時候,總會有建議書單在螢幕左下角出現,請問amazon.com提供的這種服務是屬於網路商業模式的哪種特性?[單選] 回答錯誤

C.策略面

26.15) All of the following can be considered a direct or indirect competitor of Amazon except:

D) Priceline.

27.50) The basic value proposition of community providers is:

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

28.58) What is the primary revenue model for an e-distributor?

A) sales

29.31) Which of the following types of crowdfunding involves people making contributions to others with no expectation of any return?

A) donor-based crowdfunding

30.69) Which of the following is not a primary activity in a firm value chain?

B) finance/accounting

31.27) ________ is defined by a company using its competitive advantage to gain in surrounding markets.

C) Leverage

32.8) Stickiness is an important attribute for which of the following revenue models?

A) advertising revenue model

33.44) Which of the following is an example of a company using the content provider model?

B) Netflix

34.8. 誠品書局在網路上建立商城,希望能把實體的顧客送到線上,也把線上的顧客送到實體商店。在實虛整合的四個尺度中,誠品書局考慮到了?(單選)

(A) 品牌

35.5) Which of the following are Amazon's primary value propositions?

B) selection and convenience

36.80) E-commerce has increased price competition in many markets.

A.A

37.55) On-demand service companies are characterized by the free sharing of resources between the company and consumers. 回答錯誤

A.A

38.79) Interactivity that enables product customization alters industry structure by decreasing the threat of substitutes.

A.A

39.36) In the subscription revenue model, a company primarily generates income from the display of ads. 

B.B

40.34) Information asymmetries enable some firms to have an edge over others.

A.A

41.81) Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers.

B.B

42.75) The term unfit fitness refers to a situation in which employees of a firm have the wrong skills for the current environment.

A.A

43.76) Scale economies are efficiencies that result from increasing the size of the business.

A.A

44.32) A value proposition defines how a company's product or service will generate revenue for the firm.

B.B

45.37) GoFundMe is a prominent example of a rewards-based crowdfunding site.

B.B

46.77) A company's strong linkages with its customers increase switching costs.

A.A

47.65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

A.A

48.35) Slow followers are sometimes more successful than first movers.

A.A

49.33) Real markets are imperfect.

A.A

50.78) The Internet's universal standards have changed industry structure by increasing barriers to entry and decreasing competition within an industry.

B.B

-----

51) Tier 1 ISPs provide Internet access to consumers and businesses.

FALSE

54) Which of the following is not a concern about IoT?

A) the falling cost of sensors

B) interoperability

C) security

D) privacy

Answer: A

55) What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?

A) Bluetooth

B) drones

C) WLANs

D) EDI

Answer: B

56) Which of the following statements about fiber-optic cable is not true?

A) It transmits more data at faster speeds than coaxial or twisted pair cable.

B) It is thinner and lighter than coaxial or twisted pair cable.

C) Most U.S. homes have fiber connections.

D) Long-haul fiber optic networks are typically owned by firms referred to as Tier I ISPs.

Answer: C

57) The major technologies used with wireless local area networks are:

A) Wi-Fi and Bluetooth.

B) Wi-Fi and WiMax.

C) Bluetooth and 3G.

D) WiMax and 3G.

Answer: A

58) Which of the following IEEE standards provide for high-speed short-range Wi-Fi?

A) 802.11ad

B) 802.11ay

C) 802.11ah

D) 802.11af

Answer: A

59) All of the following are involved in the effort to create standards for IoT except:

A) AllSeen Alliance.

B) Industrial Internet Consortium.

C) Open Connectivity Foundation.

D) W3C

Answer: D

60) All of the following either currently, or have plans to, offer Internet access via satellite except:

A) Facebook

B) Dish

C) Microsoft

D) Boeing

Answer: C

61) Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies?

A) satellites

B) drones

C) unused, low-powered television channels

D) high altitude balloon

Answer: C

62) The United States has the world's highest average Internet connection speed.

FALSE

63) WLAN-based Internet access derives from the same technological foundations as telephone - based wireless Internet access.

FALSE

64) The Internet of Things (IoT) is based on sensors that can collect data and connect to the Internet.

TRUE

67) The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A) Netscape Navigator.

B) Mosaic.

C) Mozilla.

D) Internet Explorer.

Answer: B

68) In the address http://www.company.com/clients.html, which of the following is the top-level domain?

A) .com

B) company.com

C) www

D) http

Answer: A

69) You could expect to find all of the following services in a web server software package except:

A) security services.

B) FTP.

C) search engine.

D) an RSS aggregator.

Answer: D

70) Which of the following was the most popular web browser as of August 2018?

A) Internet Explorer

B) Safari

C) Chrome

D) Firefox

Answer: C

71) The concept behind document formatting had its roots in which of the following?

A) XML

B) SGML

C) HTML

D) GML

Answer: D

72) All of the following statements about HTML5 are true except:

A) HTML5 has become the de facto web page development standard.

B) HTML5 is an important tool for both response web design and adaptive web delivery.

C) HTML5 apps work just like web pages.

D) HTML5 stores page content into mobile device hardware rather loading into the browser from a web server.

Answer: D

73) HTML defines the structure of a web page.

TRUE

75) Cortana is a type of:

A) intelligent digital assistant.

B) widget.

C) gadget.

D) social network

Answer: A

76) Which of the following enables Internet users to communicate with each other, although not in real time?

A) mobile messaging

B) online forum

C) SMS messaging

D) VoIP

Answer: B

77) Which of the following is not a mobile messaging application?

A) Kik

B) WhatsApp

C) Viber

D) Feedly

Answer: D

78) A(n) ________ allows users to easily add and edit content on a web page.

A) wiki

B) podcast

C) blog

D) RSS feed

Answer: A

79) The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A) VoIP.

B) IPTP.

C) VTP.

D) IP.

Answer: A

82) Google Cardboard is an example of which of the following?

A) virtual reality

B) artificial intelligence

C) augmented reality

D) chatbot

Answer: A

83) All of the following statements about mobile apps are true except:

A) mobile apps have usurped television as the most popular entertainment medium.

B) iOS apps are cross-platform, open-source applications.

C) over 200 billion apps have been downloaded from the Apple App Store.

D) almost all the top 100 brands have a presence in at least one of the major app stores.

Answer: B

84) Which of the following is a programming language introduced by Apple specifically for developing iOS applications?

A) Objective-C

B) C

C) C++

D) Swift

Answer: D

85) Applications for Android operating system-based smartphones are typically written in which of the following?

A) Swift

B) Java

C) ActiveX

D) ColdFusion

Answer: B

-----

1.26.  amazon.com 透過網路來銷售,產品選擇範圍廣,同時在倉庫配貨運送,後來更推出網路商城,商家可以在商城開店,就像進駐百貨公司專櫃一樣」,請問上述符合網路商業模式創新的哪個條件?[單選] 回答錯誤

C.亮眼的業績表現

2.30. 藉由蒐集關於消費者及其消費習慣的資訊,並將其販賣給那些需要得知顧客情報的企業以獲取利潤,是屬於哪一種收益模式?[單選]

D.商情媒介收益模式

3.21) Which of the following is an unfair competitive advantage?

A) brand name

4.12) Which of the following factors is not a significant influence on a company's competitive environment?

C) the availability of supportive organizational structures

5.24) Which type of investor typically becomes interested in a startup company after it has begun generating revenue?

D) venture capital investors

6.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]

B.目錄式價格

7.1. 網站藉由銷售商品、資訊或服務給消費者而從中賺取價差,這是屬於下列哪一種收益模式?(單選)

(D) 銷售收益模式

8.70) A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

C) value web

9.62) Over the past decade, the number of exchanges has:

B) diminished sharply.

10.9) Which of the following companies uses a transaction fee revenue model?

B) E*Trade

11.17. 網站藉由提供訪客內容、服務或產品資訊,也提供一個廣告場所,然後向廣告主收取費用,是屬於哪一種收益模式?[單選]

A.廣告收益模式

12.23. 企業在進行產品或是服務運作的過程時,常會注意到:「企業的關鍵資源?對顧客的價值主張?企業的關鍵流程?利潤公式?」請問以上這些問題是屬於?[單選]

D.商務模式的概念

13.2. 下列何者是對電子商務的正確認知?[單選]

D.電子商務科技

14.74) Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

C) disruptors.

15.31) Which of the following types of crowdfunding involves people making contributions to others with no expectation of any return?

A) donor-based crowdfunding

16.3) Which element of the business model addresses what a firm provides that other firms do not and cannot?

D) value proposition

17.21. 下列何者不是電子商務發展的定位時考慮到的評估因素?[單選]

C.價值鏈

18.8) Stickiness is an important attribute for which of the following revenue models?

A) advertising revenue model

19.24.阿傑是個Apple的重度使用者,每天都會逛AppleApp Store搜尋最新的應用程式,請問App Store豐富的數位化內容是屬於網路商業模式的哪種特性? [單選]

B.核心面

20.25. 小仙是個愛網購的女生,每當想要買東西時,總會上愛合購揪團買東西,請問愛合購是屬於何種網路商業模式?[單選]

D.中介平台

21.22) Which of the following gives a business model the most credibility with outside investors?

A) the firm's management team

22.59) Grainger is an example of which of the following business models?

C) e-distributor

23.8. 下列何者不屬於Porter 的產業五力?[單選] 回答錯誤

D.銷售收益模式

24.57) All of the following are examples of business-to-business (B2B) business models except:

D) portals.

25.19. 網站藉由促成或執行交易而向會員或廠商收取手續費用,是屬於哪一種收益模式?[單選]

C.手續費收益模式

26.43) Which of the following is not a variation of the e-tailer business model?

C) market creator

27.45) Which of the following is not an example of the bricks-and-clicks e-tailing business model?

C.C) Bluefly

28.49) Portals primarily generate revenue in all of the following ways except:

C) sales of goods.

29.44) Which of the following is an example of a company using the content provider model?

B) Netflix

30.47) All of the following primarily use an advertising revenue model except:

D) Walmart.

31.58) What is the primary revenue model for an e-distributor?

A) sales

32.42) Which of the following is not a community provider?

C) Blue Nile

33.72) A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

D) focus

34.2. 下列何者是對電子商務的正確認知?[單選] 回答錯誤

D.電子商業 (e-Business) 乃是徹底的改變

35.61) Which of the following may offer its customers value chain management software?

B) e-procurement companies

36.55) On-demand service companies are characterized by the free sharing of resources between the company and consumers.

是非題 (2 ) 2

A.A

37.75) The term unfit fitness refers to a situation in which employees of a firm have the wrong skills for the current environment.

是非題 (2 ) 2

A.A

38.77) A company's strong linkages with its customers increase switching costs.

是非題 (2 ) 2

A.A

39.81) Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers.

是非題 (2 ) 2

B.B

40.36) In the subscription revenue model, a company primarily generates income from the display of ads. 

B.B

41.79) Interactivity that enables product customization alters industry structure by decreasing the threat of substitutes.

是非題 (2 ) 2

A.A

42.80) E-commerce has increased price competition in many markets.

A.A

43.37) GoFundMe is a prominent example of a rewards-based crowdfunding site.

B.B

44.78) The Internet's universal standards have changed industry structure by increasing barriers to entry and decreasing competition within an industry.

B.B

45.65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

A.A

46.76) Scale economies are efficiencies that result from increasing the size of the business.

A.A

47.33) Real markets are imperfect.

A.A

48.32) A value proposition defines how a company's product or service will generate revenue for the firm.

B.B

49.35) Slow followers are sometimes more successful than first movers.

A.A

50.34) Information asymmetries enable some firms to have an edge over others.

A.A

----------------

1.21) Which of the following is an unfair competitive advantage?

C) sales of goods.

3.8. 下列何者不屬於Porter 的產業五力?[單選]

D.銷售收益模式

4.38. 秀秀經營了一家時尚精品店,最近想在網路上建立商城,以搶攻網購商機,這時她想起數位時代編輯部對實體商店跨入網路經營時,提出的幾個問題,請問是哪幾個?[單選] 回答錯誤

C.使用者滿意度

5.60) Ariba Supplier Network is an example of a(n):

C) e-procurement firm.

6.14) The existence of many competitors in any one market segment may indicate:

B) the market is saturated.

7.28. 網站扮演市場製造者的角色,將買賣雙方聚集起來,並從交易中抽取用,是屬於哪一種收益模式?[單選]

C.經紀模式

8.2. 下列何者是對電子商務的正確認知?[單選]

D.電子商務科技

9.63) The Seam is an example of a(n):

C) industry consortium.

10.74) Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

C) disruptors.

11.58) What is the primary revenue model for an e-distributor?

A) sales

12.72) A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

D) focus

13.43) Which of the following is not a variation of the e-tailer business model?

C) market creator

14.46) In general, the key to becoming a successful content provider is to:

A) own the content being provided.

15.48) Which of the following is not considered a portal?

C) Amazon

16.31) Which of the following types of crowdfunding involves people making contributions to others with no expectation of any return?

A) donor-based crowdfunding

17.29. 網站藉由為合作夥伴介紹生意收取介紹費,或為其帶來任何銷售結果而收取某部分收益,是屬於哪一種收益模式?[單選]

C.合作收益模式

18.11) Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

C) freemium strategy

19.17) Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

C) incubators.

20.42) Which of the following is not a community provider?

C) Blue Nile

21.45) Which of the following is not an example of the bricks-and-clicks e-tailing business model?

C) Bluefly

22.68) Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

A) global reach

23.36.lativ希望成為網路休閒服飾的領導品牌,由此可見這家企業有明確的企業願景,請問這是屬於策略發展的哪個階段?[單選]

B.策略起始

24.10) Which of the following is an example of the affiliate revenue model?

D) MyPoints

25.40. 有些網路商城在消費過後,總會請顧客填寫意見表,此舉是屬於DeLone & MeLean (2004) 提出的哪種概念?[單選] 回答錯誤

C.策略面

26.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]

B.目錄式價格

27.7. 7-11 在網路上架設一個官方網站,以提供消費者最新資訊、活動介紹等服務,若以電子商務光譜的概念來看,7-11 的策略方向是屬於?(單選)

D.(D) 修改營運模式

28.3) Which element of the business model addresses what a firm provides that other firms do not and cannot?

D) value proposition

29.20. 在策略定位中,Michael Porter的價值鏈分析,是屬於哪一種分析?[單選]

C.企業內部環境

30.69) Which of the following is not a primary activity in a firm value chain?

B) finance/accounting

31.67) A ________ refers to a competitive strategy in which firms attempt to achieve lower business process costs.

A) strategy of cost competition

32.25) Which of the following is another name for a revenue model?

C) financial model

33.24) Which type of investor typically becomes interested in a startup company after it has begun generating revenue?

D) venture capital investors

34.15) All of the following can be considered a direct or indirect competitor of Amazon except:

D) Priceline.

35.7) Which of the following does not use a subscription revenue model?

D) Twitter

36.81) Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers.

B.B

37.79) Interactivity that enables product customization alters industry structure by decreasing the threat of substitutes. 回答錯誤

A.A

38.34) Information asymmetries enable some firms to have an edge over others.

A.A

39.36) In the subscription revenue model, a company primarily generates income from the display of ads. 

B.B

40.77) A company's strong linkages with its customers increase switching costs.

A.A

41.35) Slow followers are sometimes more successful than first movers.

A.A

42.75) The term unfit fitness refers to a situation in which employees of a firm have the wrong skills for the current environment.

A.A

43.76) Scale economies are efficiencies that result from increasing the size of the business.

A.A

44.37) GoFundMe is a prominent example of a rewards-based crowdfunding site.

B.B

45.55) On-demand service companies are characterized by the free sharing of resources between the company and consumers.

A.A

46.32) A value proposition defines how a company's product or service will generate revenue for the firm.

B.B

47.65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

A.A

48.80) E-commerce has increased price competition in many markets.

A.A

49.78) The Internet's universal standards have changed industry structure by increasing barriers to entry and decreasing competition within an industry.

B.B

50.33) Real markets are imperfect.

A.A

------

------

1.28. 網站扮演市場製造者的角色,將買賣雙方聚集起來,並從交易中抽取用,是屬於哪一種收益模式?[單選] 回答錯誤

C.經紀模式

2.20. 在策略定位中,Michael Porter的價值鏈分析,是屬於哪一種分析?[單選]

C.企業內部環境

3.6) A firm's ________ describes how a firm will produce a superior return on invested capital.

B) revenue model

4.7. 7-11 在網路上架設一個官方網站,以提供消費者最新資訊、活動介紹等服務,若以電子商務光譜的概念來看,7-11 的策略方向是屬於?(單選)

(D) 修改營運模式

5.22. 安安是個忙碌的上班族,常沒有時間到實體店面去買衣服,只好回家上AWASEBA網站,在此她可選擇自己的身材型態,透過虛擬人物試穿來感覺是不是適合該服飾,請問AWASEBA的策略方向是屬於何種營運模式?[單選]

B.創新營運模式

6.25. 小仙是個愛網購的女生,每當想要買東西時,總會上愛合購揪團買東西,請問愛合購是屬於何種網路商業模式?[單選]

D.中介平台

7.50) The basic value proposition of community providers is:

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

8.44) Which of the following is an example of a company using the content provider model?

B) Netflix

9.52) All of the following are business models employed in the online music industry except:

B) peer-to-peer streaming.

10.60) Ariba Supplier Network is an example of a(n):

C) e-procurement firm.

11.21) Which of the following is an unfair competitive advantage?

A) brand name

12.29) Which of the following is not a key element of an elevator pitch?

C) legal structure

13.2) Which of the following uses a subscription revenue model for books?

B) Amazon Kindle Unlimited

14.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]

B.目錄式價格

15.26) All of the following can be considered examples of the market creator business model except:

D) Twitter.

16.61) Which of the following may offer its customers value chain management software?

B) e-procurement companies

17.15) All of the following can be considered a direct or indirect competitor of Amazon except:

D) Priceline.

18.28) A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n):

B) angel investor.

19.29. 網站藉由為合作夥伴介紹生意收取介紹費,或為其帶來任何銷售結果而收取某部分收益,是屬於哪一種收益模式?[單選]

C.合作收益模式

20.4) Which element of the business model refers to the presence of substitute products in the market?

B) competitive environment

21.24.阿傑是個Apple的重度使用者,每天都會逛AppleApp Store搜尋最新的應用程式,請問App Store豐富的數位化內容是屬於網路商業模式的哪種特性? [單選]

B.核心面

22.13) All of the following can be considered a direct competitor of Priceline except:

D) ESPN.

23.36.lativ希望成為網路休閒服飾的領導品牌,由此可見這家企業有明確的企業願景,請問這是屬於策略發展的哪個階段?[單選]

B.策略起始

24.20) All of the following may lead to a competitive advantage except:

C) fewer products.

25.57) All of the following are examples of business-to-business (B2B) business models except:

D) portals.

26.17. 網站藉由提供訪客內容、服務或產品資訊,也提供一個廣告場所,然後向廣告主收取費用,是屬於哪一種收益模式?[單選]

A.廣告收益模式

27.3) Which element of the business model addresses what a firm provides that other firms do not and cannot?

D) value proposition

28.30. 藉由蒐集關於消費者及其消費習慣的資訊,並將其販賣給那些需要得知顧客情報的企業以獲取利潤,是屬於哪一種收益模式?[單選]

D.商情媒介收益模式

29.30) First movers often fail because:

B) they lack complementary resources needed to sustain their advantages.

30.39. 斌斌顧問公司衡量一家網路商城成不成功,常會由網站流量、消費者停留長度、購買數量等面向來看,這些衡量方法是屬於DeLone & MeLean (2004)提出的哪種概念?[單選] 回答錯誤

A.使用性

31.8. 下列何者不屬於Porter 的產業五力?[單選]

D.電子商務科技

32.54) In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

A) market creator

33.51) eBay uses all of the following business models except:

C) content provider.

34.45) Which of the following is not an example of the bricks-and-clicks e-tailing business model?

C) Bluefly

35.46) In general, the key to becoming a successful content provider is to:

A) own the content being provided.

36.79) Interactivity that enables product customization alters industry structure by decreasing the threat of substitutes.

A.A

37.34) Information asymmetries enable some firms to have an edge over others.

A.A

38.78) The Internet's universal standards have changed industry structure by increasing barriers to entry and decreasing competition within an industry.

B.B

39.33) Real markets are imperfect.

A.A

40.80) E-commerce has increased price competition in many markets.

A.A

41.36) In the subscription revenue model, a company primarily generates income from the display of ads. 

B.B

42.35) Slow followers are sometimes more successful than first movers.

A.A

43.32) A value proposition defines how a company's product or service will generate revenue for the firm.

B.B

44.55) On-demand service companies are characterized by the free sharing of resources between the company and consumers.

A.A

45.37) GoFundMe is a prominent example of a rewards-based crowdfunding site.

B.B

46.65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

A.A

47.75) The term unfit fitness refers to a situation in which employees of a firm have the wrong skills for the current environment.

A.A

48.77) A company's strong linkages with its customers increase switching costs.

A.A

49.81) Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers.

B.B

50.76) Scale economies are efficiencies that result from increasing the size of the business.

A.A

---------------

43. 透過iPhone就能夠到App Stores下載軟體,使得每一支iPhone都具有獨特的個人風格,而可依照自己的想法與需求轉變成遊戲機、事務機等,創造出獨特性與特殊性。請問Apple掌握到了網路商業模式的哪種特性?[單選] 回答錯誤

A.只要動手架設網站,其他的都會水到渠成

--------------

1) ________ and ________ are typically the most easily identifiable aspects of a company's business model.

B) Value proposition; revenue model

3) Which element of the business model addresses what a firm provides that other firms cannot?

D) value proposition

4) Which element of the business model refers to the presence of substitute products in the market?

B) competitive environment

5) Which of the following represent Amazon's primary value proposition(s)?

B) selection and convenience

6) A firm's ________ describes how a firm will produce a return on invested capital.

B) revenue model

7) Which of the following is an example of the subscription revenue model?

A) Scribd

8) Stickiness is an important attribute for which of the following revenue models?

A) advertising revenue model

9) Which of the following companies use a transaction fee revenue model?

B) E*Trade

10) Which of the following is an example of the affiliate revenue model?

D) MyPoints

11) Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?

C) freemium strategy

12) Which of the following is not a significant influence on a company's competitive environment?

C) the availability of supportive organizational structures

13) All of the following would be considered a direct competitor of Priceline except:

D) ESPN.

14) The existence of many competitors in any one market segment may indicate:

B) the market is saturated.

15) All of the following can be considered a direct or indirect competitor of Amazon except:

D) Priceline.

16) A perfect market is one in which:

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

17) Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:

C) incubators.

18) A ________ specifically details how you plan to find customers and sell your product.

D) market strategy

19) Which of the following was not able to successfully implement a freemium business model?

D) Baremetrics

20) All of the following may lead to a competitive advantage except:

C) fewer products.

21) Which of the following is an unfair competitive advantage?

A) brand name

22) Which of the following gives a business model the most credibility with outside investors?

A) the firm's management team

23) Which of the following statements about Foursquare is not true?

D) In 2016, Foursquare decided to refocus its effort on developing a subscription-based revenue model.

24) Which type of investor typically becomes interested in a start-up company after it has begun generating revenue?

D) venture capital investors

25) Which of the following is another name for a revenue model?

C) financial model

26) All of the following use a social network marketing strategy except:

D) Amazon.

27) The use of a company's competitive advantage to penetrate surrounding markets is known as ________.

C) leverage

28) A wealthy individual who invests personal funds in a start-up in exchange for an equity share in the business is referred to as a(n) ________.

B) angel investor

29) Which of the following is not a key element of an elevator pitch?

C) legal structure

40) Which of the following is not a community provider?

C) Blue Nile

42) An example of a company using the content provider model is:

B) Rhapsody.

43) Which of the following is not an example of the bricks-and-clicks e-tailing business model?

C) Bluefly

45) In general, the key to becoming a successful content provider is to:

A) own the content being provided.

47) All of the following use an advertising revenue model except:

D) Amazon.

48) Which of the following is not considered a portal?

C) Amazon

49) Portals primarily generate revenue in all of the following ways except:

C) sales of goods.

50) The basic value proposition of community providers is:

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

51) eBay uses all of the following business models except:

C) content provider.

52) All of the following are business models employed in the online music industry except:

B) peer-to-peer streaming.

53) The financial services, travel services, and job placement services industries typically use the ________ business model.

B) transaction broker

54) In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

A) market creator

57) All of the following are examples of business-to-business (B2B) business models except:

D) portals.

58) What is the primary revenue model for an e-distributor?

A) sales

59) Amazon is an example of which of the following business models?

C) e-distributor

60) ________ create and sell access to digital markets.

C) E-procurement firms

61) Which of the following may offer its customers value chain management software?

B) e-procurement companies

62) Over the past decade, the number of exchanges has:

B) diminished sharply.

63) TheSeam is an example of a(n):

C) industry consortium.

64) A ________ marketplace supplies products and services of interest to particular industries.

D) vertical

67) Which business strategy involves implementing a new, more efficient set of business processes that other firms cannot yet obtain?

A) strategy of cost competition

68) Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

A) global reach

69) Which of the following is not a primary activity in a firm value chain?

B) finance/accounting

70) A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

C) value web

71) If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

A) enable individual customization of the product by consumers.

72) A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

D) focus

73) ________ technologies are technologies that enable the incremental improvement of products and services.

A) Sustaining

74) Innovative entrepreneurs and their business firms that destroy existing business models are referred to as ________.

C) disruptors

-----

1) ________ and ________ are typically the most easily identifiable aspects of a company's business model.

A) Market strategy; market opportunity

B) Value proposition; revenue model

C) Competitive advantage; competitive environment

D) Revenue model; market opportunity

Answer: B

2) Which of the following uses a subscription revenue model for books?

A) Spotify

B) Amazon Kindle Unlimited

C) Rhapsody

D) Pandora

Answer: B

3) Which element of the business model addresses what a firm provides that other firms do not and cannot?

A) competitive environment

B) competitive advantage

C) market strategy

D) value proposition

Answer: D

4) Which element of the business model refers to the presence of substitute products in the market?

A) value proposition

B) competitive environment

C) competitive advantage

D) market opportunity

Answer: B

5) Which of the following are Amazon's primary value propositions?

A) personalization and customization

B) selection and convenience

C) reduction of price discovery cost

D) management of product delivery

Answer: B

6) A firm's ________ describes how a firm will produce a superior return on invested capital.

A) value proposition

B) revenue model

C) market strategy

D) competitive advantage

Answer: B

7) Which of the following does not use a subscription revenue model?

A) Apple Music

B) eHarmony

C) Ancestry

D) Twitter

Answer: D

8) Stickiness is an important attribute for which of the following revenue models?

A) advertising revenue model

B) subscription revenue model

C) transaction fee revenue model

D) affiliate revenue model

Answer: A

9) Which of the following companies uses a transaction fee revenue model?

A) Yahoo

B) E*Trade

C) Twitter

D) Birchbox

Answer: B

10) Which of the following is an example of the affiliate revenue model?

A) Scribd

B) eBay

C) L.L. Bean

D) MyPoints

Answer: D

11) Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

A) advertising revenue model

B) subscription revenue model

C) freemium strategy

D) premium strategy

Answer: C

12) Which of the following factors is not a significant influence on a company's competitive environment?

A) how many competitors are active

B) what the market share of each competitor is

C) the availability of supportive organizational structures

D) how competitors price their products

Answer: C

13) All of the following can be considered a direct competitor of Priceline except:

A) Travelocity.

B) Expedia.

C) Orbitz.

D) ESPN.

Answer: D

14) The existence of many competitors in any one market segment may indicate:

A) an untapped market niche.

B) the market is saturated.

C) no one firm has differentiated itself within that market.

D) a market that has already been tried without success.

Answer: B

15) All of the following can be considered a direct or indirect competitor of Amazon except:

A) eBay.

B) Apple's iTunes Store.

C) Walmart.

D) Priceline.

Answer: D

16) A perfect market is one in which:

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

B) one firm develops an advantage based on a factor of production that other firms cannot purchase.

C) one participant in the market has more resources than the others.

D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

Answer: A

17) Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

A) angel investors.

B) crowdfunders.

C) incubators.

D) venture capital investors.

Answer: C

18) A ________ specifically details how you plan to find customers and to sell your product.

A) sales analysis

B) business plan

C) competitive strategy

D) market strategy

Answer: D

19) Which of the following is not a community provider?

A) LinkedIn

B) Facebook

C) Blue Nile

D) Pinterest

Answer: C

20) Which of the following is not a variation of the e-tailer business model?

A) bricks-and-clicks

B) virtual merchant

C) market creator

D) manufacturer-direct

Answer: C

21) Which of the following is an example of a company using the content provider model?

A) Priceline

B) Netflix

C) Dell

D) eBay

Answer: B

22) Which of the following is not an example of the bricks-and-clicks e-tailing business model?

A) Walmart

B) Target

C) Bluefly

D) Staples

Answer: C

23) In 2018, the overall retail market in the United States was estimated to be about:

A) $53 trillion.

B) $5.3 trillion.

C) $530 billion.

D) $53 billion.

Answer: B

24) In general, the key to becoming a successful content provider is to:

A) own the content being provided.

B) own the technology by which content is created, presented, and distributed.

C) provide online content for free.

D) provide other services as well as online content.

Answer: A

25) Which of the following uses a subscription-based sales revenue model?

A) Yahoo

B) eBay

C) MyPoints

D) Dollar Shave Club

Answer: D

26) All of the following may lead to a competitive advantage except:

A) less expensive suppliers.

B) better employees.

C) fewer products.

D) superior products.

Answer: C

27) Which of the following is an unfair competitive advantage?

A) brand name

B) access to global markets

C) lower product prices

D) superior technology

Answer: A

28) Which of the following gives a business model the most credibility with outside investors?

A) the firm's management team

B) the firm's value proposition

C) the firm's market opportunity

D) the firm's market strategy

Answer: A

29) Which of the following statements about Foursquare is not true?

A) Foursquare combines a social network business model with location-based technology.

B) Foursquare initially struggled to find profitability.

C) The growth in Foursquare's revenue since 2015 has been driven primarily by significant increases in the numbers of users of its Swarm app.

D) Foursquare's users are typically amenable to having their location tracked and their data collected, since tracking users' location is the express purpose of the app.

Answer: C

30) Which type of investor typically becomes interested in a startup company after it has begun generating revenue?

A) incubators

B) angel investors

C) crowdfunders

D) venture capital investors

Answer: D

31) Which of the following is another name for a revenue model?

A) business model

B) business strategy

C) financial model

D) financial statements

Answer: C

32) All of the following can be considered examples of the market creator business model except:

A) eBay.

B) Priceline.

C) Uber.

D) Twitter.

Answer: D

33) ________ is defined by company using its competitive advantage to gain in surrounding markets.

A) Market strategy

B) Differentiation

C) Leverage

D) Focus

Answer: C

34) A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n):

A) incubator.

B) angel investor.

C) venture capital investor.

D) crowdfunder

Answer: B

35) Which of the following is not a key element of an elevator pitch?

A) exit strategy

B) growth metrics

C) legal structure

D) market opportunity

Answer: C

36) A value proposition defines how a company's product or service will generate revenue for the firm.

FALSE

37) Real markets are imperfect.

TRUE

38) Information asymmetries enable some firms to have an edge over others.

TRUE

39) Slow followers are sometimes more successful than first movers.

TRUE

40) In the subscription revenue model, a company primarily generates income from the display of ads.

FALSE

41) The Jumpstart Our Business Startups (JOBS) Act, and issuance of enabling regulations by the Securities and Exchange Commission, allows a start-up company to use crowdfunding to solicit investors to invest in small and early-stage startups.

TRUE

46) First movers often fail because:

A) their competitive advantage is unfair.

B) they lack complementary resources needed to sustain their advantages.

C) they are operating in a perfect market.

D) they fail to leverage their competitive assets.

Answer: B

47) All of the following use an advertising revenue model except:

A) Facebook.

B) Yahoo.

C) Google.

D) Walmart.

Answer: D

48) Which of the following is not considered a portal?

A) Yahoo

B) MSN

C) Amazon

D) AOL

Answer: C

49) Portals primarily generate revenue in all of the following ways except:

A) charging advertisers for ad placement.

B) collecting transaction fees.

C) sales of goods.

D) charging subscription fees.

Answer: C

50) The basic value proposition of community providers is:

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

B) they offer consumers valuable, convenient, time-saving, and low-cost alternatives to traditional service providers.

C) they create a digital electronic environment for buyers and sellers to meet, agree on a price, and transact.

D) they increase customers' productivity by helping them get things done faster and more cheaply.

Answer: A

51) eBay uses all of the following business models except:

A) B2C market creator.

B) C2C market creator.

C) content provider.

D) e-commerce infrastructure provider.

Answer: C

52) All of the following are business models employed in the online music industry except:

A) subscription.

B) peer-to-peer streaming.

C) download-and-own.

D) cloud streaming.

Answer: B

53) The financial services, travel services, and job placement services industries typically use the ________ business model.

A) community provider

B) transaction broker

C) market creator

D) e-tailer

Answer: B

54) In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

A) market creator

B) community provider

C) e-tailer

D) portal

Answer: A

55) On-demand service companies are characterized by the free sharing of resources between the company and consumers

TRUE

57) All of the following are examples of business-to-business (B2B) business models except:

A) e-distributors.

B) e-procurement.

C) exchanges.

D) portals.

Answer: D

58) What is the primary revenue model for an e-distributor?

A) sales

B) transaction fee

C) advertising

D) subscription

Answer: A

59) Amazon Business is an example of which of the following business models?

A) B2B service provider

B) exchange

C) e-distributor

D) industry consortia

Answer: C

60) Ariba is an example of a(n)________.

A) e-distributor

B) portal

C) e-procurement firm

D) Industry consortium

Answer: C

61) Which of the following may offer its customers value chain management software?

A) e-distributors

B) e-procurement companies

C) exchanges

D) community providers

Answer: B

62) Over the past decade, the number of exchanges has:

A) greatly increased.

B) diminished sharply.

C) stayed about the same.

D) increased slowly but steadily.

Answer: B

63) The Seam is an example of a(n):

A) private industrial network.

B) exchange.

C) industry consortium.

D) e-distributor.

Answer: C

64) A ________ marketplace supplies products and services of interest to particular industries.

A) perfect

B) differentiated

C) horizontal

D) vertical

Answer: D

65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

TRUE

67) A ________ refers to a competitive strategy in which firms attempt to achieve lower business process costs.

A) strategy of cost competition

B) scope strategy

C) customer intimacy strategy

D) focus/market niche strategy

Answer: A

68) Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

A) global reach

B) richness

C) interactivity

D) personalization

Answer: A

69) Which of the following is not a primary activity in a firm value chain?

A) outbound logistics

B) finance/accounting

C) operations

D) after-sales service

Answer: B

70) A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

A) value chain

B) value system

C) value web

D) business strategy

Answer: C

71) If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

A) enable individual customization of the product by consumers.

B) implement a strategy of commoditization.

C) adopt a strategy of cost competition.

D) develop a scope strategy to compete within a narrower market segment.

Answer: A

72) A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

A) scope

B) differentiation

C) commoditization

D) focus

Answer: D

73) ________ technologies are technologies that enable the incremental improvement of products and services.

A) Sustaining

B) Differentiating

C) Disruptive

D) Commodity

Answer: A

74) Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

A) crowdfunders.

B) venture capitalists.

C) disruptors.

D) angel investors.

Answer: C

75) The term unfit fitness refers to a situation in which employees of a firm have the wrong skills for the current environment.

TRUE

76) Scale economies are efficiencies that result from increasing the size of the business.

TRUE

77) A company's strong linkages with its customers increase switching costs.

TRUE

78) The Internet's universal standard have changed industry structure by increasing barriers to entry and decreasing competition within an industry.

FALSE

79) Interactivity that enables product customization alters industry structure by decreasing the threat of substitutes.

TRUE

80) E-commerce has increased price competition in many markets.

TRUE

81) Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers.

FALSE

________ and ________ are typically the most easily identifiable aspects of a company's business model.

A) Market strategy; market opportunity

B) Value proposition; revenue model

C) Value proposition; competitive environment

D) Revenue model; market strategy

B

All of the following are using a subscription revenue model for music except:

A) Spotify.

B) Scribd.

C) Rhapsody.

D) Pandora.

B

Which element of the business model addresses what a firm provides that other firms do not and cannot?

A) revenue model

B) competitive advantage

C) market strategy

D) value proposition

D

Which element of the business model refers to the presence of substitute products in the market?

A) value proposition

B) competitive environment

C) competitive advantage

D) market strategy

B

Which of the following are Amazon's primary value propositions?

A) personalization and customization

B) selection and convenience

C) reduction of price discovery cost

D) management of product delivery

B

A firm's ________ describes how a firm will produce a superior return on invested capital.

A) value proposition

B) revenue model

C) market strategy

D) competitive advantage

B

Which of the following is an example of the subscription revenue model?

A) eHarmony

B) eBay

C) E*Trade

D) Twitter

A

Stickiness is an important attribute for which of the following revenue models?

A) advertising revenue model

B) subscription revenue model

C) transaction fee revenue model

D) sales revenue model

A

Which of the following companies uses a transaction fee revenue model?

A) Yahoo

B) E*Trade

C) Twitter

D) Sears

B

Which of the following is an example of the affiliate revenue model?

A) Scribd

B) eBay

C) L.L. Bean

D) MyPoints

D

Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?

A) advertising revenue model

B) subscription revenue model

C) freemium strategy

D) transaction fee revenue model

C

Which of the following factors is not a significant influence on a company's competitive environment?

A) how many competitors are active

B) what the market share of each competitor is

C) the availability of supportive organizational structures

D) how competitors price their products

C

Which of the following would be considered an indirect competitor of Priceline?

A) Travelocity

B) Expedia

C) Orbitz

D) TripAdvisor

B

The existence of a large number of competitors in any one market segment may indicate:

A) an untapped market niche.

B) the market is saturated.

C) no one firm has differentiated itself within that market.

D) a market that has already been tried without success.

B

All of the following can be considered a direct or indirect competitor of Amazon except:

A) eBay.

B) Apple's iTunes Store.

C) Walmart.

D) Starbucks.

D

A perfect market is one in which:

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

B) one firm develops an advantage based on a factor of production that other firms cannot purchase.

C) one participant in the market has more resources than the others.

D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

A

Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:

A) angel investors.

B) crowdfunders.

C) incubators.

D) venture capital investors.

C

A ________ specifically details how you plan to find customers and to sell your product.

A) sales analysis

B) business plan

C) competitive strategy

D) market strategy

D

Which of the following is not a community provider?

A) LinkedIn

B) Facebook

C) Priceline

D) Pinterest

C

Which of the following is not a variation of the e-tailer business model?

A) bricks-and-clicks

B) virtual merchant

C) market creator

D) manufacturer-direct

C

An example of a company using the content provider model is:

A) Priceline.

B) Rhapsody.

C) Dell.

D) eBay.

B

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

A) Walmart

B) Sears

C) Bluefly

D) Staples

C

The overall retail market in the United States in 2015 was estimated at about:

A) $48 trillion.

B) $4.8 trillion.

C) $480 billion.

D) $48 billion.

B

In general, the key to becoming a successful content provider is to:

A) own the content being provided.

B) own the technology by which content is created, presented, and distributed.

C) provide online content for free.

D) provide other services as well as online content.

A

Which of the following was not able to successfully implement a freemium business model?

A) Pandora

B) Dropbox

C) LinkedIn

D) Ning

D

All of the following may lead to a competitive advantage except:

A) less expensive suppliers.

B) better employees.

C) fewer products.

D) superior products.

C

Which of the following is an unfair competitive advantage?

A) brand name

B) access to global markets

C) lower product prices

D) superior technology

A

Which of the following gives a business model the most credibility with outside investors?

A) the firm's management team

B) the firm's value proposition

C) the firm's market opportunity

D) the firm's market strategy

A

Which of the following statements about Foursquare is not true?

A) Foursquare combines a social network business model with location-based technology.

B) Foursquare began operating without a revenue model.

C) Foursquare's business model faces significant intellectual property concerns.

D) Foursquare has been able to command a high valuation from venture capital investors despite unimpressive revenue and profits.

C

Which type of investor typically becomes interested in a start-up company after it has begun generating revenue?

A) incubators

B) angel investors

C) crowdfunders

D) venture capital investors

D

Which of the following is another name for a revenue model?

A) business model

B) business strategy

C) financial model

D) financial statements

C

All of the following use a social network marketing strategy except:

A) Twitter.

B) YouTube.

C) Pinterest.

D) Amazon.

D

The use by a company of its competitive advantage to achieve more advantage in surrounding markets is known as ________.

A) market strategy

B) differentiation

C) leverage

D) focus

C

A wealthy individual who invests personal funds in a start-up in exchange for an equity stock in the business is referred to as a(n) ________.

A) incubator

B) angel investor

C) venture capital investor

D) crowdfunder

B

Which of the following is not a key element of an elevator pitch?

A) exit strategy

B) growth metrics

C) legal structure

D) market opportunity

C

The business model of e-tailers is quite similar to that of:

A) e-distributors.

B) transaction brokers.

C) exchanges.

D) service providers.

A

All of the following use an advertising revenue model except:

A) Twitter.

B) Yahoo.

C) Google.

D) Amazon.

D

Which of the following is not considered a portal?

A) Yahoo

B) MSN

C) Amazon

D) AOL

C

Portals primarily generate revenue in all of the following ways except:

A) charging advertisers for ad placement.

B) collecting transaction fees.

C) sales of goods.

D) charging subscription fees.

C

The basic value proposition of community providers is:

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

B) they offer consumers valuable, convenient, time-saving, and low cost alternatives to traditional service providers.

C) they create a digital electronic environment for buyers and sellers to meet, agree on a price, and transact.

D) they increase customers' productivity by helping them get things done faster and more cheaply.

A

eBay uses all of the following business models except:

A) B2C market creator.

B) C2C market creator.

C) content provider.

D) e-commerce infrastructure provider.

C

All of the following are business models employed in the online music industry except:

A) subscription.

B) peer-to-peer streaming.

C) download-and-own.

D) cloud streaming.

B

The financial services, travel services, and job placement services industries typically use the ________ business model.

A) community provider

B) transaction broker

C) market creator

D) e-tailer

B

In the ________ business model, a Web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

A) market creator

B) community provider

C) e-tailer

D) portal

A

All of the following are examples of business-to-business (B2B) business models except:

A) e-distributors.

B) e-procurement.

C) exchanges.

D) e-tailers.

D

What is the primary revenue model for an e-distributor?

A) sales

B) transaction fee

C) advertising

D) subscription

A

________ create and sell access to digital markets.

A) E-distributors

B) Portals

C) E-procurement firms

D) Market creators

C

Which of the following may offer its customers value chain management software?

A) e-distributors

B) e-procurement companies

C) exchanges

D) community providers

B

Over the past decade, the number of exchanges has:

A) greatly increased.

B) diminished sharply.

C) stayed about the same.

D) increased slowly but steadily.

B

SupplyOn is an example of a(n):

A) private industrial network.

B) exchange.

C) industry consortium.

D) e-distributor.

C

A ________ marketplace supplies products and services of interest to particular industries.

A) perfect

B) differentiated

C) horizontal

D) vertical

D

Which business strategy involves implementing a new, more efficient set of business processes that other firms cannot yet obtain?

A) strategy of cost competition

B) scope strategy

C) customer intimacy strategy

D) focus/market niche strategy

A

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

A) global reach

B) richness

C) interactivity

D) personalization

A

Which of the following is not a primary activity in a firm value chain?

A) outbound logistics

B) finance/accounting

C) operations

D) after-sales service

B

A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

A) value chain

B) value system

C) value web

D) business strategy

C

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

A) enable individual customization of the product by consumers.

B) implement a strategy of commoditization.

C) adopt a strategy of cost competition.

D) develop a scope strategy to compete within a narrower market segment.

A

A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

A) scope

B) differentiation

C) cost

D) focus

D

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as ________.

A) crowdfunders

B) venture capitalists

C) disruptors

D) angel investors

C

Which of the following best defines e-commerce?

A) Digitally enabled commercial transactions between and among organizations and individuals

B) The use of digital technologies in a firm's daily activities

C) The digital enablement of transactions and processes within an organization

D) Any electronically based organizational activity that supports a firm's market exchanges

Digitally enabled commercial transactions between and among organizations and individuals

Which of the following is an example of e-business?

A) Amazon's inventory control system

B) The Amazon.com website

C) An Amazon mobile app

D) Amazon's Pinterest page

Amazon's inventory control system

Which of the following is not true about the use of apps?

A) Users spend nearly 90% of their smartphone app minutes using their top five apps

B) Users still spend more time using mobile browsers than they do using mobile apps

C) Apps are easier to control and monetize than websites

D) Users typically use about 20 different apps per month

Users still spend more time using mobile browsers than they do using mobile apps

Which of the following is not a major technology trend in e-commerce in 2020-2021?

A) Cloud computing enables content stored on Internet-based servers to be accessed by consumer devices such as smartphones

B) Firms are tuning to business analytics to make sense out of big data

C) Smart speakers provide an additional platform for e-commerce

D) Growth of the Internet of Things slow down

Growth of the Internet of Things slow down

Which of the following has not been the subject of concern about its increasing market dominance in 2020-2021?

A) Amazon

B) Google

C) Netflix

D) Facebook

Netflix

Which of the following statements about the Web is not true?

A) The Web is the technology upon which the Internet is based

B) The Web was the original "killer app"

C) The Web provides access to pages written in HTML

D) The Web is both a communications infrastructure and information storage system

The Web is the technology upon which the Internet is based

Which of the following was the original "killer app" that made the Internet commercially interesting and extraordinarily popular?

A) E-commerce

B) The Web

C) Social networks

D) Mobile apps

The Web

The term e-commerce refers to the digital enabling of business processes both inside and outside the firm

FALSE

E-commerce and e-business systems blur together at the business firm boundary, where internal business systems link up with suppliers or customers

TRUE

"Exchange of value" is the key factor in determining if a transaction is "commerce"?

TRUE

Which of the following is not a unique feature of e-commerce technology?

A) Interactivity

B) Social technology

C) Information asymmetry

D) Richness

Information asymmetry

Which of the following features of e-commerce technology is related to the concept of network externalities?

A) Richness

B) Interactivity

C) Universal standards

D) Information density

Universal standards

Reach represents the total number users or customers an e-commerce business can obtain

TRUE

Ubiquity increases the cognitive energy required to transact in a marketplace

FALSE

Universal standards make price discovery more costly, slower, and less accurate

FALSE

The early years of e-commerce were driven by all of the following factors except:

A) An emphasis on exploiting traditional distribution channels

B) A huge infusion of venture capital funds

C) An emphasis on quickly achieving very high market visibility

D) Visions of profiting form new technology

An emphasis on exploiting traditional distribution channels

Which of the following is a characteristic of the Reinvention phase of e-commerce?

A) Massive proliferation of dot-com start-ups

B) Widespread adoption of broadband networks

C) Rapid growth of search engine advertising

D) Expansion of e-commerce to include services as well as goods

Expansion of e-commerce to include services as well as goods

Which of the following is an example of an e-commerce first mover that failed?

A) Etsy

B) eToys

C) eBay

D) eTrade

eToys

The Reinvention period of e-commerce is as much a sociological phenomenon as it is a technological or business phenomenon

TRUE

___ and ___ are typically the most easily identifiable aspects of a company's business model

A) Market strategy; market opportunity

B) Value proposition; revenue model

C) Competitive advantage; competitive environment

D) Revenue model; market opportunity

Value proposition; revenue model

Which of the following uses a subscription revenue model for books?

A) Spotify

B) Amazon Kindle Unlimited

C) eHarmony

D) Market opportunity

Amazon Kindle Unlimited

Which element of the business model refers to the presence of substitute products in the market?

A) Value proposition

B) Competitive environment

C) Competitive advantage

D) Market opportunity

Competitive advantage

A firm's ___ describes how a firm will produce a superior return on invested capital

A) Value proposition

B) Revenue model

C) Market strategy

D) Competitive advantage

Revenue model

Which of the following does not use a subscription revenue model?

A) Apple Music

B) eHarmony

C) Ancestry

D) Twitter

Twitter

Which of the following factors is not significant influence on a company's competitive environment?

A) How many competitors are active

B) What market share of each competitor is

C) The availability of supportive organizational structures

D) How competitors' price their products

The availability of supportive organizational structures

All of the following can be considered a direct competitor of Priceline except:

A) Travelocity

B) Expedia

C) Orbitz

D) ESPN

ESPN

A perfect market is one in which:

A) There are no competitive advantages or asymmetries because all firms have equal access to all factors of production

B) One firm develops an advantage based on a factor of production that other firms cannot purchase

C) One participant in the market has resources than others

D) Competition is at a minimum, as each niche market within an industry is served by the company advantage

There are no competitive advantages or asymmetries because all firms have equal access to all factors of production

Which of the following gives a business model the most credibility with outside investors?

A) The firm's management team

B) The firm's value proposition

C) The firm's opportunity

D) Regulation crowdfunding

The firm's management team

Which of the following types of crowdfunding involves people making contributions to others with no expectation of any return?

A) Donor-based crowdfunding

B) Rewards-based crowdfunding

C) Equity crowdfunding

D) Regulation crowdfunding

Donor-based crowdfunding

In general, the key to becoming a successful content provider is to:

A) Own the content being provided

B) Own the technology by which content is created, presented, and distributed

C) Provide online content for free

D) Provide other services as well as online content

Own the content being provided

Portals primarily generate revenue in all of the following way except:

A) Charging advertisers for ad placement

B) Collecting transaction fees

C) Sales of goods

D) Charging subscription fees

Sales of goods

In the ___ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices

A) Market creator

B) Community provider

C) E-tailer

D) Portal

Market creator

Grainier is an example of which of the following business models?

A) E-distributors

B) E-procurement companies

C) Exchanges

D) Community providers

E-distributor

Which of the following may offer its customers value chain management software?

A) E-distributors

B) E-procurement companies

C) Exchanges

D) Community providers

E-procurement companies

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

A) Enable individual customization of the product by consumers

B) Implement a strategy of commoditization

C) Adopt a strategy

D) Develop a scope strategy

Enable individual customization of the product by consumers

GoFundMe is a prominent example of rewards-based crowdfunding site

FALSE

On-demand service companies are characterized by the free sharing of resources between the company and consumers

TRUE

Scale economies are efficiencies that result from increasing the size of the business

TRUE

The internet's universal standards have changed industry structure by increasing barriers to entry and decreasing competition within an industry

FALSE

Which of the following e-commerce technology dimensions creates greater opportunities for cyber bullying?

A) Information density

B) Interactivity

C) Social technology

D) Ubiquity

Social technology

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A) The Golden Rule

B) Universalism

C) Collective Utilitarian Principle

D) The Social Contract Theory

The Golden Rule

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A) The Golden Rule

B) Slippery Slope

C) The Social Contract Rule

D) No Free Lunch

No Free Lunch

Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?

A) Universalism

B) Slippery Slope

C) The Social Contract Rule

D) The Golden Rule

Slippery Slope

Which ethical principle tells you that it is wise to assume perfect information markets?

A) The Golden Rule

B) The New York Times Test

C) The Collective Utilitarian Principle

D) The Social Contract Theory

The New York Times Test

Which of the following basic ethical concepts plays an important role in defining privacy?

A) Responsibility

B) Accountability

C) Liability

D) Due Process

Due Process

The online retail sector of the retail industry is most similar to the ___ sector

A) Specialty stores

B) General merchandise

C) Mail order/telephone order (MOTO)

D) Consumer durables

Mail order/telephone order (MOTO)

Which of the following is not one of the seven major segments of the retail industry?

A) Electronic and computer

B) Specialty stores

C) Gasoline and fuel

D) Food beverage

Electronics and computers

All of the following were parts of the vision during the early days of e-commerce except the belief that:

A) New, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business

B) Online consumers were rational and cost-driven

C) Entry costs to the online retail market would be much less than those needed to establish a physical storefront

D) The cost of acquiring customers would be much lower

New, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business

All of the following have introduced social commerce functionality, such as buy buttons, shoppable ads, and marketplaces except:

A) Facebook

B) Pinterest

C) Instagram

D) Tumblr

Tumblr

All of the following are advantages of online retail except:

A) Lower supply chain costs

B) Lower cost of distribution

C) Ability to change prices

D) Faster delivery of goods

Faster delivery of goods

Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration?

A) Online catalog

B) Online order, in-store pickup

C) Online supply-push

D) Online promotions for offline purchases

Online supply-push

Apart from Amazon, the top online retail firms in terms of online sales are all primarily ___ firms

A) Manufacturer-direct

B) Omni-channel

C) Web-only

D) Catalog merchant

Omni-channel

Consumers are primarily price-driven when shopping on the Internet

FALSE

Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade

TRUE

Which of the following statements about millennials is not true?

A) Millennials are more likely to have read a book in the past 12 months than older adults

B) Millennials overwhelmingly prefer e-books to printed books

C) Almost two-thirds of millennials view digital videos daily

D) Millennials are much more to use streaming services such as Netflix, Hulu, and Amazon than older adults

Millennials overwhelmingly prefer e-books to printed books

All of the following are examples of technology convergence except:

A) The iPad

B) Amazon Books Publishing

C) Apple TV

D) Smartphones

Amazon Books Publishing

Which of the following occurs first int he processes of content convergence related to books?

A) Media integration

B) Media migration

C) Media transformation

D) Media maturity

Media migration

The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:

A) Aggregation

B) Repackaging

C) Media transformation

D) Industry convergence

Industry convergence

DRM refers to a combination of ___ for protecting digital content

A) Hardware and software methods

B) Technical and legal means

C) User and publisher agreements

D) Local and remote policies

Technical and legal means

The COVID-19 pandemic has resulted in an increase in advertising revenue for online content providers

FALSE

What is a node?

A) A type of cryptocurrency

B) Blockchain

C) A computer on a Blockchain network

D) An exchange

A computer on a Blockchain network

Where do you store your cryptocurrency?

A) Bank account

B) Floppy Disk

C) Wallet

D) In your pocket

Wallet

Where is the LEAST SAFE place to keep your cryptocurrency?

A) In your pocket

B) On an exchange

C) On a hot wallet

D) At your work desk

On an exchange

What is a blockchain?

A) A distributed ledger on a peer to peer network

B) A type on cryptocurrency

C) An exchange

D) A centralized ledger

A distributed ledger on a peer to peer network

What is the purpose of a nonce?

A) Follows nouns

B) A hash function

C) Prevents double spending

D) Sends information to the blockchain network

Sends information to the blockchain network

What incentivizes the miners to give correct validation of transactions?

A) A nonce

B) A famous block that hard coded a hash of the Book of Genesis onto the blockchain

C) The first block after each block halving

D) The 2nd transaction in a Blockchain

A nonce

What is a genesis block?

A) The first block of a Blockchain

B) A famous block that hard coded a hash of the Book of Genesis onto the blockchain

C) The first block after each block halving

D) The 2nd transaction of a Blockchain

The first block of a Blockchain

What is an UTXO?

A) United Transaction Office

B) United Texan Xerox Organization

C) Unspent Transaction Output

D) Union of Texas Operations

Unspent Transaction Output

What is a hash function?

A) A fork

B) UTXO

C) Takes an input of any length and returns a fixed-length string of numbers and letters

D) Gas

Takes an input of any length and returns a fixed-length string of numbers and letters

Blockchain is the same as Bitcoin

FALSE

Once records are submitted on a blockchain, can they be altered?

A) Yes- the parties can go back in and alter them at any time

B) Yes- but only within a certain time frame

C) No- they cannot be altered

No- they cannot be altered

1) ________ and ________ are typically the most easily identifiable aspects of a company's business model.

A) Market strategy; market opportunity

B) Value proposition; revenue model

C) Competitive advantage; competitive environment

D) Revenue model; market opportunity

Answer: B

2) Which of the following uses a subscription revenue model for books?

A) Spotify

B) Amazon Kindle Unlimited

C) Rhapsody

D) Pandora

Answer: B

3) Which element of the business model addresses what a firm provides that other firms do not and cannot?

A) competitive environment

B) competitive advantage

C) market strategy

D) value proposition

Answer: D

4) Which element of the business model refers to the presence of substitute products in the market?

A) value proposition

B) competitive environment

C) competitive advantage

D) market opportunity

Answer: B

5) Which of the following are Amazon's primary value propositions?

A) personalization and customization

B) selection and convenience

C) reduction of price discovery cost

D) management of product delivery

Answer: B

6) A firm's ________ describes how a firm will produce a superior return on invested capital.

A) value proposition

B) revenue model

C) market strategy

D) competitive advantage

Answer: B

7) Which of the following does not use a subscription revenue model?

A) Apple Music

B) eHarmony

C) Ancestry

D) Twitter

Answer: D

8) Stickiness is an important attribute for which of the following revenue models?

A) advertising revenue model

B) subscription revenue model

C) transaction fee revenue model

D) affiliate revenue model

Answer: A

9) Which of the following companies uses a transaction fee revenue model?

A) Yahoo

B) E*Trade

C) Twitter

D) Birchbox

Answer: B

10) Which of the following is an example of the affiliate revenue model?

A) Scribd

B) eBay

C) L.L. Bean

D) MyPoints

Answer: D

11) Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

A) advertising revenue model

B) subscription revenue model

C) freemium strategy

D) premium strategy

Answer: C

12) Which of the following factors is not a significant influence on a company's competitive environment?

A) how many competitors are active

B) what the market share of each competitor is

C) the availability of supportive organizational structures

D) how competitors price their products

Answer: C

13) All of the following can be considered a direct competitor of Priceline except:

A) Travelocity.

B) Expedia.

C) Orbitz.

D) ESPN.

Answer: D

14) The existence of many competitors in any one market segment may indicate:

A) an untapped market niche.

B) the market is saturated.

C) no one firm has differentiated itself within that market.

D) a market that has already been tried without success.

Answer: B

15) All of the following can be considered a direct or indirect competitor of Amazon except:

A) eBay.

B) Apple's iTunes Store.

C) Walmart.

D) Priceline.

Answer: D

16) A perfect market is one in which:

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

B) one firm develops an advantage based on a factor of production that other firms cannot purchase.

C) one participant in the market has more resources than the others.

D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

Answer: A

17) Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

A) angel investors.

B) crowdfunders.

C) incubators.

D) venture capital investors.

Answer: C

18) A ________ specifically details how you plan to find customers and to sell your product.

A) sales analysis

B) business plan

C) competitive strategy

D) market strategy

Answer: D

19) Which of the following is not a community provider?

A) LinkedIn

B) Facebook

C) Blue Nile

D) Pinterest

Answer: C

20) Which of the following is not a variation of the e-tailer business model?

A) bricks-and-clicks

B) virtual merchant

C) market creator

D) manufacturer-direct

Answer: C

21) Which of the following is an example of a company using the content provider model?

A) Priceline

B) Netflix

C) Dell

D) eBay

Answer: B

22) Which of the following is not an example of the bricks-and-clicks e-tailing business model?

A) Walmart

B) Target

C) Bluefly

D) Staples

Answer: C

23) In 2018, the overall retail market in the United States was estimated to be about:

A) $53 trillion.

B) $5.3 trillion.

C) $530 billion.

D) $53 billion.

Answer: B

24) In general, the key to becoming a successful content provider is to:

A) own the content being provided.

B) own the technology by which content is created, presented, and distributed.

C) provide online content for free.

D) provide other services as well as online content.

Answer: A

25) Which of the following uses a subscription-based sales revenue model?

A) Yahoo

B) eBay

C) MyPoints

D) Dollar Shave Club

Answer: D

26) All of the following may lead to a competitive advantage except:

A) less expensive suppliers.

B) better employees.

C) fewer products.

D) superior products.

Answer: C

27) Which of the following is an unfair competitive advantage?

A) brand name

B) access to global markets

C) lower product prices

D) superior technology

Answer: A

28) Which of the following gives a business model the most credibility with outside investors?

A) the firm's management team

B) the firm's value proposition

C) the firm's market opportunity

D) the firm's market strategy

Answer: A

29) Which of the following statements about Foursquare is not true?

A) Foursquare combines a social network business model with location-based technology.

B) Foursquare initially struggled to find profitability.

C) The growth in Foursquare's revenue since 2015 has been driven primarily by significant increases in the numbers of users of its Swarm app.

D) Foursquare's users are typically amenable to having their location tracked and their data collected, since tracking users' location is the express purpose of the app.

Answer: C

30) Which type of investor typically becomes interested in a startup company after it has begun generating revenue?

A) incubators

B) angel investors

C) crowdfunders

D) venture capital investors

Answer: D

31) Which of the following is another name for a revenue model?

A) business model

B) business strategy

C) financial model

D) financial statements

Answer: C

32) All of the following can be considered examples of the market creator business model except:

A) eBay.

B) Priceline.

C) Uber.

D) Twitter.

Answer: D

33) ________ is defined by company using its competitive advantage to gain in surrounding markets.

A) Market strategy

B) Differentiation

C) Leverage

D) Focus

Answer: C

34) A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n):

A) incubator.

B) angel investor.

C) venture capital investor.

D) crowdfunder

Answer: B

35) Which of the following is not a key element of an elevator pitch?

A) exit strategy

B) growth metrics

C) legal structure

D) market opportunity

Answer: C

36) A value proposition defines how a company's product or service will generate revenue for the firm.

FALSE

37) Real markets are imperfect.

TRUE

38) Information asymmetries enable some firms to have an edge over others.

TRUE

39) Slow followers are sometimes more successful than first movers.

TRUE

40) In the subscription revenue model, a company primarily generates income from the display of ads.

FALSE

41) The Jumpstart Our Business Startups (JOBS) Act, and issuance of enabling regulations by the Securities and Exchange Commission, allows a start-up company to use crowdfunding to solicit investors to invest in small and early-stage startups.

TRUE

46) First movers often fail because:

A) their competitive advantage is unfair.

B) they lack complementary resources needed to sustain their advantages.

C) they are operating in a perfect market.

D) they fail to leverage their competitive assets.

Answer: B

47) All of the following primarily use an advertising revenue model except:

A) Facebook.

B) Yahoo.

C) Google.

D) Walmart.

Answer: D

48) Which of the following is not considered a portal?

A) Yahoo

B) MSN

C) Amazon

D) AOL

Answer: C

49) Portals primarily generate revenue in all of the following ways except:

A) charging advertisers for ad placement.

B) collecting transaction fees.

C) sales of goods.

D) charging subscription fees.

Answer: C

50) The basic value proposition of community providers is:

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

B) they offer consumers valuable, convenient, time-saving, and low-cost alternatives to traditional service providers.

C) they create a digital electronic environment for buyers and sellers to meet, agree on a price, and transact.

D) they increase customers' productivity by helping them get things done faster and more cheaply.

Answer: A

51) eBay uses all of the following business models except:

A) B2C market creator.

B) C2C market creator.

C) content provider.

D) e-commerce infrastructure provider.

Answer: C

52) All of the following are business models employed in the online music industry except:

A) subscription.

B) peer-to-peer streaming.

C) download-and-own.

D) cloud streaming.

Answer: B

53) The financial services, travel services, and job placement services industries typically use the ________ business model.

A) community provider

B) transaction broker

C) market creator

D) e-tailer

Answer: B

54) In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

A) market creator

B) community provider

C) e-tailer

D) portal

Answer: A

55) On-demand service companies are characterized by the free sharing of resources between the company and consumers

TRUE

57) All of the following are examples of business-to-business (B2B) business models except:

A) e-distributors.

B) e-procurement.

C) exchanges.

D) portals.

Answer: D

58) What is the primary revenue model for an e-distributor?

A) sales

B) transaction fee

C) advertising

D) subscription

Answer: A

59) Amazon Business is an example of which of the following business models?

A) B2B service provider

B) exchange

C) e-distributor

D) industry consortia

Answer: C

60) Ariba is an example of a(n)________.

A) e-distributor

B) portal

C) e-procurement firm

D) Industry consortium

Answer: C

61) Which of the following may offer its customers value chain management software?

A) e-distributors

B) e-procurement companies

C) exchanges

D) community providers

Answer: B

62) Over the past decade, the number of exchanges has:

A) greatly increased.

B) diminished sharply.

C) stayed about the same.

D) increased slowly but steadily.

Answer: B

63) The Seam is an example of a(n):

A) private industrial network.

B) exchange.

C) industry consortium.

D) e-distributor.

Answer: C

64) A ________ marketplace supplies products and services of interest to particular industries.

A) perfect

B) differentiated

C) horizontal

D) vertical

Answer: D

65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

TRUE

67) A ________ refers to a competitive strategy in which firms attempt to achieve lower business process costs.

A) strategy of cost competition

B) scope strategy

C) customer intimacy strategy

D) focus/market niche strategy

Answer: A

68) Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

A) global reach

B) richness

C) interactivity

D) personalization

Answer: A

69) Which of the following is not a primary activity in a firm value chain?

A) outbound logistics

B) finance/accounting

C) operations

D) after-sales service

Answer: B

70) A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

A) value chain

B) value system

C) value web

D) business strategy

Answer: C

71) If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

A) enable individual customization of the product by consumers.

B) implement a strategy of commoditization.

C) adopt a strategy of cost competition.

D) develop a scope strategy to compete within a narrower market segment.

Answer: A

72) A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

A) scope

B) differentiation

C) commoditization

D) focus

Answer: D

73) ________ technologies are technologies that enable the incremental improvement of products and services.

A) Sustaining

B) Differentiating

C) Disruptive

D) Commodity

Answer: A

74) Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

A) crowdfunders.

B) venture capitalists.

C) disruptors.

D) angel investors.

Answer: C

75) The term unfit fitness refers to a situation in which employees of a firm have the wrong skills for the current environment.

TRUE

76) Scale economies are efficiencies that result from increasing the size of the business.

TRUE

77) A company's strong linkages with its customers increase switching costs.

TRUE

78) The Internet's universal standard have changed industry structure by increasing barriers to entry and decreasing competition within an industry.

FALSE

79) Interactivity that enables product customization alters industry structure by decreasing the threat of substitutes.

TRUE

80) E-commerce has increased price competition in many markets.

TRUE

81) Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers.

FALSE

B) Value proposition; revenue model

________ and ________ are typically the most easily identifiable aspects of a company's business model.

A) Market strategy; market opportunity

B) Value proposition; revenue model

C) Competitive advantage; competitive environment

D) Revenue model; market opportunity

B) Amazon Kindle Unlimited

Which of the following uses a subscription revenue model for books?

A) Spotify

B) Amazon Kindle Unlimited

C) Rhapsody

D) Pandora

D) value proposition

Which element of the business model addresses what a firm provides that other firms do not and cannot?

A) competitive environment

B) competitive advantage

C) market strategy

D) value proposition

B) competitive environment

Which element of the business model refers to the presence of substitute products in the market?

A) value proposition

B) competitive environment

C) competitive advantage

D) market opportunity

B) selection and convenience

Which of the following are Amazon's primary value propositions?

A) personalization and customization

B) selection and convenience

C) reduction of price discovery cost

D) management of product delivery

B) revenue model

A firm's ________ describes how a firm will produce a superior return on invested capital.

A) value proposition

B) revenue model

C) market strategy

D) competitive advantage

D) Twitter

Which of the following does not use a subscription revenue model?

A) Apple Music

B) eHarmony

C) Ancestry

D) Twitter

A) advertising revenue model

Stickiness is an important attribute for which of the following revenue models?

A) advertising revenue model

B) subscription revenue model

C) transaction fee revenue model

D) affiliate revenue model

B) E*Trade

Which of the following companies uses a transaction fee revenue model?

A) Yahoo

B) E*Trade

C) Twitter

D) Birchbox

D) MyPoints

Which of the following is an example of the affiliate revenue model?

A) Scribd

B) eBay

C) L.L. Bean

D) MyPoints

C) freemium strategy

Which of the following involves a company giving away a certain level of product or service without charge, but then charging a fee for premium levels of the product or service?

A) advertising revenue model

B) subscription revenue model

C) freemium strategy

D) premium strategy

C) the availability of supportive organizational structures

Which of the following factors is not a significant influence on a company's competitive environment?

A) how many competitors are active

B) what the market share of each competitor is

C) the availability of supportive organizational structures

D) how competitors price their products

D) ESPN.

All of the following can be considered a direct competitor of Priceline except:

A) Travelocity.

B) Expedia.

C) Orbitz.

D) ESPN.

B) the market is saturated.

The existence of many competitors in any one market segment may indicate:

A) an untapped market niche.

B) the market is saturated.

C) no one firm has differentiated itself within that market.

D) a market that has already been tried without success.

D) Priceline.

All of the following can be considered a direct or indirect competitor of Amazon except:

A) eBay.

B) Apple's iTunes Store.

C) Walmart.

D) Priceline.

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

A perfect market is one in which:

A) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

B) one firm develops an advantage based on a factor of production that other firms cannot purchase.

C) one participant in the market has more resources than the others.

D) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

C) incubators.

Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

A) angel investors.

B) crowdfunders.

C) incubators.

D) venture capital investors.

D) market strategy

A ________ specifically details how you plan to find customers and to sell your product.

A) sales analysis

B) business plan

C) competitive strategy

D) market strategy

C) Blue Nile

Which of the following is not a community provider?

A) LinkedIn

B) Facebook

C) Blue Nile

D) Pinterest

C) market creator

Which of the following is not a variation of the e-tailer business model?

A) bricks-and-clicks

B) virtual merchant

C) market creator

D) manufacturer-direct

B) Netflix

Which of the following is an example of a company using the content provider model?

A) Priceline

B) Netflix

C) Dell

D) eBay

C) Bluefly

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

A) Walmart

B) Target

C) Bluefly

D) Staples

B) $5.3 trillion.

In 2018, the overall retail market in the United States was estimated to be about:

A) $53 trillion.

B) $5.3 trillion.

C) $530 billion.

D) $53 billion.

A) own the content being provided.

In general, the key to becoming a successful content provider is to:

A) own the content being provided.

B) own the technology by which content is created, presented, and distributed.

C) provide online content for free.

D) provide other services as well as online content.

D) Dollar Shave Club

Which of the following uses a subscription-based sales revenue model?

A) Yahoo

B) eBay

C) MyPoints

D) Dollar Shave Club

C) fewer products.

All of the following may lead to a competitive advantage except:

A) less expensive suppliers.

B) better employees.

C) fewer products.

D) superior products.

A) brand name

Which of the following is an unfair competitive advantage?

A) brand name

B) access to global markets

C) lower product prices

D) superior technology

A) the firm's management team

Which of the following gives a business model the most credibility with outside investors?

A) the firm's management team

B) the firm's value proposition

C) the firm's market opportunity

D) the firm's market strategy

C) The growth in Foursquare's revenue since 2015 has been driven primarily by significant increases in the numbers of users of its Swarm app.

Which of the following statements about Foursquare is not true?

A) Foursquare combines a social network business model with location-based technology.

B) Foursquare initially struggled to find profitability.

C) The growth in Foursquare's revenue since 2015 has been driven primarily by significant increases in the numbers of users of its Swarm app.

D) Foursquare's users are typically amenable to having their location tracked and their data collected, since tracking users' location is the express purpose of the app.

D) venture capital investors

Which type of investor typically becomes interested in a startup company after it has begun generating revenue?

A) incubators

B) angel investors

C) crowdfunders

D) venture capital investors

C) financial model

Which of the following is another name for a revenue model?

A) business model

B) business strategy

C) financial model

D) financial statements

D) Twitter.

All of the following can be considered examples of the market creator business model except:

A) eBay.

B) Priceline.

C) Uber.

D) Twitter.

C) Leverage

________ is defined by company using its competitive advantage to gain in surrounding markets.

A) Market strategy

B) Differentiation

C) Leverage

D) Focus

B) angel investor.

A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n):

A) incubator.

B) angel investor.

C) venture capital investor.

D) crowdfunder.

C) legal structure

Which of the following is not a key element of an elevator pitch?

A) exit strategy

B) growth metrics

C) legal structure

D) market opportunity

B) they lack complementary resources needed to sustain their advantages.

First movers often fail because:

A) their competitive advantage is unfair.

B) they lack complementary resources needed to sustain their advantages.

C) they are operating in a perfect market.

D) they fail to leverage their competitive assets.

D) Walmart.

All of the following use an advertising revenue model except:

A) Facebook.

B) Yahoo.

C) Google.

D) Walmart.

C) Amazon

Which of the following is not considered a portal?

A) Yahoo

B) MSN

C) Amazon

D) AOL

C) sales of goods.

Portals primarily generate revenue in all of the following ways except:

A) charging advertisers for ad placement.

B) collecting transaction fees.

C) sales of goods.

D) charging subscription fees.

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

The basic value proposition of community providers is:

A) they offer a fast, convenient one-stop site where users can focus on their most important concerns and interests.

B) they offer consumers valuable, convenient, time-saving, and low-cost alternatives to traditional service providers.

C) they create a digital electronic environment for buyers and sellers to meet, agree on a price, and transact.

D) they increase customers' productivity by helping them get things done faster and more cheaply.

C) content provider.

eBay uses all of the following business models except:

A) B2C market creator.

B) C2C market creator.

C) content provider.

D) e-commerce infrastructure provider.

B) peer-to-peer streaming.

All of the following are business models employed in the online music industry except:

A) subscription.

B) peer-to-peer streaming.

C) download-and-own.

D) cloud streaming.

B) transaction broker

The financial services, travel services, and job placement services industries typically use the ________ business model.

A) community provider

B) transaction broker

C) market creator

D) e-tailer

A) market creator

In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products, and establish prices.

A) market creator

B) community provider

C) e-tailer

D) portal

D) portals.

All of the following are examples of business-to-business (B2B) business models except:

A) e-distributors.

B) e-procurement.

C) exchanges.

D) portals.

A) sales

What is the primary revenue model for an e-distributor?

A) sales

B) transaction fee

C) advertising

D) subscription

C) e-distributor

Amazon Business is an example of which of the following business models?

A) B2B service provider

B) exchange

C) e-distributor

D) industry consortia

C) e-procurement firm

Ariba is an example of a(n)________.

A) e-distributor

B) portal

C) e-procurement firm

D) Industry consortium

B) e-procurement companies

Which of the following may offer its customers value chain management software?

A) e-distributors

B) e-procurement companies

C) exchanges

D) community providers

B) diminished sharply.

Over the past decade, the number of exchanges has:

A) greatly increased.

B) diminished sharply.

C) stayed about the same.

D) increased slowly but steadily.

C) industry consortium.

The Seam is an example of a(n):

A) private industrial network.

B) exchange.

C) industry consortium.

D) e-distributor.

D) vertical

A ________ marketplace supplies products and services of interest to particular industries.

A) perfect

B) differentiated

C) horizontal

D) vertical

A) strategy of cost competition

A ________ refers to a competitive strategy in which firms attempt to achieve lower business process costs.

A) strategy of cost competition

B) scope strategy

C) customer intimacy strategy

D) focus/market niche strategy

A) global reach

Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

A) global reach

B) richness

C) interactivity

D) personalization

B) finance/accounting

Which of the following is not a primary activity in a firm value chain?

A) outbound logistics

B) finance/accounting

C) operations

D) after-sales service

C) value web

A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

A) value chain

B) value system

C) value web

D) business strategy

A) enable individual customization of the product by consumers.

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

A) enable individual customization of the product by consumers.

B) implement a strategy of commoditization.

C) adopt a strategy of cost competition.

D) develop a scope strategy to compete within a narrower market segment.

D) focus

A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

A) scope

B) differentiation

C) commoditization

D) focus

A) Sustaining

________ technologies are technologies that enable the incremental improvement of products and services.

A) Sustaining

B) Differentiating

C) Disruptive

D) Commodity

C) disruptors.

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

A) crowdfunders.

B) venture capitalists.

C) disruptors.

D) angel investors.

------

------

1) ________ and ________ are typically the most easily identifiable aspects of a company's

business model.

A) Market strategy; market opportunity

B) Value proposition; revenue model

C) Value proposition; competitive environment

D) Revenue model; market strategy

B) Value proposition; revenue model

2) All of the following are using a subscription revenue model for music except:

A) Spotify.

B) Scribd.

C) Rhapsody.

D) Pandora.

B) Scribd.

3) Which element of the business model addresses what a firm provides that other firms do not and cannot?

A) revenue model

B) competitive advantage

C) market strategy

D) value proposition

D) value proposition

4) Which element of the business model refers to the presence of substitute products in the market?

A) value proposition

B) competitive environment

C) competitive advantage

D) market strategy

B) competitive environment

5) Which of the following are Amazon's primary value propositions?

A) personalization and customization

B) selection and convenience

C) reduction of price discovery cost

D) management of product delivery

B) selection and convenience

6) A firm's ________ describes how a firm will produce a superior return on invested capital.

A) value proposition

B) revenue model

C) market strategy

D) competitive advantage

B) revenue model

7) Which of the following is an example of the subscription revenue model?

A) eHarmony

B) eBay

C) E*Trade

D) Twitter

A) eHarmony

8) Stickiness is an important attribute for which of the following revenue models?

A) advertising revenue model

B) subscription revenue model

C) transaction fee revenue model

D) sales revenue model

A) advertising revenue model

9) Which of the following companies uses a transaction fee revenue model?

A) Yahoo

B) E*Trade

C) Twitter

D) Sears

B) E*Trade

10) Which of the following is an example of the affiliate revenue model?

A) Scribd

B) eBay

C) L.L. Bean

D) MyPoints

D) MyPoints

11) Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?

A) advertising revenue model

B) subscription revenue model

C) freemium strategy

D) transaction fee revenue mode

C) freemium strategy

12) Which of the following factors is not a significant influence on a company's competitive environment?

A) how many competitors are active

B) what the market share of each competitor is

C) the availability of supportive organizational structures

D) how competitors price their products

C) the availability of supportive organizational structures

13) Which of the following would be considered an indirect competitor of Priceline?

A) Travelocity

B) Expedia

C) Orbitz

D) TripAdvisor

B) Expedia

14) The existence of a large number of competitors in any one market segment may indicate:

A) an untapped market niche.

B) the market is saturated.

C) no one firm has differentiated itself within that market.

D) a market that has already been tried without success.

B) the market is saturated.

15) All of the following can be considered a direct or indirect competitor of Amazon except:

A) eBay.

B) Apple's iTunes Store.

C) Walmart.

D) Star

D) Star

16) A perfect market is one in which:

A) there are no competitive advantages or asymmetries because all firms have equal access to all

the factors to production.

B) one firm develops an advantage based on a factor of production that other firms cannot

purchase.

C) one participant in the market has more resources than the others.

D) competition is at a minimum, as each niche market within an industry is served by the

company with the greatest competitive advantage.

A) there are no competitive advantages or asymmetries because all firms have equal access to all

17) Organizations that typically provide an array of services to start-up companies along with a small amount of funding are referred to as:

A) angel investors.

B) crowdfunders.

C) incubators.

D) venture capital investors.

C) incubators.

18) A ________ specifically details how you plan to find customers and to sell your product.

A) sales analysis

B) business plan

C) competitive strategy

D) market strategy

D) market strategy

19) Which of the following is not a community provider?

A) LinkedIn

B) Facebook

C) Priceline

D) Pinteres

C) Priceline

20) Which of the following is not a variation of the e-tailer business model?

A) bricks-and-clicks

B) virtual merchant

C) market creator

D) manufacturer-direct

C) market creator

21) An example of a company using the content provider model is:

A) Priceline.

B) Rhapsody.

C) Dell.

D) eBay.

B) Rhapsody.

22) Which of the following is not an example of the bricks-and-clicks e-tailing business model?

A) Walmart

B) Sears

C) Bluefly

D) Staples

C) Bluefly

23) The overall retail market in the United States in 2015 was estimated at about:

A) $48 trillion.

B) $4.8 trillion.

C) $480

D) $48 billion.

B) $4.8 trillion.

24) In general, the key to becoming a successful content provider is to:

A) own the content being provided.

B) own the technology by which content is created, presented, and distributed.

C) provide online content for free.

D) provide other services as well as online content.

A) own the content being provided.

25) Which of the following was not able to successfully implement a freemium business model?

A) Pandora

B) Dropbox

C) LinkedIn

D) Ning

D) Ning

26) All of the following may lead to a competitive advantage except:

A) less expensive suppliers.

B) better employees.

C) fewer products.

D) superior products.

C) fewer products.

27) Which of the following is an unfair competitive advantage?

A) Brand name

B) access to global markets

C) lower product prices

D) superior technology

A) Brand name

28) Which of the following gives a business model the most credibility with outside investors?

A) the firm's management team

B) the firm's value proposition

C) the firm's market opportunity

D) the firm's market strategy

A) the firm's management team

29) Which of the following statements about Foursquare is not true?

A) Foursquare combines a social network business model with location-based technology.

B) Foursquare began operating without a revenue model.

C) Foursquare's business model faces significant intellectual property concerns.

D) Foursquare has been able to command a high valuation from venture capital investors despite unimpressive revenue and profits.

C) Foursquare's business model faces significant intellectual property concerns.

30) Which type of investor typically becomes interested in a start-up company after it has begun

generating revenue?

A) incubators

B) angel investors

C) crowdfunders

D) venture capital investors

D) venture capital investors

31) Which of the following is another name for a revenue model?

A) business model

B) business strategy

C) financial model

D) financial statements

C) financial model

32) All of the following use a social network marketing strategy except:

A) Twitter.

B) YouTube.

C) Pinterest.

D) Amazon.

C) Pinterest.

33) The use by a company of its competitive advantage to achieve more advantage in

surrounding markets is known as ________.

A) market strategy

B) differentiation

C) leverage

D) focus

C) leverage

34) A wealthy individual who invests personal funds in a start-up in exchange for an equity stock in the business is referred to as a(n) ________.

A) incubator

B) angel investor

C) venture capital investor

D) crowdfunder

B) angel investor

35) Which of the following is not a key element of an elevator pitch?

A) exit strategy

B) growth metrics

C) legal structure

D) market opportunity

C) legal structure

36) A value proposition defines how a company's product or service fulfills the needs of a customer.

Answer: TRUE

37) Firms that fail to produce returns greater than alternative investments typically go out of business.

Answer: TRUE

38) An asymmetry exists whenever all participants in a market have equivalent resources.

Answer: FALSE

39) First movers are often not as successful as follower firms.

Answer: TRUE

40) All firms need an organization to efficiently implement their business plans and strategies.

Answer: TRUE

41) The JOBS Act and issuance of enabling regulations by the Securities and Exchange Commission allows a start-up company to use crowdfunding to solicit accredited investors to invest in small and early-stage start-ups.

Answer: TRUE

46) The business model of e-tailers is quite similar to that of:

A) e-distributors.

B) transaction brokers.

C) exchanges.

D) service providers.

A) e-distributors.

47) All of the following use an advertising revenue model except:

A) Twitter.

B) Yahoo.

C) Google.

D) Amazon.

D) Amazon.

48) Which of the following is not considered a portal?

A) Yahoo

B) MSN

C) Amazon

D) AOL

C) Amazon

49) Portals primarily generate revenue in all of the following ways except:

A) charging advertisers for ad placement.

B) collecting transaction fees.

C) sales of goods.

D) charging subscription fees

C) sales of goods.

50) The basic value proposition of community providers is:

A) they offer a fast, convenient one-stop site where users can focus on their most important

concerns and interests.

B) they offer consumers valuable, convenient, time-saving, and low cost alternatives to

traditional service providers.

C) they create a digital electronic environment for buyers and sellers to meet, agree on a price,

and transact.

D) they increase customers' productivity by helping them get things done faster and more

cheaply.

A) they offer a fast, convenient one-stop site where users can focus on their most important

concerns and interests.

51) eBay uses all of the following business models except:

A) B2C market creator.

B) C2C market creator.

C) content provider.

D) e-commerce infrastructure provider.

C) content provider.

52) All of the following are business models employed in the online music industry except:

A) subscription.

B) peer-to-peer streaming.

C) download-and-own.

D) cloud streaming.

B) peer-to-peer streaming.

53) The financial services, travel services, and job placement services industries typically use the ________ business model.

A) community provider

B) transaction broker

C) market creator

D) e-tailer

B) transaction broker

54) In the ________ business model, a Web-based business builds a digital environment in which

buyers and sellers can meet, display products, search for products, and establish prices.

A) market creator

B) community provider

C) e-tailer

D) portal

A) market creator

55) On-demand service companies are characterized by the free sharing of resources between the company and consumers.

Answer: FALSE

57) All of the following are examples of business-to-business (B2B) business models except:

A) e-distributors.

B) e-procurement.

C) exchanges.

D) e-tailers.

D) e-tailers.

58) What is the primary revenue model for an e-distributor?

A) sales

B) transaction fee

C) advertising

D) subscription

A) sales

59) W.W. Grainger is an example of which of the following business models?

A) B2B service provider

B) exchange

C) e-distributor

D) industry consortia

C) e-distributor

60) ________ create and sell access to digital markets.

A) E-distributors

B) Portals

C) E-procurement firms

D) Market creators

C) E-procurement firms

61) Which of the following may offer its customers value chain management software?

A) e-distributors

B) e-procurement companies

C) exchanges

D) community providers

B) e-procurement companies

62) Over the past decade, the number of exchanges has:

A) greatly increased.

B) diminished sharply.

C) stayed abou D) increased slowly but steadily.

B) diminished sharply.

63) SupplyOn is an example of a(n):

A) private industrial network.

B) exchange.

C) industry consortium.

D) e-distributor.

C) industry consortium.

64) A ________ marketplace supplies products and services of interest to particular industries.

A) perfect

B) differentiated

C) horizontal

D) vertical

D) vertical

65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

Answer: TRUE

67) Which business strategy involves implementing a new, more efficient set of business processes that other firms cannot yet obtain?

A) strategy of cost competition

B) scope strategy

C) customer intimacy strategy

D) focus/market niche strategy

A) strategy of cost competition

68) Which of the following features of e-commerce technology changes industry structure by lowering barriers to entry but greatly expands the market at the same time?

A) global reach

B) richness

C) interactivity

D) personalization

A) global reach

69) Which of the following is not a primary activity in a firm value chain?

A) outbound logistics

B) finance/accounting

C) operations

D) after-sales service

B) finance/accounting

70) A ________ is a networked business ecosystem that coordinates a firm's suppliers, distributors, and delivery firms with its own production needs using an Internet-based supply chain management system.

A) value chain

B) value system

C) value web

D) business strategy

C) value web

71) If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

A) enable individual customization of the product by consumers.

B) implement a strategy of commoditization.

C) adopt a strategy of cost competition.

D) develop a scope strategy to compete within a narrower market segment.

A) enable individual customization of the product by consumers.

72) A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

A) scope

B) differentiation

C) cost

D) focus

D) focus

73) ________ technologies are technologies that enable the incremental improvement of products and services.

A) Sustaining

B) Differentiating

C) Disruptive

D) Commodity

A) Sustaining

74) Innovative entrepreneurs and their business firms that destroy existing business models are referred to as ________.

A) crowdfunders

B) venture capitalists

C) disruptors

D) angel investors

C) disruptors

75) The term unfit fitness refers to a situation in which employees of a firm have the wrong skills for the current environment.

Answer: TRUE

76) Scale economies are efficiencies that result from flattening the hierarchy of an organization.

Answer: FALSE

77) A company's strong linkages with its customers increase switching costs.

Answer: TRUE

78) The Internet's universal standards can change industry structure by increasing barriers to entry and decreasing competition within an industry.

Answer: FALSE

79) Interactivity that enables product customization alters industry structure by increasing the threat of substitutes.

Answer: FALSE

80) E-commerce has increased price competition in nearly all markets.

Answer: TRUE

81) Social technologies change industry structure by shifting programming and editorial

decisions to consumers and creating substitute entertainment products.

Answer: TRUE

1.14) Which of the following protocols is used to send mail to a server?

A.A) SMTP

2.77) Snapchat’s Lenses feature is an example of which of the following?

C

.

C) augmented reality

3.「台塑網」屬於Morgan Stanley 電子市集經營模式中的哪一種?[單選]

A

.

由買方建? (Buy-managed) 電子市集

4.72) Which of the following was the first to launch an intelligent digital assistant?

B

.

B) Apple

5.台灣銀行在民國861月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]

A

.

電子資料交換

6.P&GWal-Mart建立分享資訊機制,讓P&G每天由Wal-Mart蒐集銷售資訊,藉此管理在Wal-Mart的存貨。請問這是屬於協同商務四大領域中的哪一種?[單選] 回答錯誤

B

.

顧客關係管理

7.43) The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A

.

A) Internet Engineering Steering Group (IESG)

B

.

B) World Wide Web Consortium (W3C)

C

.

C) Internet Engineering Task Force (IETF)

D

.

D) Internet Society (ISOC)

正確答案: D

8.在線上以物?物的方式進??,是屬於電子商務中的何種經營模式?[單選] 回答錯誤

A

.

充足的信任機制

B

.

易用的網站功能

C

.

特殊的使用經驗

D

.

便捷的運送服務

正確答案: D

9.4. 台塑透過台塑網提高台塑集團採購、工程發包、原料標售系統與庫存管理等作業效率,進而提升台塑集團的競爭力。請問台塑網的發展屬於 B to B 電子商務發展的哪一個階段?(單選) 回答錯誤

A

.

(A) 電子資料交換

B

.

(B) 基本的電子商務

C

.

(C) 電子交易市集

D

.

(D) 協同商務

正確答案: C

10.阿翔是個3C愛好者,於是常常上MOBILE01討論,請問MOBILE01的出現是來自虛擬社群互動基礎的哪一項?[單選] 回答錯誤

A

.

多品牌服務

B

.

交流管道

C

.

交易機制

D

.

創造價值

正確答案: D

11.52) All of the following are involved in the effort to create standards for IoT except:

A

.

A) AllSeen Alliance.

B

.

B) Industrial Internet Consortium.

C

.

C) Open Connectivity Foundation.

D

.

D) W3C.

正確答案: D

12.1) During which period of time did the Institutionalization phase of Internet development take place?

A

.

A) 1950-1960

B

.

B) 1961-1974

C

.

C) 1975-1995

D

.

D) 1995 to the present

正確答案: C

13.65) You could expect to find all of the following services in a web server software package except:

A

.

A) security services.

B

.

B) FTP.

C

.

C) search engine.

D

.

D) an RSS aggregator.

正確答案: D

14.77) Snapchat’s Lenses feature is an example of which of the following?

A

.

A) artificial digital assistant

B

.

B) virtual reality

C

.

C) augmented reality

D

.

D) mixed reality

正確答案: C

15.76) The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A

.

A) VoIP.

B

.

B) IPTP.

C

.

C) VTP.

D

.

D) IP.

正確答案: A

16.老陳是美國影集的愛好者,常到以物易物網和其他人交換自己喜愛的影集,請問以物易物網是屬於C to C商務模式的哪一種?[單選] 回答錯誤

A

.

競標過程

B

.

註冊使用

C

.

後續活動

D

.

上架交易

正確答案: A

17.73) Which of the following enables Internet users to communicate with each other, although not in real time?

A

.

A) mobile messaging

B

.

B) online forum

C

.

C) SMS messaging

D

.

D) VoIP

正確答案: B

18.eBay 拍賣網站」屬於哪一種電子商務模式?[單選] 回答錯誤

D.P2P

19.球球除了發表自己對行銷議題的看法之外,還會放一些有趣的行銷廣告影片,只要在影片下面留言「行銷創意,球球最夠力」並發布到自己的塗鴉牆,就有機會獲得電影票一張。請問這是C to C網路分享模式過程中的哪一個階段?[單選] 回答錯誤

A

.

結構性溝通層級

B

.

非結構性溝通層級

C

.

商務交?中心層級

D

.

?/?程交?中心層級

正確答案: A

20.阿證最近發現某茶飲的廣告;「只要來店消費就會給予一組序號,憑序號再到Facebook按讚,就有機會獲得電影票一張。」請問這屬於C to C網路交易模式效益的哪一項?[單選] 回答錯誤

A

.

虛構的高評價

B

.

設立釣魚網頁

C

.

縮短交易時間

D

.

提供錯誤資訊

正確答案: D

21.Morgan Stanley 認為B2B 電子商務的演進可分為四個發展階段,下?排序何者正確?[單選] 回答錯誤

A

.

吸引人潮

B

.

發展交易

C

.

匯聚人潮

D

.

獲得錢潮

正確答案: C

22.16) Which of the following statements about cloud computing is not true?

A

.

A) A public cloud is typically used by companies with stringent privacy and security requirements.

B

.

B) Dropbox is an example of a public cloud.

C

.

C) Hybrid clouds offer both public and private cloud options.

D

.

D) A private cloud may be hosted internally or externally.

正確答案: A

23.由消費者與消費者進行交易,在電子商務中屬於何種經營模式?[單選]

A

.

B2B

B

.

B2C

C.C2C

D

.

P2P

正確答案: C

24.拍賣網站提供消費者雙方標售二手商品,在電子商務中屬於何種經營模式?[單選] 回答錯誤

A

.

B2C

B

.

B2B

C

.

C2B

D

.

C2C

正確答案: C

25.Google優化其搜尋引擎的品質,讓使用者願意重複使用,這是屬於B to C電子商務的哪個發展階段?[單選] 回答錯誤

A

.

吸引人潮

B

.

發展交易

C

.

匯聚人潮

D

.

獲得錢潮

正確答案: C

26.50) The major technologies used with wireless local area networks are:

A

.

A) Wi-Fi and Bluetooth.

B

.

B) Wi-Fi and WiMax.

C

.

C) Bluetooth and 3G.

D

.

D) WiMax and 3G.

正確答案: A

27.76) The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A

.

A) VoIP.

B

.

B) IPTP.

C

.

C) VTP.

D

.

D) IP.

正確答案: A

28.51) Which of the following standards provide for high-speed short-range Wi-Fi?

A

.

A) WiGig

B

.

B) WiMax

C

.

C) Bluetooth

D

.

D) Wi-Fi 6

正確答案: A

29.Morgan Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選] 回答錯誤

A

.

吸引人潮

B

.

發展交易

C

.

匯聚人潮

D

.

獲得錢潮

正確答案: C

30.63) The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A

.

A) Netscape Navigator.

B

.

B) Mosaic.

C

.

C) Mozilla.

D

.

D) Internet Explorer.

正確答案: B

31.阿源第一次利用博客來買書,在準備購買的時候,看到上面清楚的購買流程圖讓他順利買到他想要的書,請問博客來這樣的設計符合 B to C電子商務網站維持因素的哪一個?[單選]

A

.

良好功能

B

.

瀏覽器開啟

C

.

資訊化

D

.

相關指引

正確答案: D

32.83) Applications for Android operating system-based smartphones are typically written in which of the following?

A

.

A) Swift

B

.

B) Java

C

.

C) ActiveX

D

.

D) ColdFusion

正確答案: B

33.44) The ________ helps define the overall structure of the Internet.

A

.

A) IAB

B

.

B) IESG

C

.

C) W3C

D

.

D) ITU

正確答案: A

34.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]

A

.

商業自動化

B

.

電子商業

C

.

電子商務

D

.

協同產品商務

正確答案: D

35.根據Goldman Sachs對於協同商務層級的分類,由低至高排序為下列何者?[單選] 回答錯誤

A

.

線上學習

B

.

線上團購

C

.

線上購物

D

.

線上拍賣

正確答案: B

36.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選] 回答錯誤

A

.

人際關係

B

.

交易

C

.

幻想

D

.

興趣

正確答案: D

37.51) Which of the following standards provide for high-speed short-range Wi-Fi?

A

.

A) WiGig

B

.

B) WiMax

C

.

C) Bluetooth

D

.

D) Wi-Fi 6

正確答案: A

38.阿翔是個3C愛好者,於是常常上MOBILE01討論,請問MOBILE01的出現是來自虛擬社群互動基礎的哪一項?[單選] 回答錯誤

A

.

多品牌服務

B

.

交流管道

C

.

交易機制

D

.

創造價值

正確答案: D

39.15) Where does TLS operate within TCP/IP?

A

.

A) between the Internet Layer and the Transport Layer

B

.

B) between the Transport Layer and the Application Layer

C

.

C) between the Network Interface Layer and the Transport Layer

D

.

D) between the Internet Layer and the Application Layer

正確答案: B

40.28) The term latency refers to a delay that can be experienced in packet-switched networks.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

41.32) HTTP/2 is supported by almost all the leading web browsers.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

42.55) T1 and T3 refer to international telephone standards for digital communication.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

43.59) WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

44.55) T1 and T3 refer to international telephone standards for digital communication.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

45.78) About 75% of U.S. smart speaker users make voice-based purchases using those devices. 回答錯誤

是非題 (2 ) 0

A

.

A

B

.

B

正確答案: B

46.31) Amazon Web Services is an example of a private cloud.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

47.29) Edge computing improves response time and saves bandwidth.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

48.84) The only way apps can be purchased is via either the Apple App Store or from Google Play.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

49.30) A private cloud is operated for the benefit of multiple firms.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

50.57) Tier 1 ISPs provide Internet access to consumers and businesses.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

1.4. 台塑透過台塑網提高台塑集團採購、工程發包、原料標售系統與庫存管理等作業效率,進而提升台塑集團的競爭力。請問台塑網的發展屬於 B to B 電子商務發展的哪一個階段?(單選)

A

.

(A) 電子資料交換

B

.

(B) 基本的電子商務

C

.

(C) 電子交易市集

D

.

(D) 協同商務

正確答案: C

2.eBay 拍賣網站」屬於哪一種電子商務模式?[單選]

A

.

B2B

B

.

B2C

C

.

C2C

D

.

P2P

正確答案: D

3.20) Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

A

.

A) routers

B

.

B) Web servers

C

.

C) IP servers

D

.

D) packet servers

正確答案: A

4.在線上以物?物的方式進??,是屬於電子商務中的何種經營模式?[單選]

A

.

充足的信任機制

B

.

易用的網站功能

C

.

特殊的使用經驗

D

.

便捷的運送服務

正確答案: D

5.51) Which of the following standards provide for high-speed short-range Wi-Fi?

A

.

A) WiGig

B

.

B) WiMax

C

.

C) Bluetooth

D

.

D) Wi-Fi 6

正確答案: A

6.26) Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

A

.

A) HTTP

B

.

B) BGP

C

.

C) FTP

D

.

D) SMTP

正確答案: B

7.2. 在電子商務的交易模式中,若由買方彼此競價,出價最高者就贏得這項商務交易,這是屬於?(單選)

A

.

(A) 需求整合式價格

B

.

(B) 目錄式價格

C

.

(C) 拍賣式價格

D

.

(D) 逆拍賣式價格

正確答案: C

8.由消費者與消費者進行交易,在電子商務中屬於何種經營模式?[單選]

A

.

B2B

B

.

B2C

C

.

C2C

D

.

P2P

正確答案: C

9.52) All of the following are involved in the effort to create standards for IoT except:

A

.

A) AllSeen Alliance.

B

.

B) Industrial Internet Consortium.

C

.

C) Open Connectivity Foundation.

D

.

D) W3C.

正確答案: D

10.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]

A

.

商業自動化

B

.

電子商業

C

.

電子商務

D

.

協同產品商務

正確答案: D

11.43) The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A

.

A) Internet Engineering Steering Group (IESG)

B

.

B) World Wide Web Consortium (W3C)

C

.

C) Internet Engineering Task Force (IETF)

D

.

D) Internet Society (ISOC)

正確答案: D

12.10. 在電子商務的課程中,老師告訴大家在進行網路交易的時候要多方比較與分析、再次確認與詢問、確認網址與連結,請問老師正在教什麼?(單選)

A

.

(A) C to C 網路交易模式效益

B

.

(B) C to C 網路分享模式的過程

C

.

(C) C to C 網路交易模式的詐騙與防止

D

.

(D) C to C 網路交易模式的概念

正確答案: C

13.22) Which of the following is not a basic type of cloud computing service?

A

.

A) IaaS

B

.

B) PaaS

C

.

C) SaaS

D

.

D) FiOS

正確答案: D

14.43) The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A

.

A) Internet Engineering Steering Group (IESG)

B

.

B) World Wide Web Consortium (W3C)

C

.

C) Internet Engineering Task Force (IETF)

D

.

D) Internet Society (ISOC)

正確答案: D

15.44) The ________ helps define the overall structure of the Internet.

A

.

A) IAB

B

.

B) IESG

C

.

C) W3C

D

.

D) ITU

正確答案: A

16.50) The major technologies used with wireless local area networks are:

A

.

A) Wi-Fi and Bluetooth.

B

.

B) Wi-Fi and WiMax.

C

.

C) Bluetooth and 3G.

D

.

D) WiMax and 3G.

正確答案: A

17.48) Which of the following is Google hoping to use to provide Internet access to remote parts of the world?

A

.

A) unused, low-powered television channels

B

.

B) high-altitude balloons

C

.

C) WLANs

D

.

D) EDI

正確答案: B

18.8) The Internet Layer of TCP/IP is responsible for which of the following?

A

.

A) placing packets on and receiving them from the network medium

B

.

B) addressing, packaging, and routing messages

C

.

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D

.

D) providing a variety of applications with the ability to access the services of the lower layers

正確答案: B

19.37) Which of the following organizations focuses on the evolution of the Internet?

A

.

A) IRTF

B

.

B) ISOC

C

.

C) W3C

D

.

D) ICANN

正確答案: A

20.球球除了發表自己對行銷議題的看法之外,還會放一些有趣的行銷廣告影片,只要在影片下面留言「行銷創意,球球最夠力」並發布到自己的塗鴉牆,就有機會獲得電影票一張。請問這是C to C網路分享模式過程中的哪一個階段?[單選]

A

.

結構性溝通層級

B

.

非結構性溝通層級

C

.

商務交?中心層級

D

.

?/?程交?中心層級

正確答案: A

21.72) Which of the following was the first to launch an intelligent digital assistant?

A

.

A) Facebook

B

.

B) Apple

C

.

C) Amazon

D

.

D) Google

正確答案: B

22.24) Which of the following was the original purpose of the Internet?

A

.

A) to provide a network that would allow businesses to connect with consumers

B

.

B) to link large mainframe computers on different college campuses

C

.

C) to develop a military communications system that could withstand nuclear war

D

.

D) to enable government agencies to track civilian communications

正確答案: B

23.23) Which of the following are central directories that list all domain names currently in use for specific domains?

A

.

A) Web servers

B

.

B) root servers

C

.

C) client servers

D

.

D) DNS servers

正確答案: B

24.21) Which of the following is a set of rules for transferring data?

A

.

A) protocol

B

.

B) packet

C

.

C) router

D

.

D) IP address

正確答案: A

25.15) Where does TLS operate within TCP/IP?

A

.

A) between the Internet Layer and the Transport Layer

B

.

B) between the Transport Layer and the Application Layer

C

.

C) between the Network Interface Layer and the Transport Layer

D

.

D) between the Internet Layer and the Application Layer

正確答案: B

26.在經營傳統的B to C商務時,首先要思考的是?[單選] 回答錯誤

A

.

產品

B

.

價格

C

.

區位

D

.

顧客經驗

正確答案: C

27.27) In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6). 回答錯誤

A

.

A) 10%

B

.

B) 15%

C

.

C) 45%

D

.

D) 65%

正確答案: C

28.73) Which of the following enables Internet users to communicate with each other, although not in real time?

A

.

A) mobile messaging

B

.

B) online forum

C

.

C) SMS messaging

D

.

D) VoIP

正確答案: B

29.48) Which of the following is Google hoping to use to provide Internet access to remote parts of the world?

A

.

A) unused, low-powered television channels

B

.

B) high-altitude balloons

C

.

C) WLANs

D

.

D) EDI

正確答案: B

30.38) TCP/IP operates in which layer of Internet architecture?

A

.

A) Network Technology Substrate layer

B

.

B) Middleware Services layer

C

.

C) Transport Services and Representation Standards layer

D

.

D) Applications layer

正確答案: C

31.24) Which of the following was the original purpose of the Internet?

A

.

A) to provide a network that would allow businesses to connect with consumers

B

.

B) to link large mainframe computers on different college campuses

C

.

C) to develop a military communications system that could withstand nuclear war

D

.

D) to enable government agencies to track civilian communications

正確答案: B

32.76) The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A

.

A) VoIP.

B

.

B) IPTP.

C

.

C) VTP.

D

.

D) IP.

正確答案: A

33.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]

A

.

商業自動化

B

.

電子商業

C

.

電子商務

D

.

協同產品商務

正確答案: D

34.阿源第一次利用博客來買書,在準備購買的時候,看到上面清楚的購買流程圖讓他順利買到他想要的書,請問博客來這樣的設計符合 B to C電子商務網站維持因素的哪一個?[單選]

A

.

良好功能

B

.

瀏覽器開啟

C

.

資訊化

D

.

相關指引

正確答案: D

35.根據Goldman Sachs對於協同商務層級的分類,由低至高排序為下列何者?[單選]

A

.

線上學習

B

.

線上團購

C

.

線上購物

D

.

線上拍賣

正確答案: B

36.63) The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A

.

A) Netscape Navigator.

B

.

B) Mosaic.

C

.

C) Mozilla.

D

.

D) Internet Explorer.

正確答案: B

37.在線上以物易物的方式進行交易,在電子商務中屬於何種經營模式?[單選] 回答錯誤

A

.

People to People

B

.

Peer to Peer

C

.

People to Peer

D

.

Peer to People

正確答案: D

38.阿翔是個3C愛好者,於是常常上MOBILE01討論,請問MOBILE01的出現是來自虛擬社群互動基礎的哪一項?[單選]

A

.

多品牌服務

B

.

交流管道

C

.

交易機制

D

.

創造價值

正確答案: D

39.台灣銀行在民國861月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]

A

.

電子資料交換

B

.

基本的電子商務

C

.

電子交易市集

D

.

協同商務

正確答案: A

40.28) The term latency refers to a delay that can be experienced in packet-switched networks.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

41.29) Edge computing improves response time and saves bandwidth.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

42.30) A private cloud is operated for the benefit of multiple firms.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

43.84) The only way apps can be purchased is via either the Apple App Store or from Google Play.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

44.55) T1 and T3 refer to international telephone standards for digital communication.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

45.31) Amazon Web Services is an example of a private cloud.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

46.78) About 75% of U.S. smart speaker users make voice-based purchases using those devices.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

47.59) WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

48.32) HTTP/2 is supported by almost all the leading web browsers.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

49.55) T1 and T3 refer to international telephone standards for digital communication.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

50.57) Tier 1 ISPs provide Internet access to consumers and businesses.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

1.1) During which period of time did the Institutionalization phase of Internet development take place?

A

.

A) 1950-1960

B

.

B) 1961-1974

C

.

C) 1975-1995

D

.

D) 1995 to the present

正確答案: C

2.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]

A

.

商業自動化

B

.

電子商業

C

.

電子商務

D

.

協同產品商務

正確答案: D

3.14) Which of the following protocols is used to send mail to a server?

A

.

A) SMTP

B

.

B) FTP

C

.

C) HTTP

D

.

D) SSL

正確答案: A

4.台塑網出現後可與兩岸相關企業進行交易行為,不用另外以電話或傳真進行通知,減少採購人員的負擔,這是屬交易平台主要功能的哪一項?[單選] 回答錯誤

A

.

提供交易管理

B

.

豐富的比價機制

C

.

簡化買賣流程

D

.

創造收益利潤

正確答案: D

5.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]

A

.

商業自動化

B

.

電子商業

C

.

電子商務

D

.

協同產品商務

正確答案: D

6.Morgan Stanley 認為B2B 電子商務的演進可分為四個發展階段,下列排序何者正確?[單選]

A

.

電子資料交換(EDI)→電子交易市集基礎的電子商務協同商務

B

.

電子資料交換(EDI)→協同商務基礎的電子商務電子交易市集

C

.

電子資料交換(EDI)→基礎的電子商務協同商務電子交易市集

D

.

電子資料交換(EDI)→基礎的電子商務電子交易市集協同商務

正確答案: D

7.63) The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A

.

A) Netscape Navigator.

B

.

B) Mosaic.

C

.

C) Mozilla.

D

.

D) Internet Explorer.

正確答案: B

8.83) Applications for Android operating system-based smartphones are typically written in which of the following?

A

.

A) Swift

B

.

B) Java

C

.

C) ActiveX

D

.

D) ColdFusion

正確答案: B

9.根據Goldman Sachs對於協同商務層級的分類,由低至高排序為下列何者?[單選]

A

.

線上學習

B

.

線上團購

C

.

線上購物

D

.

線上拍賣

正確答案: B

10.20) Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

A

.

A) routers

B

.

B) Web servers

C

.

C) IP servers

D

.

D) packet servers

正確答案: A

11.2. 在電子商務的交易模式中,若由買方彼此競價,出價最高者就贏得這項商務交易,這是屬於?(單選)

A

.

(A) 需求整合式價格

B

.

(B) 目錄式價格

C

.

(C) 拍賣式價格

D

.

(D) 逆拍賣式價格

正確答案: C

12.38) TCP/IP operates in which layer of Internet architecture?

A

.

A) Network Technology Substrate layer

B

.

B) Middleware Services layer

C

.

C) Transport Services and Representation Standards layer

D

.

D) Applications layer

正確答案: C

13.阿證最近發現某茶飲的廣告;「只要來店消費就會給予一組序號,憑序號再到Facebook按讚,就有機會獲得電影票一張。」請問這屬於C to C網路交易模式效益的哪一項?[單選]

A

.

虛構的高評價

B

.

設立釣魚網頁

C

.

縮短交易時間

D

.

提供錯誤資訊

正確答案: D

14.Morgan Stanley 認為B2B 電子商務的演進可分為四個發展階段,下列排序何者正確?[單選]

A

.

電子資料交換(EDI)→電子交易市集基礎的電子商務協同商務

B

.

電子資料交換(EDI)→協同商務基礎的電子商務電子交易市集

C

.

電子資料交換(EDI)→基礎的電子商務協同商務電子交易市集

D

.

電子資料交換(EDI)→基礎的電子商務電子交易市集協同商務

正確答案: D

15.阿翔是個3C愛好者,於是常常上MOBILE01討論,請問MOBILE01的出現是來自虛擬社群互動基礎的哪一項?[單選]

A

.

多品牌服務

B

.

交流管道

C

.

交易機制

D

.

創造價值

正確答案: D

16.37) Which of the following organizations focuses on the evolution of the Internet?

A

.

A) IRTF

B

.

B) ISOC

C

.

C) W3C

D

.

D) ICANN

正確答案: A

17.45) Which of the following is not true about the mobile platform?

A

.

A) Most smartphones use Intel chips.

B

.

B) Smartphones and tablet computers are the primary means to access the Internet, both in the United States and worldwide.

C

.

C) Most smartphones use either Google's Android or Apple's iOS operating systems.

D

.

D) Smartphones use flash memory chips.

正確答案: A

18.由消費者與消費者進行交易,在電子商務中屬於何種經營模式?[單選]

A

.

B2B

B

.

B2C

C

.

C2C

D

.

P2P

正確答案: C

19.27) In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6).

A

.

A) 10%

B

.

B) 15%

C

.

C) 45%

D

.

D) 65%

正確答案: C

20.9. 阿斌是 Apple 的瘋狂粉絲,在 iPad mini 尚未在台灣上市時,就透過拍賣網站先買到,請問這是屬於 C to C 網路交易模式帶來的何種效益?(單選)

A

.

(A) 獲利性

B

.

(B) 特殊性

C

.

(C) 低價性

D

.

(D) 流動性

正確答案: B

21.77) Snapchat’s Lenses feature is an example of which of the following?

A

.

A) artificial digital assistant

B

.

B) virtual reality

C

.

C) augmented reality

D

.

D) mixed reality

正確答案: C

22.10. 在電子商務的課程中,老師告訴大家在進行網路交易的時候要多方比較與分析、再次確認與詢問、確認網址與連結,請問老師正在教什麼?(單選)

A

.

(A) C to C 網路交易模式效益

B

.

(B) C to C 網路分享模式的過程

C

.

(C) C to C 網路交易模式的詐騙與防止

D

.

(D) C to C 網路交易模式的概念

正確答案: C

23.4. 台塑透過台塑網提高台塑集團採購、工程發包、原料標售系統與庫存管理等作業效率,進而提升台塑集團的競爭力。請問台塑網的發展屬於 B to B 電子商務發展的哪一個階段?(單選)

A

.

(A) 電子資料交換

B

.

(B) 基本的電子商務

C

.

(C) 電子交易市集

D

.

(D) 協同商務

正確答案: C

24.老陳是美國影集的愛好者,常到以物易物網和其他人交換自己喜愛的影集,請問以物易物網是屬於C to C商務模式的哪一種?[單選]

A

.

競標過程

B

.

註冊使用

C

.

後續活動

D

.

上架交易

正確答案: A

25.21) Which of the following is a set of rules for transferring data?

A

.

A) protocol

B

.

B) packet

C

.

C) router

D

.

D) IP address

正確答案: A

26.7. 阿任很想買一台 New iPad,為了以較優惠的價格買到,於是到殺價王和其他消費者競標,在這裡,以唯一最低出價者得標,請問此概念類似下列哪種拍賣模式?(單選)

A

.

(A) 英式拍賣

B

.

(B) 美式拍賣

C

.

(C) 義式拍賣

D

.

(D) 荷式拍賣

正確答案: D

27.51) Which of the following standards provide for high-speed short-range Wi-Fi?

A

.

A) WiGig

B

.

B) WiMax

C

.

C) Bluetooth

D

.

D) Wi-Fi 6

正確答案: A

28.8. 不小心弄壞小仙耳機的阿光,到 Yahoo!奇摩拍賣尋找賣方,因為怕買到水貨,他都會注意每位賣方的評價,請問阿光正在 C to C 網路交易模式的哪一個過程?(單選) 回答錯誤

A

.

(A) 競標過程

B

.

(B) 註冊使用

C

.

(C) 後續活動

D

.

(D) 上架交易

正確答案: A

29.台灣銀行在民國861月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]

A

.

電子資料交換

B

.

基本的電子商務

C

.

電子交易市集

D

.

協同商務

正確答案: A

30.小安是個愛寫小說的人,以下哪個社會網絡服務網站較不適合他?[單選] 回答錯誤

A

.

分享期

B

.

互動期

C

.

準備期

D

.

商務期

正確答案: B

31.23) Which of the following are central directories that list all domain names currently in use for specific domains?

A

.

A) Web servers

B

.

B) root servers

C

.

C) client servers

D

.

D) DNS servers

正確答案: B

32.「台塑網」屬於Morgan Stanley 電子市集經營模式中的哪一種?[單選]

A

.

由買方建? (Buy-managed) 電子市集

B

.

由賣方建? (Supplier-managed) 電子市集

C

.

公開市集 (Marker Markets)

D

.

內容整合 (Content Aggregator) 電子市集

正確答案: A

33.65) You could expect to find all of the following services in a web server software package except:

A

.

A) security services.

B

.

B) FTP.

C

.

C) search engine.

D

.

D) an RSS aggregator.

正確答案: D

34.P&GWal-Mart建立分享資訊機制,讓P&G每天由Wal-Mart蒐集銷售資訊,藉此管理在Wal-Mart的存貨。請問這是屬於協同商務四大領域中的哪一種?[單選]

A

.

供應鏈管理

B

.

顧客關係管理

C

.

企業資源規劃

D

.

關係強度預測

正確答案: B

35.48) Which of the following is Google hoping to use to provide Internet access to remote parts of the world?

A

.

A) unused, low-powered television channels

B

.

B) high-altitude balloons

C

.

C) WLANs

D

.

D) EDI

正確答案: B

36.將傳統拍賣方式轉換到網際網路上來進行 ,此模式稱為?[單選] 回答錯誤

A

.

銷售通路者

B

.

市場製造者

C

.

交易服務者

D

.

市場利基者

正確答案: D

37.在經營傳統的B to C商務時,首先要思考的是?[單選]

A

.

產品

B

.

價格

C

.

區位

D

.

顧客經驗

正確答案: C

38.44) The ________ helps define the overall structure of the Internet.

A

.

A) IAB

B

.

B) IESG

C

.

C) W3C

D

.

D) ITU

正確答案: A

39.73) Which of the following enables Internet users to communicate with each other, although not in real time?

A

.

A) mobile messaging

B

.

B) online forum

C

.

C) SMS messaging

D

.

D) VoIP

正確答案: B

40.55) T1 and T3 refer to international telephone standards for digital communication.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

41.28) The term latency refers to a delay that can be experienced in packet-switched networks.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

42.31) Amazon Web Services is an example of a private cloud.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

43.30) A private cloud is operated for the benefit of multiple firms.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

44.29) Edge computing improves response time and saves bandwidth.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

45.32) HTTP/2 is supported by almost all the leading web browsers.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

46.57) Tier 1 ISPs provide Internet access to consumers and businesses.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

47.59) WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

48.55) T1 and T3 refer to international telephone standards for digital communication.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

49.78) About 75% of U.S. smart speaker users make voice-based purchases using those devices.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

50.84) The only way apps can be purchased is via either the Apple App Store or from Google Play.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

1.P&GWal-Mart建立分享資訊機制,讓P&G每天由Wal-Mart蒐集銷售資訊,藉此管理在Wal-Mart的存貨。請問這是屬於協同商務四大領域中的哪一種?[單選]

A

.

供應鏈管理

B

.

顧客關係管理

C

.

企業資源規劃

D

.

關係強度預測

正確答案: B

2.7. 阿任很想買一台 New iPad,為了以較優惠的價格買到,於是到殺價王和其他消費者競標,在這裡,以唯一最低出價者得標,請問此概念類似下列哪種拍賣模式?(單選)

A

.

(A) 英式拍賣

B

.

(B) 美式拍賣

C

.

(C) 義式拍賣

D

.

(D) 荷式拍賣

正確答案: D

3.74) Which of the following is not a mobile messaging application?

A

.

A) Kik

B

.

B) WhatsApp

C

.

C) Viber

D

.

D) Feedly

正確答案: D

4.43) The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A

.

A) Internet Engineering Steering Group (IESG)

B

.

B) World Wide Web Consortium (W3C)

C

.

C) Internet Engineering Task Force (IETF)

D

.

D) Internet Society (ISOC)

正確答案: D

5.24) Which of the following was the original purpose of the Internet?

A

.

A) to provide a network that would allow businesses to connect with consumers

B

.

B) to link large mainframe computers on different college campuses

C

.

C) to develop a military communications system that could withstand nuclear war

D

.

D) to enable government agencies to track civilian communications

正確答案: B

6.Morgan Stanley 認為B2B 電子商務的演進可分為四個發展階段,下列排序何者正確?[單選]

A

.

電子資料交換(EDI)→電子交易市集基礎的電子商務協同商務

B

.

電子資料交換(EDI)→協同商務基礎的電子商務電子交易市集

C

.

電子資料交換(EDI)→基礎的電子商務協同商務電子交易市集

D

.

電子資料交換(EDI)→基礎的電子商務電子交易市集協同商務

正確答案: D

7.5) The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

A

.

A) routing.

B

.

B) hyperlinking.

C

.

C) packet switching.

D

.

D) transporting.

正確答案: C

8.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]

A

.

人際關係

B

.

交易

C

.

幻想

D

.

興趣

正確答案: D

9.51) Which of the following standards provide for high-speed short-range Wi-Fi?

A

.

A) WiGig

B

.

B) WiMax

C

.

C) Bluetooth

D

.

D) Wi-Fi 6

正確答案: A

10.在線上以物易物的方式進行交易,在電子商務中屬於何種經營模式?[單選]

A

.

People to People

B

.

Peer to Peer

C

.

People to Peer

D

.

Peer to People

正確答案: D

11.16) Which of the following statements about cloud computing is not true?

A

.

A) A public cloud is typically used by companies with stringent privacy and security requirements.

B

.

B) Dropbox is an example of a public cloud.

C

.

C) Hybrid clouds offer both public and private cloud options.

D

.

D) A private cloud may be hosted internally or externally.

正確答案: A

12.45) Which of the following is not true about the mobile platform?

A

.

A) Most smartphones use Intel chips.

B

.

B) Smartphones and tablet computers are the primary means to access the Internet, both in the United States and worldwide.

C

.

C) Most smartphones use either Google's Android or Apple's iOS operating systems.

D

.

D) Smartphones use flash memory chips.

正確答案: A

13.阿證最近發現某茶飲的廣告;「只要來店消費就會給予一組序號,憑序號再到Facebook按讚,就有機會獲得電影票一張。」請問這屬於C to C網路交易模式效益的哪一項?[單選]

A

.

虛構的高評價

B

.

設立釣魚網頁

C

.

縮短交易時間

D

.

提供錯誤資訊

正確答案: D

14.77) Snapchat’s Lenses feature is an example of which of the following?

A

.

A) artificial digital assistant

B

.

B) virtual reality

C

.

C) augmented reality

D

.

D) mixed reality

正確答案: C

15.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]

A

.

商業自動化

B

.

電子商業

C

.

電子商務

D

.

協同產品商務

正確答案: D

16.73) Which of the following enables Internet users to communicate with each other, although not in real time?

A

.

A) mobile messaging

B

.

B) online forum

C

.

C) SMS messaging

D

.

D) VoIP

正確答案: B

17.23) Which of the following are central directories that list all domain names currently in use for specific domains?

A

.

A) Web servers

B

.

B) root servers

C

.

C) client servers

D

.

D) DNS servers

正確答案: B

18.B to B交易平台的出現可以讓整個交易過程更為簡化、快速,這是考慮到哪一個因素?[單選] 回答錯誤

A

.

儘早市場卡位

B

.

策略聯盟夥伴

C

.

專業管理能力

D

.

建立聲望與信任

正確答案: B

19.83) Applications for Android operating system-based smartphones are typically written in which of the following?

A

.

A) Swift

B

.

B) Java

C

.

C) ActiveX

D

.

D) ColdFusion

正確答案: B

20.老陳是美國影集的愛好者,常到以物易物網和其他人交換自己喜愛的影集,請問以物易物網是屬於C to C商務模式的哪一種?[單選]

A

.

競標過程

B

.

註冊使用

C

.

後續活動

D

.

上架交易

正確答案: A

21.台塑網出現後可與兩岸相關企業進行交易行為,不用另外以電話或傳真進行通知,減少採購人員的負擔,這是屬交易平台主要功能的哪一項?[單選]

A

.

提供交易管理

B

.

豐富的比價機制

C

.

簡化買賣流程

D

.

創造收益利潤

正確答案: D

22.8) The Internet Layer of TCP/IP is responsible for which of the following?

A

.

A) placing packets on and receiving them from the network medium

B

.

B) addressing, packaging, and routing messages

C

.

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D

.

D) providing a variety of applications with the ability to access the services of the lower layers

正確答案: B

23.Morgan Stanley 認為B2B 電子商務的演進可分為四個發展階段,下列排序何者正確?[單選]

A

.

電子資料交換(EDI)→電子交易市集基礎的電子商務協同商務

B

.

電子資料交換(EDI)→協同商務基礎的電子商務電子交易市集

C

.

電子資料交換(EDI)→基礎的電子商務協同商務電子交易市集

D

.

電子資料交換(EDI)→基礎的電子商務電子交易市集協同商務

正確答案: D

24.Morgan Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選]

A

.

吸引人潮

B

.

發展交易

C

.

匯聚人潮

D

.

獲得錢潮

正確答案: C

25.9. 阿斌是 Apple 的瘋狂粉絲,在 iPad mini 尚未在台灣上市時,就透過拍賣網站先買到,請問這是屬於 C to C 網路交易模式帶來的何種效益?(單選)

A

.

(A) 獲利性

B

.

(B) 特殊性

C

.

(C) 低價性

D

.

(D) 流動性

正確答案: B

26.由消費者與消費者進行交易,在電子商務中屬於何種經營模式?[單選]

A

.

B2B

B

.

B2C

C

.

C2C

D

.

P2P

正確答案: C

27.台灣銀行在民國861月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]

A

.

電子資料交換

B

.

基本的電子商務

C

.

電子交易市集

D

.

協同商務

正確答案: A

28.eBay 拍賣網站」屬於哪一種電子商務模式?[單選]

A

.

B2B

B

.

B2C

C

.

C2C

D

.

P2P

正確答案: D

29.52) All of the following are involved in the effort to create standards for IoT except:

A

.

A) AllSeen Alliance.

B

.

B) Industrial Internet Consortium.

C

.

C) Open Connectivity Foundation.

D

.

D) W3C.

正確答案: D

30.54) Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies?

A

.

A) satellites

B

.

B) drones

C

.

C) unused, low-powered television channels

D

.

D) high-altitude balloons

正確答案: C

31.72) Which of the following was the first to launch an intelligent digital assistant?

A

.

A) Facebook

B

.

B) Apple

C

.

C) Amazon

D

.

D) Google

正確答案: B

32.8) The Internet Layer of TCP/IP is responsible for which of the following?

A

.

A) placing packets on and receiving them from the network medium

B

.

B) addressing, packaging, and routing messages

C

.

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D

.

D) providing a variety of applications with the ability to access the services of the lower layers

正確答案: B

33.21) Which of the following is a set of rules for transferring data?

A

.

A) protocol

B

.

B) packet

C

.

C) router

D

.

D) IP address

正確答案: A

34.在線上以物?物的方式進??,是屬於電子商務中的何種經營模式?[單選]

A

.

充足的信任機制

B

.

易用的網站功能

C

.

特殊的使用經驗

D

.

便捷的運送服務

正確答案: D

35.72) Which of the following was the first to launch an intelligent digital assistant?

A

.

A) Facebook

B

.

B) Apple

C

.

C) Amazon

D

.

D) Google

正確答案: B

36.拍賣網站提供消費者雙方標售二手商品,在電子商務中屬於何種經營模式?[單選]

A

.

B2C

B

.

B2B

C

.

C2B

D

.

C2C

正確答案: C

37.小安是個愛寫小說的人,以下哪個社會網絡服務網站較不適合他?[單選]

A

.

分享期

B

.

互動期

C

.

準備期

D

.

商務期

正確答案: B

38.48) Which of the following is Google hoping to use to provide Internet access to remote parts of the world?

A

.

A) unused, low-powered television channels

B

.

B) high-altitude balloons

C

.

C) WLANs

D

.

D) EDI

正確答案: B

39.老陳是美國影集的愛好者,常到以物易物網和其他人交換自己喜愛的影集,請問以物易物網是屬於C to C商務模式的哪一種?[單選]

A

.

競標過程

B

.

註冊使用

C

.

後續活動

D

.

上架交易

正確答案: A

40.84) The only way apps can be purchased is via either the Apple App Store or from Google Play.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

41.28) The term latency refers to a delay that can be experienced in packet-switched networks.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

42.32) HTTP/2 is supported by almost all the leading web browsers.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

43.31) Amazon Web Services is an example of a private cloud.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

44.59) WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

45.78) About 75% of U.S. smart speaker users make voice-based purchases using those devices.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

46.30) A private cloud is operated for the benefit of multiple firms.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

47.29) Edge computing improves response time and saves bandwidth.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

48.55) T1 and T3 refer to international telephone standards for digital communication.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

49.55) T1 and T3 refer to international telephone standards for digital communication.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

50.57) Tier 1 ISPs provide Internet access to consumers and businesses.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

-----------

During which period of time did the Institutionalization phase of Internet development take place?

A) 1950-1960

B) 1961-1974

C) 1975-1995

D) 1995-through the present

C

Which of the following occurred during the Commercialization phase of Internet development?

A) The fundamental building blocks of the Internet were realized in actual hardware and software.

B) Personal computers were invented.

C) The Domain Name System (DNS) was introduced.

D) NSF privatized the operation of the Internet's backbone.

D

During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

A) Commercialization

B) Institutional

C) Innovation

D) Consolidation

B

Which of the following is not one of the basic technological foundations of the Internet?

A) client/server computing

B) FTP

C) TCP/IP

D) packet switching

B

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

A) routing.

B) the Transmission Control Protocol (TCP).

C) packet switching.

D) the File Transfer Protocol (FTP).

C

Which of the following is the core communications protocol for the Internet?

A) Telnet

B) FTP

C) TCP/IP

D) TLS

C

The ________ allows a natural language expression, such as Google.com, to represent a numeric IP address.

A) uniform resource locator system

B) Internet protocol addressing schema

C) domain name system

D) assigned numbers and names system

C

The address used by a browser to identify the location of content on the Web is called:

A) a domain name.

B) a uniform resource locator.

C) an IP address.

D) a file path.

B

12) Which of the following is not an advantage of client/server computing over centralized mainframe computing?

A) It is easy to expand capacity by adding servers and clients.

B) Each client added to the network increases the network's overall capacity and transmission speeds.

C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.

D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.

B

________ is a model of computing in that computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the Internet.

A) Client/server computing

B) P2P computing

C) Mobile computing

D) Cloud computing

D

Which of the following statements about cloud computing is not true?

A) A public cloud is typically used by companies with stringent privacy and security requirements.

B) Dropbox is an example of a public cloud.

C) Hybrid clouds offer both public and private cloud options.

D) A private cloud hosted internally or externally.

A

________ is used to allow remote login on another computer.

A) Telnet

B) FTP

C) HTTP

D) SSL

A

________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

A) Ping

B) Telnet

C) Tracert

D) Finger

A

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

A) fiber optics

B) Wi-Fi

C) IPv6

D) client/server computing

D

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

A) routers

B) web servers

C) IP servers

D) packet servers

A

Which of the following is a set of rules for transferring data?

A) protocol

B) packet

C) router

D) IP address

A

Which of the following is not a basic type of cloud computing service?

A) IaaS

B) PaaS

C) SaaS

D) FiOS

D

Which of the following was the original purpose of the Internet?

A) to provide a network that would allow businesses to connect with consumers

B) to link large mainframe computers on different college campuses

C) to develop military communications systems that could withstand nuclear war

D) to enable government agencies to track civilian communications

B

When talking about the physical elements of the Internet, the term redundancy refers to:

A) transmitting multiple copies of a single packet to safeguard against data loss.

B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.

C) delays in messages caused by the uneven flow of information through the network.

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

D

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A) Internet Engineering Steering Group (IESG)

B) World Wide Web Consortium (W3C)

C) Internet Engineering Task Force (IETF)

D) Internet Society (ISOC)

D

Which of the following is not true about the mobile platform?

A) Most smartphones use Intel chips.

B) The number of cell phones worldwide exceeds the number of PCs.

C) Over a third of the world's cell phones are smartphones.

D) Smartphones use flash memory chips.

A

Which of the following is not a concern about IoT?

A) the high cost of sensors

B) interoperability

C) security

D) privacy

A

What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?

A) Bluetooth

B) drones

C) WLANs

D) DSL

B

Which of the following is not a limitation of the current Internet?

A) the continued reliance on cables and wires for connectivity

B) limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic

C) architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance

D) the difficulty in expanding capacity by adding servers and clients

D

Which of the following statements about fiber-optic cable is not true?

A) It transmits more data at faster speeds than coaxial or twisted pair cable.

B) It is thinner and lighter than coaxial or twisted pair cable.

C) As of 2016, a majority of U.S. homes have fiber connections.

D) Telecommunications firms have made substantial investments in cross-country fiber optic systems in the last decade.

C

The major technologies used with wireless local area networks are:

A) Wi-Fi and Bluetooth.

B) Wi-Fi and WiMax.

C) Bluetooth and 3G.

D) WiMax and 3G.

A

Which of the following refers to delays in messages caused by the uneven flow of information packets through the network?

A) redundancy

B) latency

C) Net neutrality

D) QOS

B

What country intends to be the first to use Project Loon to provide universal Internet access?

A) New Zealand

B) Sri Lanka

C) Ghana

D) Australia

B

The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A) Netscape Navigator.

B) Mosaic.

C) Mozilla.

D) Internet Explorer.

B

In the address http://www.company.com/clients.html, which of the following is the top-level domain?

A) .com

B) company.com

C) www

D) http

A

You could expect to find the following services in a web server software package except:

A) security services.

B) FTP.

C) search engine.

D) an RSS aggregator.

D

Which of the following is currently the most popular web browser?

A) Internet Explorer

B) Safari

C) Chrome

D) Firefox

C

Cortana is a type of:

A) intelligent personal assistant.

B) widget.

C) gadget.

D) social network.

A

Which of the following enables Internet users to communicate with each other, although not in real time?

A) mobile messaging

B) online forum

C) SMS messaging

D) VoIP

B

Which of the following is not a mobile messaging application?

A) Kik

B) WhatsApp

C) Viber

D) Feedly

D

A(n) ________ allows users to easily add and edit content on a web page.

A) wiki

B) podcast

C) blog

D) RSS feed

A

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A) VoIP.

B) IPTP.

C) VTP.

D) IP.

A

Snapchat's Lenses feature is an example of which of the following?

A) virtual reality

B) artificial intelligence

C) augmented reality

D) chatbot

C

All of the following statements about mobile apps are true except:

A) the average U.S. consumer now spends more time using mobile apps than watching television.

B) iOS apps are cross-platform, open-source applications.

C) over 130 billion apps have been downloaded from the Apple App Store.

D) almost all the top 100 brands have a presence in at least one of the major app stores.

B

----

You wish to send encrypted emails. What option should you enable?

A) S/MIME

B) POP3

C) IMAP

D) ISP

A) S/MIME /Secure/Multipurpose Internet Mail Extensions (S/MIME) allows you to send encrypted emails when enabled. To enable S/MIME on an Android phone, open the email client and select More. Then select the appropriate email account and Security Options. To enable encryption, select the Encrypt option, and then tap Email encryption cert. (If prompted, you may have to enter the device password at this point.) If you wish to use a certificate that is already installed, select the client certificate from those available, and then click Allow.

- POP3 (110) copies the emails from the server onto the local machine, then deletes the original from the server. It does not provide encryption.

- IMAP (143) stores mail on a server for subsequent remote access. It does not provide encryption.

What transport protocol and port are used to transmit HTTPS traffic?

A) TCP/ 443

B) TCP/ 80

C) UDP/ 443

D) UDP/ 80

A) TCP/ 443

What feature would we use to give a host a known IP without having to configure a static address on the host itself?

A) APIPA

B) DNS host record

C) DHCP scope

D) DHCP reservation

D) DHCP reservation

Which term refers to establishing a TCP session?

A) Query

B) Reservation

C) Handshake

D) Authentication

C) Handshake

Which of the following protocols is used for transporting email? (choose two.)

A) SMTP

B) POP3

C) X.500

D) MIME

E) X.25

A) SMTP (sending email)

B) POP3 (receiving email) /Remember, SMTP is used for sending emails, POP3 is often used for receiving emails.

You are configuring a customer's new PC. When setting up their email you find that their incoming email server uses port 995. What protocol does this setting support?

A) POP3

B) IMAP

C) POP3S

D) S/MIME

C) POP3S /POP3 and IMAP are widely used for unencrypted client connections to the mail server. Encrypted connections to POP3 servers use default port 995 to support POP3 SSL/TLS (POP3S)

Which protocol uses TCP port 443?

A) SMTP

B) TFTP

C) HTTPS

D) HTTP

C) HTTPS/ HTTPS is the second version of HTTP and normally uses 128 bit SSL (Secure Sockets Layer) encryption to secure the information sent and received on a web page.

A user needs telnet remote terminal access to be able to work from home. You disapprove of this citing security concerns. What is your optimal solution for this user?

A) SFTP

B) SSH

C) RDP

D) Telnetd

B) SSH /Telent sessions are insecure and hackers can obtain usernames and passwords, without much trouble. SSH addresses this security issue and is implemented through open source programs such as PuTTY or KiTTY. Telnetd is a telent server.

A web developer wants to increase security on the company website. Which of the following Internet protocols should be implemented to meet the requirement?

A) HTTPS

B) IMAP

C) TELNET

D) SMTP

A) HTTPS /In order to protect the confidentiality of data transmitted from the company, website encryption would be required, which would necessitate the HTTPS protocol on port 443 using the SSL/TLS standard.

Which port is used by the IMAP protocol?

A) 67/68

B) 25

C) 110

D) 143

D) 143/ The Internet Mail Access Protocol (IMAP) uses port 143. Ports 67/68 are used by DHCP, 25 is used by S(ponge)MTP(atrick) and 110 is used by POP(POP)3.

Which of the following involves two servers and makes use of POP3 or IMAP4?

A) Web server

B) File server

C) DHCP server

D) DNS server

E) Mail server

E) Mail server /Email is a client-server application that involves two mail servers. SMTP is used to send email messages, and either POP3 or IMAP4 is used to deliver an email message to a client.

You want to use a secure email configuration on your mobile device. Which port would you open on the router to use the Secure (SSL) SMTP protocol?

A) 995

B) 993

C) 465

D) 587

C) 465 /Secure SMTP uses Port 465, Unsecured SMTP and secure TLS use port 25 and can also use port 587.

You want to implement Remote Desktop on your company's network. Which security precaution would you implement?

A) Change default port

B) Block port 3389 on firewall

C) Limit Remote users Group password lockout

D) All of these

D) All of these /Remote desktop can increase productivity and access, but at a cost. All of the following choices are correct and should be implemented. Changing the default RDP port from 3389 and blocking it will keep hackers from targeting the protocol. In addition, strengthen or implement the Remote Users group lockout policy in order to prevent brute force attempts.

One of your customers is having trouble obtaining a DHCP address. The access point they are using is correctly configured to assign addresses. Which port(s) would you check?

A) 20/21

B) 67/68

C) 137/139

D) 161/162

B) 67/68 /The DHCP uses port 67 and 68 to accept requests and assign addresses. Ports 20/21 are used by FTP, NetBIOS over 137/139.

HTTP (Hypertext Transfer Protocol) is used to

A) Create WEB pages

B) Develop a performance baseline of the network

C) Control system monitoring

D) Communicate between Web browsers and Web servers

D) The HTTP protocol (80) is used by Web browsers and Web servers to transfer files, such as text and graphic files.

Which of the protocols shown provides support for Remote Desktop?

A) DNS

B) RDP

C) DNAT

D) SRDP

B) RDP

How can you access a PC using the Terminal window?

A) Ifget

B) telnet

C) Net use

D) telnetrc

B) telnet /The te(L)net command is common to Microsoft, Linux and Macs. Its default port is 23. You use the command and the target machine name and need your password to continue. It will bring you a terminal screen, no GUI. The net use command is a Windows command used to map drives and other options but not an interactive environment. Telnetrc gets executed once you have successfully connected to a Linux device. Ifget is the nonsense detractor and is of no use here.

To configure email on an iOS device, you will need: (Choose all that apply)

A) Your phone number

B) Street address

C) Names of mail servers

D) Type of protocol used

E) Browser type

C) Names of mail servers

D) Type of protocol used /The type of information you will need are email address/password, server names, protocols used and security information.

Which port is used by a server using SSL-secured IMAP protocol?

A) 110

B) 143

C) 993

D) 995

C) 993

Which Applications level protocol is used to transfer files on the Internet?

A) Email

B) FTP (21)

C) Web browser

D) Telnet (23)

B) FTP /File Transfer Protocol (21) (not today) is a type of protocol supported on the Internet that allows you to easily transfer files from your computer to another computer. To use FTP, you need the address of a server that supports FTP and a client software package that supports FTP running on your computer. This protocol runs in the OSI (Open Systems Interconnection) model Application Layer.

What is the default port for FTP?

A) 21

B) 80

C) 23

D) 25

A) 21, could you do somethin for me?

The Internet uses which network protocol?

A) IPX/SPX

B) TCP/IP

C) ATM

D) Netbeui

B) TCP/IP /Remember, TCP/IP was invented to serve the Internet or large company intranets.

A laptop is not able to resolve the IP address of any FQDNs. Which of the following would MOST likely be blocked at the firewall?

A) TCP/22

B) UDP/53

C) TCP/389

D) UDP/161

E) TCP/443

B) UDP/53. Port 53 is DNS. DNS converts names to IP addresses. www.professormesser.com=162.159.246.164.

If you are able to use FTP, this verifies which transport protocol is functioning?

A) IP

B) IPX

C) TCP

D) NWLink

C) TCP /Remember, FTP also allows for access in both directions. FTP teams up with Telnet to transparently log you on to the FTP server and then provides for the transfer of files. Accessing a host is only the first step. Users must then be subjected to an authenticaion login that's probably secured with passwords and usernames placed there by the system administrator to restrict access. FTP is part of the TCP/IP stack, and since it's connection oriented, it can verify TCP is functioning.

You have implemented a permanent connection to the Internet for your home network that consists of three workstations. You are concerned about the threat of hackers gaining access from the Internet. You have set up filtering on your DSL router. Now, you are unable to access Internet sites by their domain names, though you can access them by their IP addresses. Which of the following is most likely the cause of this problem?

A) Your DSL router is blocking port 21

B) Your DSL router is blocking port 53

C) Your DSL router is not logged into the ISP

D) You do not have IP configured on your clients

B) Your DSL router is blocking port 53/ The DNS service uses port 53.

When configuring corporate email, you must enter

A) SMTP

B) POP3

C) Account name

D) Password

E) DNS

F) ISP

A) SMTP

B) POP3

C) Account name /Email configuration requires setting the SMTP server name, the POP3 server name, and the account name. The password can be left to be entered each time you log in to get email. Remember that optionally you can enter the password during configuration and check off to have it saved.

---

1) During which period of time did the Institutionalization phase of Internet development take place?

A) 1950-1960

B) 1961-1974

C) 1975-1995

D) 1995-through the present

C)1975-1995

2) Which of the following occurred during the Commercialization phase of Internet development?

A) The fundamental building blocks of the Internet were realized in actual hardware and software.

B) Personal computers were invented.

C) The Domain Name System (DNS) was introduced.

D) NSF privatized the operation of the Internet's backbone.

D) NSF privatized the operation of the Internet's backbone.

3) During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

A) Commercialization

B) Institutional

C) Innovation

D) Consolidation

B)innovation

4) Which of the following is not one of the basic technological foundations of the Internet?

A) client/server computing

B) FTP

C) TCP/IP

D) packet switching

B)FTP

5) The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

A) routing.

B) the Transmission Control Protocol (TCP).

C) packet switching.

D) the File Transfer Protocol (FTP).

C) packet switching

6) Which of the following is the core communications protocol for the Internet?

A) Telnet

B) FTP

C) TCP/IP

D) TLS

C) TCP/IP

7) The Transport Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium

B) addressing, packaging, and routing messages

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D) providing a variety of applications with the ability to access the services of the lower layers

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

8) The Internet Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium

B) addressing, packaging, and routing messages

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D) providing a variety of applications with the ability to access the services of the lower layers

B) addressing, packaging, and routing messages

9) An IPv4 address is expressed as a:

A) 32-bit number that appears as a series of four separate numbers separated by semicolons.

B) 64-bit number that appears as a series of four separate numbers separated by semicolons.

C) 64-bit number that appears as a series of four separate numbers separated by periods.

D) 32-bit number that appears as a series of four separate numbers separated by periods.

D) 32-bit number that appears as a series of four separate numbers separated by periods.

10) The ________ allows a natural language expression, such as Google.com, to represent a numeric IP address.

A) uniform resource locator system

B) Internet protocol addressing schema

C) domain name system

D) assigned numbers and names system

C) domain name system

11) The address used by a browser to identify the location of content on the Web is called:

A) a domain name.

B) a uniform resource locator.

C) an IP address.

D) a file path.

B) a uniform resource locator

12) Which of the following is not an advantage of client/server computing over centralized mainframe computing?

A) It is easy to expand capacity by adding servers and clients.

B) Each client added to the network increases the network's overall capacity and transmission speeds.

C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.

D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.

B) Each client added to the network increases the network's overall capacity and transmission speeds.

13) ________ is a model of computing in that computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the Internet.

A) Client/server computing

B) P2P computing

C) Mobile computing

D) Cloud computing

D) cloud computing

14) Which of the following protocols is used to send mail to a server?

A) IMAP

B) FTP

C) HTTP

D) SSL

A) IMAP

15) Where does TLS operate within TCP/IP?

A) between the Internet Layer and the Transport Layer

B) between the Transport Layer and the Application Layer

C) between the Network Interface Layer and the Transport Layer

D) between the Internet Layer and the Application Layer

B) between the Transport Layer and the Application Layer

16) Which of the following statements about cloud computing is not true?

A) A public cloud is typically used by companies with stringent privacy and security requirements.

B) Dropbox is an example of a public cloud.

C) Hybrid clouds offer both public and private cloud options.

D) A private cloud hosted internally or externally.

A) A public cloud is typically used by companies with stringent privacy and security requirements.

17) ________ is used to allow remote login on another computer.

A) Telnet

B) FTP

C) HTTP

D) SSL

A) Telnet

18) ________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

A) Ping

B) Telnet

C) Tracert

D) Finger

A) Ping

19) Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

A) fiber optics

B) Wi-Fi

C) IPv6

D) client/server computing

D) client/server computing

20) Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

A) routers

B) web servers

C) IP servers

D) packet servers

A) routers

21) Which of the following is a set of rules for transferring data?

A) protocol

B) packet

C) router

D) IP address

A) protocol

22) Which of the following is not a basic type of cloud computing service?

A) IaaS

B) PaaS

C) SaaS

D) FiOS

D)FiOS

23) Which of the following are central directories that list all domain names currently in use for specific domains?

A) web servers

B) root servers

C) client servers

D) DNS servers

B) root servers

24) Which of the following was the original purpose of the Internet?

A) to provide a network that would allow businesses to connect with consumers

B) to link large mainframe computers on different college campuses

C) to develop military communications systems that could withstand nuclear war

D) to enable government agencies to track civilian communications

B) to link large mainframe computers on different college campuses

25) Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?

A) Telnet

B) Ping

C) IMAP

D) Tracert

D) Tracert

26) Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

A) HTTP

B) BGP

C) FTP

D) SMTP

B) BGP

37) Which of the following organizations coordinate the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems?

A) IETF

B) IAB

C) W3C

D) ICANN

D) ICANN

38) TCP/IP operates in which layer of Internet architecture?

A) Network Technology Substrate layer

B) Middleware Services layer

C) Transport Services and Representation Standards layer

D) Applications layer

C) Transport Services and Representation Standards layer

39) The Web runs in which layer of Internet architecture?

A) Network Technology Substrate layer

B) Middleware Services layer

C) Transport Services and Representation Standards layer

D) Applications layer

D) Applications layer

40) The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the:

A) Network Technology Substrate layer.

B) Middleware Services layer.

C) Transport Services and Representation Standards layer.

D) Applications layer.

B) Middleware Services layer.

41) The backbone of the Internet is formed by:

A) Internet Exchange Points (IXPs).

B) Tier 1 ISPs.

C) Network Access Points (NAPs).

D) Metropolitan Area Exchanges (MAEs).

B) Tier 1 ISPs

42) When talking about the physical elements of the Internet, the term redundancy refers to:

A) transmitting multiple copies of a single packet to safeguard against data loss.

B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.

C) delays in messages caused by the uneven flow of information through the network.

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

43) The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A) Internet Engineering Steering Group (IESG)

B) World Wide Web Consortium (W3C)

C) Internet Engineering Task Force (IETF)

D) Internet Society (ISOC)

D) Internet Society

44) The ________ helps define the overall structure of the Internet.

A) IAB

B) IESG

C) W3C

D) ITU

A) IAB

45) Which of the following is not true about the mobile platform?

A) Most smartphones use Intel chips.

B) The number of cell phones worldwide exceeds the number of PCs.

C) Over a third of the world's cell phones are smartphones.

D) Smartphones use flash memory chips.

A) Most smartphones use Intel chips

46) Which of the following organizations involved with Internet governance has the United States recently given up control over?

A) ICANN

B) IGF

C) NTIA

D) IANA

D)IANA

47) Internet traffic is predicted to ________ by 2019.

A) decrease

B) double

C) triple

D) quadruple

C)triple

54) Which of the following is not a concern about IoT?

A) the high cost of sensors

B) interoperability

C) security

D) privacy

A) the high cost of sensors

55) How long does it take for 300,000 X-rays to be transmitted on a 100-gbps network?

A) 10 seconds

B) 1 minute

C) 10 minutes

D) 1 hour

B) 1 minute

56) What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?

A) Bluetooth

B) drones

C) WLANs

D) DSL

B) drones

57) Which of the following is not a limitation of the current Internet?

A) the continued reliance on cables and wires for connectivity

B) limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic

C) architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance

D) the difficulty in expanding capacity by adding servers and clients

D) the difficulty in expanding capacity by adding servers and clients

58) Which of the following statements about fiber-optic cable is not true?

A) It transmits more data at faster speeds than coaxial or twisted pair cable.

B) It is thinner and lighter than coaxial or twisted pair cable.

C) As of 2016, a majority of U.S. homes have fiber connections.

D) Telecommunications firms have made substantial investments in cross-country fiber optic systems in the last decade.

C) As of 2016, a majority of U.S. homes have fiber connections

59) The major technologies used with wireless local area networks are:

A) Wi-Fi and Bluetooth.

B) Wi-Fi and WiMax.

C) Bluetooth and 3G.

D) WiMax and 3G.

A) Wi-Fi and Bluetooth.

60) Which IEEE 802.11 standard provides for throughput of up to 7 Gbps?

A) 802.11a

B) 802.11b

C) 802.11ac

D) 802.11ad

D) 802.11ad

61) All of the following are involved in the effort to create standards for IoT except:

A) AllSeen Alliance.

B) Industrial Internet Consortium.

C) Open Connectivity Foundation.

D) W3C.

D) W3C

62) Which of the following refers to delays in messages caused by the uneven flow of information packets through the network?

A) redundancy

B) latency

C) Net neutrality

D) QOS

B) latency

63) What country intends to be the first to use Project Loon to provide universal Internet access?

A) New Zealand

B) Sri Lanka

C) Ghana

D) Australia

B) Sri Lanka

69) The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A) Netscape Navigator.

B) Mosaic.

C) Mozilla.

D) Internet Explorer.

B) Mosaic

70) In the address http://www.company.com/clients.html, which of the following is the top-level domain?

A) .com

B) company.com

C) www

D) http

A) .com

71) You could expect to find the following services in a web server software package except:

A) security services.

B) FTP.

C) search engine.

D) an RSS aggregator.

D) an RSS aggregator

72) Which of the following is currently the most popular web browser?

A) Internet Explorer

B) Safari

C) Chrome

D) Firefox

C) Chrome

73) The concept behind document formatting has its roots in which of the following?

A) XML

B) SGML

C) HTML

D) GML

D) GML

74) All of the following are characteristics of HTML5 except:

A) a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer.

B) use of CSS3.

C) ability to access built-in functionality of mobile devices, such as GPS and swiping.

D) support for digital rights management.

D) support for digital rights management.

77) Cortana is a type of:

A) intelligent personal assistant.

B) widget.

C) gadget.

D) social network.

A) intelligent personal assistant

78) Which of the following enables Internet users to communicate with each other, although not in real time?

A) mobile messaging

B) online forum

C) SMS messaging

D) VoIP

B) online forum

79) Which of the following is not a mobile messaging application?

A) Kik

B) WhatsApp

C) Viber

D) Feedly

D) Feedly

80) A(n) ________ allows users to easily add and edit content on a web page.

A) wiki

B) podcast

C) blog

D) RSS feed

A) wiki

81) The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A) VoIP.

B) IPTP.

C) VTP.

D) IP.

A) VoIP

82) Snapchat's Lenses feature is an example of which of the following?

A) virtual reality

B) artificial intelligence

C) augmented reality

D) chatbot

C) augmented reality

85) All of the following statements about mobile apps are true except:

A) the average U.S. consumer now spends more time using mobile apps than watching television.

B) iOS apps are cross-platform, open-source applications.

C) over 130 billion apps have been downloaded from the Apple App Store.

D) almost all the top 100 brands have a presence in at least one of the major app stores.

B) iOS apps are cross-platform, open-source applications.

All of the following are involved in the effort to create standards for IoT except:

A: AllSeen Alliance.

B: Open Connectivity Foundation.

C: Industrial Internet Consortium.

D: W3C.

W3C

Which of the following IEEE standards provide for high-speed short-range Wi-Fi?

802.11ad

802.11af

802.11ah

802.11ay

802.11ad

Which of the following is not a basic type of cloud computing service?

PaaS

SaaS

IaaS

FiOS

FiOS

Tier 1 ISPs provide Internet access to consumers and businesses.

True

False

False

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

World Wide Web Consortium (W3C)

Internet Engineering Steering Group (IESG)

Internet Society (ISOC)

Internet Engineering Task Force (IETF)

Internet Society (ISOC)

Cortana is a type of:

gadget.

widget.

intelligent digital assistant.

social network.

intelligent digital assistant.

WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.

True

False

False

The Web runs in which layer of Internet architecture?

Network Technology Substrate layer

Middleware Services layer

Transport Services and Representation Standards layer

Applications layer

Applications layer

TCP/IP operates in which layer of Internet architecture?

Network Technology Substrate layer

Middleware Services layer

Transport Services and Representation Standards layer

Applications layer

Transport Services and Representation Standards layer

The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

Internet Explorer.

Mosaic.

Netscape Navigator.

Mozilla.

Mosaic

Which of the following is the core communications protocol for the Internet?

Telnet

TCP/IP

TLS

FTP

TCP/IP

HTML defines the structure of a web page.

True

False

True

Bluetooth is a high-speed, fixed broadband wireless local area network for commercial and residential use.

True

False

False

Which of the following is a set of rules for transferring data?

protocol

IP address

router

packet

protocol

The Transport Layer of TCP/IP is responsible for which of the following?

providing communication with the application by acknowledging and sequencing the packets to and from the application

addressing, packaging, and routing messages

providing a variety of applications with the ability to access the services of the lower layers

placing packets on and receiving them from the network medium

providing communication with the application by acknowledging and sequencing the packets to and from the application

Which of the following statements about cloud computing is not true?

A public cloud is typically used by companies with stringent privacy and security requirements.

Dropbox is an example of a public cloud.

Hybrid clouds offer both public and private cloud options.

A private cloud may be hosted internally or externally.

A public cloud is typically used by companies with stringent privacy and security requirements

________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

Tracert

Finger

Ping

Telnet

Ping

FTP is the protocol that permits users to transfer files from a server to their client computer, and vice versa.

True

False

True

Where does TLS operate within TCP/IP?

between the Internet Layer and the Transport Layer

between the Internet Layer and the Application Layer

between the Transport Layer and the Application Layer

between the Network Interface Layer and the Transport Layer

between the transport layer and the application layer

T1 and T3 refer to international telephone standards for digital communication.

True

False

True

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

packet switching.

the Transmission Control Protocol.

routing.

the File Transfer Protocol.

packet switching

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

Wi-Fi

IPv6

fiber optics

client/server computing

client/server computing

The backbone of the Internet is formed by:

Internet Exchange Points (IXPs).

Network Access Points (NAPs).

Metropolitan Area Exchanges (MAEs).

Tier 1 ISPs.

Tier 1 ISPs

The layer of Internet architecture that ties the applications to the communications network and includes security and authentication services is called the:

Network Technology Substrate layer.

Middleware Services layer.

Transport Services and Representation Standards layer.

Applications layer.

Middleware Services layer

The Internet Layer of TCP/IP is responsible for which of the following?

placing packets on and receiving them from the network medium

providing a variety of applications with the ability to access the services of the lower layers

providing communication with the application by acknowledging and sequencing the packets to and from the application

addressing, packaging, and routing messages

addressing, packaging, and routing messages

Which of the following statements about cloud computing is not true?

A public cloud is typically used by companies with stringent privacy and security requirements.

A private cloud may be hosted internally or externally.

Dropbox is an example of a public cloud.

Hybrid clouds offer both public and private cloud options.

a public cloud is typically used by companies with stringent privacy and security requirements

Which of the following is a programming language introduced by Apple specifically for developing iOS applications?

Swift

C

Objective-C

C++

Swift

________ is used to allow remote login on another computer.

Telnet

HTTP

FTP

SSL

Telnet

Which of the following was the most popular web browser as of August 2018?

Firefox

Chrome

Internet Explorer

Safari

Chrome

All of the following statements about HTML5 are true except:

HTML5 is an important tool for both response web design and adaptive web delivery.

HTML5 apps work just like web pages.

HTML5 stores page content into mobile device hardware rather loading into the browser from a web server.

HTML5 has become the de facto web page development standard.

HTML5 stores page content into mobile device hardware rather loading into the browser from a web server.

The Internet of Things (IoT) is based on sensors that can collect data and connect to the Internet.

True

False

True

Which of the following is not an advantage of client/server computing over centralized mainframe computing?

-There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.

-Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.

-It is easy to expand capacity by adding servers and clients.

-Each client added to the network increases the network's overall capacity and transmission speeds.

Each client added to the network increases the network's overall capacity and transmission speeds.

HTTP/2 is supported by almost all the leading web browsers.

True

False

True

Which of the following are central directories that list all domain names currently in use for specific domains?

client servers

Web servers

root servers

DNS servers

root servers

which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

IP servers

packet servers

routers

Web servers

routers

Google Cardboard is an example of which of the following?

virtual reality

artificial intelligence

chatbot

augmented reality

virtual reality

During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

consolidation phase

innovation phase

commercialization phase

institutional phase

institutional phase

Which of the following statements about fiber-optic cable is not true?

It transmits more data at faster speeds than coaxial or twisted pair cable.

Most U.S. homes have fiber connections.

Long-haul fiber optic networks are typically owned by firms referred to as Tier I ISPs.

It is thinner and lighter than coaxial or twisted pair cable.

Most U.S. homes have fiber connections

All of the following are involved in the effort to create standards for IoT except:

Industrial Internet Consortium.

AllSeen Alliance.

Open Connectivity Foundation.

W3C.

W3C

16) During which period of time did the Institutionalization phase of Internet development take place?

A) 1950-1960

B) 1961-1974

C) 1975-1995

D) 1995-through the present

Answer: C

17) Which of the following occurred during the Commercialization phase of Internet development?

A) The fundamental building blocks of the Internet were realized in actual hardware and software.

B) Large mainframes on different college campuses were linked.

C) The Domain Name System was introduced.

D) NSF privatized the operation of the Internet's backbone.

Answer: D

18) During which phase of the development of the Internet was ARPANET invented?

A) Commercialization phase

B) Institutional phase

C) Innovation phase

D) Consolidation phase

Answer: B

19) Which of the following is not one of the basic technological foundations of the Internet?

A) client/server computing

B) Tracert

C) TCP/IP communications protocol

D) packet-switching hardware

Answer: B

20) The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

A) routing.

B) the Transmission Control Protocol.

C) packet switching.

D) the File Transfer Protocol.

Answer: C

21) Which of the following is the core communications protocol for the Internet?

A) Telnet

B) FTP

C) TCP/IP

D) SSL

Answer: C

22) The Transport Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium

B) addressing, packaging, and routing messages

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D) providing a variety of applications with the ability to access the services of the lower layers

Answer: C

23) The Internet Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium

B) addressing, packaging, and routing messages

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D) providing a variety of applications with the ability to access the services of the lower layers

Answer: B

24) Which of the following allows users to communicate visually and aurally in real-time, and uses high-resolution monitors to simulate the presence of participants?

A) telepresence

B) videoconferencing

C) VOIP

D) IP telephony

Answer: A

25) An IPv4 address is expressed as a:

A) 32-bit number that appears as a series of four separate numbers separated by semicolons.

B) 64-bit number that appears as a series of four separate numbers separated by semicolons.

C) 64-bit number that appears as a series of four separate numbers separated by periods.

D) 32-bit number that appears as a series of four separate numbers separated by periods.

Answer: D

26) The natural language convention used to represent IP addresses is called the:

A) uniform resource locator system.

B) Internet protocol addressing schema.

C) domain name system.

D) assigned numbers and names (ANN) system.

Answer: C

27) The addresses used by browsers to identify the location of content on the Web are called:

A) domain names.

B) uniform resource locators.

C) IP addresses.

D) file paths.

Answer: B

28) Which of the following organizations coordinates the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems?

A) IETF

B) IAB

C) W3C

D) ICANN

Answer: C

29) Which of the following is not an advantage of client/server computing over centralized mainframe computing?

A) It is easy to expand capacity by adding servers and clients.

B) Each client added to the network increases the network's overall capacity and transmission speeds.

C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.

D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.

Answer: B

30) ________ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers.

A) Client/server computing

B) P2P computing

C) Mobile computing

D) Cloud computing

Answer: D

31) Which of the following protocols is used to send mail to a server?

A) SMTP

B) FTP

C) HTTP

D) SSL

Answer: A

32) Where does TSL operate within TCP/IP?

A) between the Internet Layer and the Transport Layer

B) between the Transport Layer and the Application Layer

C) between the Network Interface Layer and the Transport Layer

D) between the Internet Layer and the Application Layer

Answer: B

33) A(n) ________ is an audio presentation stored as an audio file and posted to the Web for users to download.

A) podcast

B) RSS subscription

C) weblog

D) widget

Answer: A

34) ________ is one of the original Internet services and is used to transfer files from a server computer to a client computer and vice versa.

A) SMTP

B) FTP

C) HTTP

D) SSL

Answer: B

35) ________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

A) Ping

B) Telnet

C) Tracert

D) Finger

Answer: A

36) ________ is a unique virtual laboratory for exploring future internets at scale, to promote innovations in network science and technologies.

A) Internet of Things

B) Internet2

C) ARPANET

D) GENI

Answer: D

37) TCP/IP operates in which layer of Internet architecture?

A) Network Technology Substrate layer

B) Middleware Services layer

C) Transport Services and Representation Standards layer

D) Applications layer

Answer: C

38) An Internet-enabled media player would run in which layer of Internet architecture?

A) Network Technology Substrate layer

B) Middleware Services layer

C) Transport Services and Representation Standards layer

D) Applications layer

Answer: D

39) The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the:

A) Network Technology Substrate layer.

B) Middleware Services layer.

C) Transport Services and Representation Standards layer.

D) Applications layer.

Answer: B

40) The backbone of the Internet is formed by:

A) Internet Exchange Points (IXPs).

B) Network Service Providers (NSPs).

C) Internet Service Providers (ISPs).

D) Metropolitan Area Exchanges (MAEs).

Answer: B

41) When talking about the physical elements of the Internet, the term redundancy refers to:

A) transmitting multiple copies of a single packet to safeguard against data loss.

B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.

C) delays in messages caused by the uneven flow of information through the network.

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

Answer: D

42) Which source of e-commerce revenues has grown from nearly zero prior to 2007 to over $38 billion in 2013?

A) search engine advertising

B) mobile retail purchases

C) streaming video subscriptions

D) social network advertising

Answer: B

43) Local area networks that operate within a single organization that leases access to the Web directly from regional and national carriers are called:

A) wide area networks.

B) extranets.

C) campus area networks.

D) private exchanges.

Answer: C

44) The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A) Internet Engineering Steering Group (IESG)

B) World Wide Web Consortium (W3C)

C) Internet Engineering Task Force (IETF)

D) Internet Society (ISOC)

Answer: D

45) The ________ helps define the overall structure of the Internet.

A) IAB

B) IESG

C) W3C

D) ITU

Answer: A

46) Which of the following is not a limitation of the current Internet?

A) the continued reliance on cables and wires for connectivity

B) limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic

C) architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance

D) the difficulty in expanding capacity by adding servers and clients

Answer: D

47) Which of the following is not true about the mobile platform?

A) Most smartphones use Microsoft's operating system, Windows Mobile.

B) The number of cell phones worldwide exceeds the number of PCs.

C) About a third of the world's cell phones are smartphones.

D) Unlike PCs, smartphones do not need fans.

Answer: A

48) Which of the following statements about fiber-optic cable is not true?

A) It consists of twelve or sixteen strands of glass.

B) It is thinner and lighter than coaxial or twisted pair cable.

C) It enables better data security than coaxial cable.

D) Telecommunications firms have made substantial investments in cross-country fiber optic systems in the last decade.

Answer: A

49) The model of computing in which firms and individuals obtain computing power and software over the Internet is called ________ computing.

A) mobile

B) mainframe

C) client/server

D) cloud

Answer: D

50) Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

A) fiber optics

B) Wi-Fi

C) IPv6

D) client/server networking

Answer: D

51) The major technologies used with wireless local area networks are:

A) Wi-Fi and Bluetooth.

B) Wi-Fi and WiMax.

C) Bluetooth and 3G.

D) WiMax and 3G.

Answer: A

52) Akamai offers all of the following services except:

A) instant messaging.

B) targeted advertising.

C) security services.

D) global traffic management.

Answer: A

53) Which of the following is a high-speed, medium-range, broadband wireless metropolitan area network?

A) Wi-Fi

B) WiMAX

C) Bluetooth

D) ZigBee

Answer: B

54) Siri is a type of:

A) intelligent personal assistant.

B) widget.

C) gadget.

D) social network.

Answer: A

55) The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A) Netscape Navigator.

B) Mosaic.

C) Mozilla.

D) Internet Explorer.

Answer: B

56) In the address http://www.company.com/clients.html, which of the following is the top-level domain?

A) .com

B) company.com

C) www

D) http

Answer: A

57) You could expect to find all of the following services in a Web server software package except:

A) security services.

B) FTP.

C) data capture.

D) an RSS aggregator.

Answer: D

58) Which of the following is currently the most popular Web browser?

A) Internet Explorer

B) Netscape

C) Chrome

D) Firefox

Answer: A

59) The concept behind document formatting had its roots in which of the following?

A) XML

B) SGML

C) HTML

D) GML

Answer: D

60) Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time?

A) online chat

B) online forum

C) IM

D) VoIP

Answer: B

61) Which of the following is a Web 2.0 service or application?

A) wikis

B) e-mail

C) IM

D) online forums

Answer: A

62) A(n) ________ is a Web application that allows users to easily add and edit content on a Web page.

A) wiki

B) podcast

C) blog

D) RSS feed

Answer: A

63) The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A) VoIP.

B) IPTP.

C) VTP.

D) IP.

Answer: A

64) All of the following are characteristics of HTML5 except:

A) a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer.

B) use of CSS3.

C) ability to access built-in functionality of mobile devices, such as GPS and swiping.

D) support for digital rights management.

Answer: D

65) All of the following are true about iPhone apps except:

A) They are distributed through Apple's App Store.

B) They are cross-platform, open-source applications.

C) They were estimated to generate over $1 billion in 2013.

D) Apple's goal of offering apps is to increase retail sales of iPhones, iPads, and iPods.

Answer: B

Which of the following is a characteristic of the Consolidation phase of e-commerce?

A. predominance of pure online strategies

B. emphasis on revenue growth versus profits

C. brand extension and strengthening becomes more important than creating new brands

D. shift to a technology-driven approach

C. brand extension and strengthening becomes more important than creating new brands

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. T/F

True

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

around 5%

around 10%

around 15%

less than 1%

________ is the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Integrity

Privacy

Availability

Confidentiality

A digital certificate contains all of the following except the:

subject's private key.

subject's public key.

digital signature of the certification authority.

digital certificate serial number.

subject's private key.

Phishing attacks rely on browser parasites. T/F

False

Which of the following statements about Bitcoin is not true?

The computational power required to mine Bitcoins has increased over time.

Bitcoins are completely secure.

Bitcoins are illegal in some countries.

In 2018, Bitcoin represented just under 40% of the full market for cryptocurrencies.

Bitcoins are completely secure.

Which of the following statements is not true?

A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.

The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

The Federal Trade Commission has asserted that it has authority over corporations' data security practices.

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

Which of the following is not a key factor for establishing e-commerce security?

data integrity

technology

organizational policies

laws and industry standards

data integrity

Malware that comes with a downloaded file that a user requests is called a:

Trojan horse.

backdoor.

drive-by download.

PUP.

drive-by download.

All of the following statements about PKI are true except:

the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.

PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.

PKI guarantees that the verifying computer of the merchant is secure.

the acronym PKI stands for public key infrastructure.

PKI guarantees that the verifying computer of the merchant is secure.

What is the first step in developing an e-commerce security plan?

Create a security organization.

Develop a security policy.

Perform a risk assessment.

Perform a security audit.

Perform a risk assessment.

Which of the following is an example of an integrity violation of e-commerce security?

A website is not actually operated by the entity the customer believes it to be.

A merchant uses customer information in a manner not intended by the customer.

A customer denies that he is the person who placed the order.

An unauthorized person intercepts an online communication and changes its contents.

An unauthorized person intercepts an online communication and changes its contents.

Which of the following statements about data breaches in 2017 is not true?

A. According to the Identity Theft Resource Center, the number of breaches in 2017 increased by almost 45% from 2016.

B. According to the Identity Theft Resource Center, over 50% of data breaches involved social security numbers.

C. According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

D. According to the Identity Theft Resource Center, data breaches involving the business sector represented over 55% of all breaches.

C. According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

Which of the following is not an example of a potentially unwanted program (PUP)?

adware

browser parasite

drive-by download

spyware

drive-by download

PayPal is an example of what type of payment system?

online stored value payment system

digital checking system

accumulating balance system

digital credit card system

online stored value payment system

A Trojan horse appears to be benign, but then does something other than expected. T/F

True

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

DES

NFC

IM

text messaging

NFC

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Authenticity

Availability

Integrity

Nonrepudiation

Which of the following is not an example of malicious code?

a. scareware

b. Trojan horse

c. bot

d. sniffer

D. sniffer

FREAK is an example of a software vulnerability. T/F

True

All of the following are methods of securing channels of communication except:

A.SSL/TLS.

B. digital certificates.

C. VPN.

D. FTP.

D. FTP.

Which dimension(s) of security is spoofing a threat to?

A. integrity

B. availability

C. integrity and authenticity

D. availability and integrity

C. integrity and authenticity

Which of the following statements is not true?

A. A VPN provides both confidentiality and integrity.

B. A VPN uses both authentication and encryption.

C. A VPN uses a dedicated secure line.

D. The primary use of VPNs is to establish secure communications among business partners.

C. A VPN uses a dedicated secure line.

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. T/F

True

All of the following were visions of e-commerce expressed during the early years of e-commerce except:

A. a nearly perfect information marketspace.

B. friction-free commerce.

C. disintermediation.

D. fast follower advantage.

D. fast follower advantage.

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

A. routers

B. Web servers

C. IP servers

D. packet servers

A. routers

Where does TLS operate within TCP/IP?

A. between the Internet Layer and the Transport Layer

B. between the Transport Layer and the Application Layer

C. between the Network Interface Layer and the Transport Layer

D. between the Internet Layer and the Application Layer

B. between the Transport Layer and the Application Layer

You could expect to find all of the following services in a web server software package except:

A. security services.

B. FTP.

C. search engine.

D. an RSS aggregator.

D. an RSS aggregator.

WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access. T/F

False

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

A. HTTP

B. BGP

C. FTP

D. SMTP

B. BGP

The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs). T/F

True

An IPv4 address is expressed as a:

A. 32-bit number that appears as a series of four separate numbers separated by semicolons.

B. 64-bit number that appears as a series of four separate numbers separated by semicolons.

C. 64-bit number that appears as a series of four separate numbers separated by periods.

D. 32-bit number that appears as a series of four separate numbers separated by periods.

D. 32-bit number that appears as a series of four separate numbers separated by periods.

Which of the following is not an advantage of client/server computing over centralized mainframe computing?

A. It is easy to expand capacity by adding servers and clients.

B. Each client added to the network increases the network's overall capacity and transmission speeds.

C. Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.

D. There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.

B. Each client added to the network increases the network's overall capacity and transmission speeds.

Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies?

A. satellites

B. drones

C. unused, low-powered television channels

D. high altitude balloons

C. unused, low-powered television channels

Which of the following organizations monitor Internet policies and practices?

A. IETF

B. ISOC

C. W3C

D. ICANN

B. ISOC

Applications for Android operating system-based smartphones are typically written in which of the following?

A. Swift

B. Java

C. ActiveX

D. ColdFusion

B. Java

The Web runs in which layer of Internet architecture?

A. Network Technology Substrate layer

B. Middleware Services layer

C. Transport Services and Representation Standards layer

D. Applications layer

D. Applications layer

Which of the following was the original purpose of the Internet?

A. to provide a network that would allow businesses to connect with consumers

B. to link large mainframe computers on different college campuses

C. to develop a military communications system that could withstand nuclear war

D. to enable government agencies to track civilian communications

B. to link large mainframe computers on different college campuses

Which of the following is a programming language introduced by Apple specifically for developing iOS applications?

A. Objective-C

B. C

C. C++

D. Swift

D. Swift

Amazon Web Services is an example of a private cloud. T/F

False

All of the following either currently, or have plans to, offer Internet access via satellite except:

A. Facebook

B. Dish

C. Microsoft

D. Boeing

C. Microsoft

Which of the following protocols is used to send mail to a server?

A. SMTP

B. FTP

C.HTTP

D. SSL

A. SMTP

A private cloud is operated for the benefit of multiple firms. T/F

False

The backbone of the Internet is formed by:

A. Internet Exchange Points (IXPs).

B. Tier 1 ISPs.

C. Network Access Points (NAPs).

D. Metropolitan Area Exchanges (MAEs).

B. Tier 1 ISPs.

T1 and T3 refer to international telephone standards for digital communication. T/F

True

Which of the following monitors and controls access to a main web server, and implements firewall protection?

A. proxy server

B. list server

C. groupware server

D. mail server

A. proxy server

Which of the following is not part of the LAMP open source web development model?

A. Linux

B. Apache

C. Microsoft IIS

D. PHP

C. Microsoft IIS

Which of the following details the actual hardware components to be used in a system?

A. architecture plan

B. system functionalities plan

C. logical design

D. physical design

D. physical design

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device?

A. LAMP

B. AWD

C. mobile first design

D. RoR

B. AWD

Which of the following basic system functionalities is used to display goods on a website?

A. product database

B. digital catalog

C. shopping cart system

D. customer database system

B. digital catalog

All of the following are key design principles of responsive web design except:

A. flexible grid-based layouts.

B. media queries.

C. coding by convention.

D. flexible images and media.

C. coding by convention.

Which of the following helps you engage your customers in a conversation?

A. shopping cart

B. product database

C. on-site blog

D. site tracking and reporting system

C. on-site blog

Ruby on Rails is based on which of the following philosophies?

A. SLDC

B. CoC

C. LAMP

D. Ajax

B. CoC

________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.

A. Application servers

B. Web page servers

C. Database servers

D. Content management servers

A. Application servers

Which of the following details the actual hardware components to be used in a system?

A. architecture plan

B. system functionalities plan

C. logical design

D. physical design

D. physical design

A multi-tier architecture typically includes only a web server and a database server. T/F

False

Dynamic page generation enables price discrimination. T/F

True

Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site?

A. physical design

B. logical design

C. testing plan

D. co-location plan

B. logical design

Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site?

A. physical design

B. logical design

C. testing plan

D. co-location plan

B. logical design

The web server software used has a significant impact on how a website's web pages look on a user's computer. T/F

False

DHMTL is used to generate dynamic web pages. T/F

False

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

A. single-tier architecture

B. two-tier architecture

C. three-tier architecture

D. multi-tier architecture

B. two-tier architecture

Which of the following verifies that the business objectives of the system are in fact working?

A. system testing

B. acceptance testing

C. unit testing

D. implementation testing

B. acceptance testing

A security hole known as Shellshock enabled hackers to target JavaScript running on Apache web servers. T/F

False

Django is based on which of the following?

A. PHP

B. Python

C. Perl

D. Ruby on Rails

B. Python

The term stateless refers to the fact that:

A. no one government entity controls the Internet.

B. the server does not have to maintain an ongoing dedicated interaction with the client computer.

C. system performance degrades as more simultaneous users require service.

D. web servers may maintain multiple instances of server software to handle requests.

B. the server does not have to maintain an ongoing dedicated interaction with the client computer.

Django follows the ________ programming principle.

A. CoC

B. WYSIWYG

C. DRY

D. LAMP

C. DRY

All of the following are simple steps for optimizing web page content except:

A. reducing unnecessary HTML comments.

B. segmenting computer servers to perform dedicated functions.

C. using more efficient graphics.

D. avoiding unnecessary links to other pages on the site.

B. segmenting computer servers to perform dedicated functions.

All of the following are website design features that annoy customers except:

A. slow-loading pages.

B. pop-under ads.

C. splash pages.

D. multi-browser functionality.

D. multi-browser functionality.

Most of the time required to maintain an e-commerce site is spent on:

A. debugging code.

B. responding to emergency situations.

C. general administration and making changes and enhancements to the system.

D. changes in reports, data files, and links to backend databases.

C. general administration and making changes and enhancements to the system.

Which of the following was the most popular web browser as of August 2018?

A. Internet Explorer

B. Safari

C. Chrome

D. Firefox

C. Chrome

IMAP is the Internet protocol used by a browser to transfer web pages. T/F

False

WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access. T/F

False

The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs). T/F

True

The Internet is a worldwide system of computer networks. T/F

True

________ was the first truly large-scale digitally enabled transaction system in the B2C arena.

A. Telex

B. The Baxter Healthcare system

C. The French Minitel

D. Electronic Data Interchange (EDI)

C. The French Minitel

In 2018, the overall retail market in the United States was estimated to be about:

A. $53 trillion.

B. $5.3 trillion.

C. $530 billion.

D. $53 billion.

B. $5.3 trillion.

Which of the following is not a primary activity in a firm value chain?

A. outbound logistics

B. finance/accounting

C. operations

D. after-sales service

B. finance/accounting

A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n):

A. incubator.

B. angel investor.

C. venture capital investor.

D. crowdfunder.

B. angel investor.

Which of the following may offer its customers value chain management software?

A. e-distributors

B. e-procurement companies

C. exchanges

D. community providers

B. e-procurement companies

Which of the following is not considered a portal?

A. Yahoo

B. MSN

C. Amazon

D. AOL

C. Amazon

Which of the following gives a business model the most credibility with outside investors?

A. the firm's management team

B. the firm's value proposition

C. the firm's market opportunity

D. the firm's market strategy

A. the firm's management team

First movers often fail because:

A. their competitive advantage is unfair.

B. they lack complementary resources needed to sustain their advantages.

C. they are operating in a perfect market.

D. they fail to leverage their competitive assets.

B. they lack complementary resources needed to sustain their advantages.

In general, the key to becoming a successful content provider is to:

A. own the content being provided.

B. own the technology by which content is created, presented, and distributed.

C. provide online content for free.

D. provide other services as well as online content.

A. own the content being provided.

All of the following use an advertising revenue model except:

A. Facebook.

B. Yahoo.

C. Google.

D. Walmart.

D. Walmart.

Which of the following is an example of the affiliate revenue model?

A. Scribd

B. eBay

C. L.L. Bean

D. MyPoints

D. MyPoints

Which type of investor typically becomes interested in a startup company after it has begun generating revenue?

A. incubators

B. angel investors

C. crowdfunders

D. venture capital investors

D. venture capital investors

Slow followers are sometimes more successful than first movers. T/F

True

A ________ specifically details how you plan to find customers and to sell your product.

A. sales analysis

B. business plan

C. competitive strategy

D. market strategy

D. market strategy

In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products and establish prices.

A. market creator

B. community provider

C. e-tailer

D. portal

A. market creator

Which of the following is not a variation of the e-tailer business model?

A. bricks-and-clicks

B. virtual merchant

C. market creator

D. manufacturer-direct

C. market creator

Which of the following is an example of a company using the content provider model?

A. Priceline

B. Netflix

C. Dell

D. eBay

B. Netflix

The Jumpstart Our Business Startups (JOBS) Act, and issuance of enabling regulations by the Securities and Exchange Commission, allows a start-up company to use crowdfunding to solicit investors to invest in small and early-stage startups. T/F

True

Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers. T/F

False

SaaS and PaaS providers can typically provide services at lower costs through scale economies. T/F

True

E-commerce has increased price competition in many markets. T/F

True

Information asymmetries enable some firms to have an edge over others. T/F

True

Which of the following uses a subscription revenue model for books?

A. Spotify

B. Amazon Kindle Unlimited

C. Rhapsody

D. Pandora

B. Amazon Kindle Unlimited

On-demand service companies are characterized by the free sharing of resources between the company and consumers. T/F

False

Over the past decade, the number of exchanges has:

A. greatly increased.

B. diminished sharply.

C. stayed about the same.

D. increased slowly but steadily.

B. diminished sharply.

All of the following can be considered a direct competitor of Priceline except:

A. Travelocity.

B. Expedia.

C. Orbitz.

D. ESPN.

D. ESPN.

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

A. Walmart

B. Target

C. Bluefly

D. Staples

C. Bluefly

The Seam is an example of a(n):

A. private industrial network.

B. exchange.

C. industry consortium.

D. e-distributor.

C. industry consortium.

Which of the following is a leading platform for social e-commerce?

A. Amazon

B. eBay

C. Wikipedia

D. Facebook

D. Facebook

Which of the following is an example of an e-commerce first mover that failed?

A. Etsy

B. eToys

C. eBay

D. E*Trade

B. eToys

Price transparency refers to the ease with which consumers can find out what merchants pay for products. T/F

False

Which of the following statements about the Web is not true?

A. The Web is the technology upon which the Internet is based.

B. The Web was the original "killer app."

C. The Web provides access to pages written in Hypertext Markup Language.

D. The Web is both a communications infrastructure and an information storage system.

A. The Web is the technology upon which the Internet is based.

Which of the following best describes the early years of e-commerce?

A. They were a technological success but a mixed business success.

B. They were a technological success but a business failure.

C. They were a technological failure but a business success.

D. They were a mixed technological and business success.

A. They were a technological success but a mixed business success.

Which of the following is a characteristic of e-commerce during the Invention period?

A. mobile technology

B. earnings and profit emphasis

C. disintermediation

D. extensive government surveillance

C. disintermediation

Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior. T/F

True

Ubiquity increases the cognitive energy required to transact in a marketspace. T/F

False

Which of the following refers to the practice of researching a product online before purchasing it at a physical store?

A. zooming

B. grazing

C. showrooming

D. webrooming

D. webrooming

Retail e-commerce in the United States is not expected to continue growing at double-digit growth rates in 2018-2019. T/F

False

Which of the following describes the basic web policy of large firms during the Invention period?

A. Integrate social networks and the mobile platform with website marketing.

B. Emphasize the necessity for the Web to generate profits.

C. Use the Web to sell complex goods and services online.

D. Maintain a basic, static website depicting the firm's brand.

D. Maintain a basic, static website depicting the firm's brand.

Which of the following statements is not true?

A. Information asymmetries are continually being introduced by merchants and marketers.

B. Intermediaries have not disappeared.

C. Overall transaction costs have dropped dramatically.

D. Brands remain very important in e-commerce.

C. Overall transaction costs have dropped dramatically.

Price dispersion has been eliminated in e-commerce T/F

False

All of the following are platforms for C2C e-commerce except:

A. Walmart.

B. Facebook Marketplace.

C. Craigslist.

D. Etsy.

A. Walmart.

The Internet is a worldwide system of computer networks. T/F

True

It is estimated that by 2022, the size of the B2B market will reach:

A. $730 million.

B. $7.3 billion.

C. $730 billion.

D. $7.3 trillion.

D. $7.3 trillion.

The fact that e-commerce is conducted based on universal standards decreases search costs for consumers. T/F

True

All of the following are examples of Web 2.0 sites and applications except:

A. photo-sharing sites.

B. blogs.

C. wikis.

D. auction sites.

D. auction sites.

Price transparency refers to the ease with which consumers can find out what merchants pay for products. T/F

False

In 2018, there were more than ________ Internet hosts.

A. 1 million

B. 10 million

C. 100 million

D. 1 billion

D. 1 billion

It is estimated that by 2022, the size of the B2B market will reach:

A. $730 million.

B. $7.3 billion.

C. $730 billion.

D. $7.3 trillion.

D. $7.3 trillion.

________ and ________ are typically the most easily identifiable aspects of a company's business model.

Value proposition; revenue model

Which of the following is not an example of the bricks-and-clicks e-tailing business model?

Select one:

a. Target

b. Bluefly

c. Walmart

d. Staples

b. Bluefly

All of the following are business models employed in the online music industry except:

Select one:

a. download-and-own.

b. peer-to-peer streaming.

c. cloud streaming.

d. subscription.

b. peer-to-peer streaming.

All of the following may lead to a competitive advantage except:

Select one:

a. fewer products.

b. better employees.

c. superior products.

d. less expensive suppliers.

a. fewer products.

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

Select one:

a. angel investors.

b. venture capitalists.

c. crowdfunders.

d. disruptors.

d. disruptors.

Ariba is an example of a________.

Select one:

a. portal

b. e-distributor

c. e-procurement firm

d. Industry consortium

c. e-procurement firm

Organizations that typically provide an array of services to startup companies along with a small amount of funding are referred to as:

Select one:

a. venture capital investors.

b. incubators.

c. crowdfunders.

d. angel investors.

b. incubators.

The existence of many competitors in any one market segment may indicate:

Select one:

a. no one firm has differentiated itself within that market.

b. an untapped market niche.

c. the market is saturated.

d. a market that has already been tried without success

c. the market is saturated.

What is the primary revenue model for an e-distributor?

Select one:

a. sales

b. subscription

c. advertising

d. transaction fee

a. sales

Which element of the business model refers to the presence of substitute products in the market?

Select one:

a. value proposition

b. competitive environment

c. competitive advantage

d. market opportunity

b. competitive environment

Which of the following does not use a subscription revenue model?

Select one:

a. Twitter

b. Apple Music

c. Ancestry

d. eHarmony

a. Twitter

Which of the following factors is not a significant influence on a company's competitive environment?

Select one:

a. the availability of supportive organizational structures

b. how many competitors are active

c. what the market share of each competitor is

d. how competitors price their products

a. the availability of supportive organizational structures

Which of the following is not a key element of an elevator pitch?

Select one:

a. market opportunity

b. growth metrics

c. exit strategy

d. legal structure

d. legal structure

Which of the following is not a variation of the e-tailer business model?

Select one:

a. market creator

b. bricks-and-clicks

c. virtual merchant

d. manufacturer-direct

a. market creator

Which of the following is not considered a portal?

Select one:

a. MSN

b. Yahoo

c. Amazon

d. AOL

c. Amazon

E-commerce has increased price competition in many markets.

Select one:

True

False

True

Real markets are imperfect.

Select one:

True

False

True

SaaS and PaaS providers can typically provide services at lower costs through scale economies.

Select one:

True

False

True

Slow followers are sometimes more successful than first movers.

Select one:

True

False

True

The Internet's universal standards have changed industry structure by increasing barriers to entry and decreasing competition within an industry.

Select one:

True

False

False

________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.

Select one:

a. Client/server computing

b. P2P computing

c. Mobile computing

d. Cloud computing

d. Cloud computing

All of the following either currently, or have plans to, offer Internet access via satellite except:

Select one:

a. Facebook

b. Boeing

c. Dish

d. Microsoft

d. Microsoft

During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

Select one:

a. innovation phase

b. institutional phase

c. commercialization phase

d. consolidation phase

b. institutional phase

The layer of Internet architecture that ties the applications to the communications network and includes security and authentication services is called the:

Select one:

a. Transport Services and Representation Standards layer.

b. Applications layer.

c. Network Technology Substrate layer.

d. Middleware Services layer.

d. Middleware Services layer.

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

Select one:

a. uniform resource locator system

b. domain name system

c. assigned numbers and names (ANN) system

d. Internet protocol addressing schema

b. domain name system

The major technologies used with wireless local area networks are:

Select one:

a. WiMax and 3G.

b. Bluetooth and 3G.

c. Wi-Fi and WiMax.

d. Wi-Fi and Bluetooth.

d. Wi-Fi and Bluetooth.

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

Select one:

a. routing.

b. the Transmission Control Protocol.

c. packet switching.

d. the File Transfer Protocol.

c. packet switching.

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

Select one:

a. IP.

b. VTP.

c. VoIP.

d. IPTP.

c. VoIP.

The Transport Layer of TCP/IP is responsible for which of the following?

Select one:

a. providing a variety of applications with the ability to access the services of the lower layers

b. providing communication with the application by acknowledging and sequencing the packets to and from the application

c. addressing, packaging, and routing messages

d. placing packets on and receiving them from the network medium

b. providing communication with the application by acknowledging and sequencing the packets to and from the application

The Web runs in which layer of Internet architecture?

Select one:

a. Applications layer

b. Network Technology Substrate layer

c. Transport Services and Representation Standards layer

d. Middleware Services layer

a. Applications layer

Which of the following are central directories that list all domain names currently in use for specific domains?

Select one:

a. client servers

b. root servers

c. Web servers

d. DNS servers

b. root servers

Which of the following is a programming language introduced by Apple specifically for developing iOS applications?

Select one:

a. C

b. C++

c. Objective-C

d. Swift

d. Swift

Which of the following is not true about the mobile platform?

Select one:

a. Most smartphones use Intel chips.

b. Smartphones use flash memory chips.

c. Most smartphones use either Google's Android or Apple's iOS operating systems.

d. Smartphones and tablet computers are the primary means to access the Internet, both in the United States and worldwide.

a. Most smartphones use Intel chips.

Which of the following statements about cloud computing is not true?

Select one:

a. A public cloud is typically used by companies with stringent privacy and security requirements.

b. A private cloud may be hosted internally or externally.

c. Dropbox is an example of a public cloud.

d. Hybrid clouds offer both public and private cloud options.

a. A public cloud is typically used by companies with stringent privacy and security requirements.

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

Select one:

a. IPv6

b. fiber optics

c. client/server computing

d. Wi-Fi

c. client/server computing

Which of the following is the most popular web browser?

Select one:

a. Internet Explorer

b. Chrome

c. Safari

d. Firefox

b. Chrome

A private cloud is operated for the benefit of multiple firms.

Select one:

True

False

False

HTTP/2 is supported by almost all the leading web browsers.

Select one:

True

False

True

The Internet of Things (IoT) is based on sensors that can collect data and connect to the Internet.

Select one:

True

False

True

The term latency refers to a delay that can be experienced in packet-switched networks.

Select one:

True

False

True

All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except:

Select one:

A. social networks.

B. targeted banner ads.

C. online catalogs.

D. search engines.

B. targeted banner ads.

Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

Select one:

A. clickstream data

B. Nielsen ratings

C. integration of online data with offline data

D. data collected from social networks

B. Nielsen ratings

Amazon's Associates program is an example of which of the following?

Select one:

A. lead generation marketing

B. viral marketing

C. local marketing

D. affiliate marketing

D. affiliate marketing

All of the following are "traditional" online marketing tools except:

Select one:

A. affiliate marketing.

B. e-mail and permission marketing.

C. social marketing.

D. sponsorship marketing.

C. social marketing.

The Nike iD program is an example of which of the following marketing techniques?

Select one:

A. price discrimination

B. permission marketing

C. customer co-production

D. transactive content

C. customer co-production

Group M, the world's largest advertising buyer, requires which of the following in order for an ad to be considered viewable?

Select one:

A. 50% of the pixels must be in view for at least one second.

B. 50% of the pixels must be in view for at least two seconds.

C. 100% of the pixels must be in view for at least two seconds

D. 100% of the pixels must be in view for at least one second

D. 100% of the pixels must be in view for at least one second

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?

Select one:

A. information density

B. universal standards

C. ubiquity

D. richness

B. universal standards

________ is an open source database that can store and analyze both structured and unstructured data.

Select one:

A. JSP

B. ASP

C. PHP

D. Hadoop

D. Hadoop

VTR measures the ________ response rate to an ad.

Select one:

A. 7-day

B. 30-minute

C. 24-hour

D. 30-day

D. 30-day

What kinds of ads have the lowest CTR?

Select one:

A. e-mails to an in-house list

B. video ads

C. social network display ads

D. banner display ads

D. banner display ads

78) View-to-cart ratio is a measure of the: 回答錯誤

A

.

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

B

.

B) percentage of views that lead to an add-to-cart action.

C

.

C) percentage of existing customers who continue to buy on a regular basis.

D

.

D) percentage of shoppers who do not return within a year after their initial purchase.

正確答案: B

42. 女鞋業者Grace Gift利用素人以及知名部落客合作,推出其專屬商品,成功擄獲消費者的心而使商品大賣,請問Grace Gift是考慮到網路商業模式的哪種特性?[單選] 回答錯誤

A

.

服務面

B

.

核心面

C

.

策略面

D

.

業務面

正確答案: A

27.將傳統拍賣方式轉換到網際網路上來進行,此模式稱為?[單選] 回答錯誤

A

.

Internet

B

.

Intranet

C

.

Extranet

D

.

Outranet

正確答案: D

Research shows the two key factors shaping the decision to purchase online are utility and trust.

Select one:

True

False

True

Online traffic is driven by offline brands and shopping.

Select one:

True

False

True

The highest amount of online advertising spending is for online video ads.

Select one:

True

False

False

Consumers tend to look at native ads more frequently than they look at display ads.

Select one:

True

False

True

The concept of "customer satisfaction" is broader than the concept of "customer experience."

Select one:

True

False

False

Transaction logs are built into client software.

Select one:

True

False

False

Approximately ________ of U.S. Internet users research online but do not buy.

Select one:

A. 19%

B. 7.7%

C. 15%

D. 12.7%

D. 12.7%

The richness made possible by e-commerce technologies does which of the following?

Select one:

A. It reduces the cost of delivering marketing messages and receiving feedback from users.

B. It enables worldwide customer service and marketing communications.

C. It allows consumers to become co-producers of the goods and services being sold.

D. It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

D. It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

The overall rate of online credit card fraud is ________ of all online card transactions.

Select one:

A. around 10%

B. around 5%

C. less than 1%

D. around 15%

C. less than 1%

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

Select one:

A. HTML5

B. Adobe Acrobat

C. HTML

D. Adobe Flash

D. Adobe Flash

Which dimension(s) of security is spoofing a threat to?

Select one:

A. availability and integrity

B. availability

C. integrity and authenticity

D. integrity

C. integrity and authenticity

Beebone is an example of which of the following?

Select one:

A. phishing

B. worm

C. hacktivism

D. botnet

D. botnet

According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes?

Select one:

A. malicious code

B. malicious insiders

C. denial of service

D. botnets

D. botnets

All the following statements about symmetric key cryptography are true except:

Select one:

A. symmetric key cryptography is computationally slower.

B. symmetric key cryptography is a key element in digital envelopes.

C. in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.

D. the Data Encryption Standard is a symmetric key encryption system.

A. symmetric key cryptography is computationally slower.

The Data Encryption Standard uses a ________-bit key.

Select one:

A. 8

B. 56

C. 512

D. 256

b. 56

All of the following statements about public key cryptography are true except:

Select one:

A. public key cryptography uses two mathematically related digital keys.

B. public key cryptography ensures authentication of the sender.

C. public key cryptography is based on the idea of irreversible mathematical functions.

D. public key cryptography does not ensure message integrity.

B. public key cryptography ensures authentication of the sender.

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

Which of the following statements is not true?

Select one:

A. Biometric devices reduce the opportunity for spoofing.

B. A retina scan is an example of a biometric device.

C. Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

D. Biometric data stored on an iPhone is encrypted.

C. Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

An intrusion detection system can perform all of the following functions except:

Select one:

A. examining network traffic.

B. setting off an alarm when suspicious activity is detected.

C. checking network traffic to see if it matches certain patterns or preconfigured rules.

D. blocking suspicious activity.

D. blocking suspicious activity.

All of the following statements about Apple Pay are true except which of the following?

Select one:

A. Apple Pay is an example of a universal proximity mobile wallet.

B. Apple Pay is the most popular alternative payment method in the United States.

C. Apple Pay has more users than either Google Pay or Samsung Pay.

D. Apple Pay can be used for mobile payments at the point of sale at a physical store

B. Apple Pay is the most popular alternative payment method in the United States.

PCI-DSS is a standard established by which of the following?

Select one:

A. the banking industry

B. the retail industry

C. the federal government

D. the credit card industry

D. the credit card industry

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

Select one:

A. IM

B. text messaging

C. NFC

D. DES

C. NFC

Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________.

Select one:

A. about 25%; about 10%

B. about 95%; about 5%

C. less than 10%; less than 25%

D. more than 55%; less than 20%

D. more than 55%; less than 20%

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

Select one:

True

False

True

Phishing attacks rely on browser parasites.

Select one:

True

False

false

Exploit kits can be purchased by users to protect their computers from malware.

Select one:

True

False

false

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

Select one:

True

False

true

________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.

Select one:

a. Web page servers

b. Content management servers

c. Database servers

d. Application servers

d. Application servers

A template test is a form of which type of testing?

Select one:

a. acceptance testing

b. unit testing

c. A/B testing

d. system testing

c. A/B testing

All of the following are website design features that annoy customers except:

Select one:

a. slow-loading pages.

b. multi-browser functionality.

c. splash pages.

d. pop-under ads.

b. multi-browser functionality.

Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?

Select one:

a. RWD

b. mobile first design

c. AWD

d. RESS

b. mobile first design

Django is based on which of the following?

Select one:

a. Ruby on Rails

b. Perl

c. Python

d. PHP

c. Python

The concept of a "sprint" is related to which of the following development methodologies?

Select one:

a. Scrum

b. component-based development

c. DevOps Apache

d. prototyping

a. Scrum

The leading web server software is:

Select one:

a. Apache.

b. Google Enterprise Server.

c. Sun Solaris.

d. Microsoft Internet Information Server.

a. Apache.

The primary way a website is able to personalize the content presented to a visitor is through the use of:

Select one:

a. accessibility rules.

b. cookies.

c. site management tools.

d. privacy policies.

b. cookies.

What are the two most important management challenges in building a successful e-commerce presence?

Select one:

a. developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

b. having an accurate understanding of your business environment and an achievable business plan

c. identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

d. building a team with the right skill sets and closely managing the development process

a. developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which of the following basic system functionalities is used to display goods on a website?

Select one:

a. digital catalog

b. customer database system

c. product database

d. shopping cart system

a. digital catalog

Which of the following helps you engage your customers in a conversation?

Select one:

a. shopping cart

b. on-site blog

c. product database

d. site tracking and reporting system

b. on-site blog

Which of the following is a simple but powerful method for strategizing about a business?

Select one:

a. benchmarking

b. SWOT analysis

c. DevOps

d. SLDC

b. SWOT analysis

Which of the following monitors and controls access to a main web server, and implements firewall protection?

Select one:

a. groupware server

b. mail server

c. proxy server

d. list server

c. proxy server

Which of the following verifies that the business objectives of the system are in fact working?

Select one:

a. unit testing

b. implementation testing

c. acceptance testing

d. system testing

c. acceptance testing

Which of the following would you use to verify that links on web pages are valid?

Select one:

a. data capture tools

b. HTTP

c. site management tools

d. FTP

c. site management tools

In general, the annual system maintenance cost will roughly parallel the development cost.

Select one:

True

False

true

Native web apps need to be developed for different mobile platforms.

Select one:

True

False

true

The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.

Select one:

True

False

true

The web server software used has a significant impact on how a website's web pages look on a user's computer.

Select one:

True

False

false

All of the following are simple steps for optimizing web page content except:

Select one:

a. reducing unnecessary HTML comments.

b. using more efficient graphics.

c. segmenting computer servers to perform dedicated functions.

d. avoiding unnecessary links to other pages on the site.

c. segmenting computer servers to perform dedicated functions.

Which of the following is not part of the LAMP open source web development model?

Select one:

a. Microsoft IIS

b. Apache

c. PHP

d. Linux

a. Microsoft IIS

Which of the following typically includes a data flow diagram (DF~to describe the flow of information for an e-commerce site?

Select one:

a. logical design

b. testing plan

c. co-location plan

d. physical design

a. logical design

1.22) Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

B.B) two-tier architecture

2.「所有和Internet有關的行為都必須經過防火牆,所以防火牆可以記錄所    Internet的活動事件。」此為防火牆的哪個功用?[單選]

B.B. 監視活動

3.67) All of the following are important factors in search engine optimization except:

D) adhering to privacy policies.

4.電子商務網站最大的安全威脅來源是?[單選]

B. 內部鬆散的安全程序

5.9) ________ are the types of information systems capabilities needed to meet business objectives.

B) System functionalities

6.65) Which of the following is the most commonly used server-side scripting language?

C) PHP

7.21) All of the following are simple steps for optimizing web page content except:

B) segmenting computer servers to perform dedicated functions.

8.56) Which of the following types of sites typically require a high percentage of secure pages?

C) trading

9.下列何者不屬於電子現金的特性?[單選]

B. 不可轉換性

10.17) Which of the following details the actual hardware components to be used in a system?

D) physical design

11.下列何者不屬於電子現金的特性?[單選]

B. 不可轉換性

12.16) Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?

B) logical design

13.8) In order from beginning to end, the major steps in the SDLC are:

A) systems analysis/planning; systems design; building the system; testing; and implementation.

14.28) When using multivariate testing, if you wish to test three elements, such as an image, a button, and a piece of text, each with two different versions, how many combinations will you need to test?

D) 8

15.77) All of the following are key design principles of responsive web design except:

C) coding by convention.

16.7) What are the two most important management challenges in building a successful e-commerce presence?

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

17.3. 只要透過個人電腦,結合「晶片金融卡」及「晶片卡讀卡機」連結至銀行網站,即可隨時隨地在網際網路上享有銀行所提供之 ATM 金融服務,這是指?(單選)

(B) Web-ATM

18.48) ________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.

A) Application servers

19.11) Which system functionality must your website have to be able to personalize or customize a product for a client?

D) customer on-site tracking

20.38) The leading web server software is:

A) Apache.

21.63) Django is based on which of the following?

B) Python

22.關於電子支付機制,下列何者有誤?[單選] 回答錯誤

D.電子錢包一般適合處理大額付款

23.SET 機制中,除認證授權者、商家(特約商店)、持卡者外,還有那個重    要個體?[單選]

D. 付款閘道

24.23) The concept of a “sprint” is related to which of the following development methodologies?

B) Scrum

25.68) ________ scripts have become obsolete, due to security and other concerns and have been replaced by more modern and secure methods.

A) CGI

26.下列何者不是電子現金的特性?[單選]

B. 不可轉換性

27.1) Which of the following is a simple but powerful method for describing a firm’s strengths and weaknesses?

C) SWOT analysis

28.40) Which of the following would you use to verify that links on web pages are valid?

D) site management tools

29.關於SET 的敘述,下列何者有誤?[單選]

D. 確認在SET 通訊協定中商店可看到客戶端之個人資訊,以確保交易進行

30.1. 電子憑證是?(單選)

(A) 網路購物的身分證明

31.78) Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device?

B) AWD

32.防火牆的設定步驟為?[單選]

A. 開啟防火牆勾選設定值新增例外連結

33.33) In general, the annual system maintenance cost will roughly parallel the development cost.

是非題 (2 ) 2

A.A

34.73) The current versions of most web browsers no longer support Java applets.

是非題 (2 ) 2

A.A

36.35) Microservices are a very granular implementation of SOA.

是非題 (2 ) 2

A.A

37.61) Storing HTML pages in RAM rather than on a server's hard drive is an expensive way to fine-tune the processing architecture of a website.

是非題 (2 ) 2

B.B

38.59) All of the following are methods of improving the processing architecture of a website except:

是非題 (2 ) 2

D) adding web servers.

39.53) Objects can be retrieved from a database using Java Server Pages.

是非題 (2 ) 2

A.A

40.84) Native web apps need to be developed for different mobile platforms.

是非題 (2 ) 2

A.A

41.52) Dynamic page generation enables price discrimination.

是非題 (2 ) 2

A.A

42.30) The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.

是非題 (2 ) 2

A.A

43.50) The web server software used has a significant impact on how a website's web pages look on a user's computer.

是非題 (2 ) 2

B.B

44.57) Which of the following is not a main factor in determining the overall demand on an e-commerce site?

是非題 (2 ) 2

A) file sizes of web pages being served

45.32) Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.

是非題 (2 ) 2

A.A

46.58) All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except:

是非題 (2 ) 2

C) replacing static pages with dynamically generated pages.

47.31) Scrum is a type of agile development.

是非題 (2 ) 2

A.A

48.60) Upgrading a server from a single processor to multiple processors is an example of scaling a site vertically.

是非題 (2 ) 2

A.A

49.34) A multi-tier architecture includes a web and database server.

是非題 (2 ) 2

B

50.51) DHMTL is used to generate dynamic web pages.

是非題 (2 ) 2

B

--

1.下列何者不是電子現金的特性?[單選]

A

.

A. 可分性

B

.

B. 不可轉換性

C

.

C. 離線付款

D

.

D. 匿名性

正確答案: B

2.38) The leading web server software is:

A

.

A) Apache.

B

.

B) Microsoft Internet Information Server.

C

.

C) Sun Solaris.

D

.

D) Google Enterprise Server.

正確答案: A

3.49) Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

A

.

A) CGI

B

.

B) ODBC

C

.

C) MySQL

D

.

D) HTTP

正確答案: B

4.69) ________ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser.

A

.

A) Python

B

.

B) ASP

C

.

C) ColdFusion

D

.

D) JavaScript

正確答案: D

5.45) Which of the following technologies is used to separate the design and presentation of content from the content creation process?

A

.

A) SOA

B

.

B) proxy server

C

.

C) shopping cart

D

.

D) CMS

正確答案: D

6.3. 只要透過個人電腦,結合「晶片金融卡」及「晶片卡讀卡機」連結至銀行網站,即可隨時隨地在網際網路上享有銀行所提供之 ATM 金融服務,這是指?(單選)

A

.

(A) iCash

B

.

(B) Web-ATM

C

.

(C) Mondex

D

.

(D) MasterCard

正確答案: B

7.根據調查,大部分的網路安全性威脅來自於?[單選]

A

.

A. 外部駭客

B

.

B. 內部人士的有心挪用

C

.

C. 網路顧客

D

.

D. 線上供應商

正確答案: B

8.80) Building which of the following is the least expensive path to creating a mobile presence?

A

.

A) native app

B

.

B) mobile website

C

.

C) mobile web app

D

.

D) hybrid HTTP

正確答案: B

9.46) MySQL is which of the following?

A) open source database software

10.1) Which of the following is a simple but powerful method for describing a firm’s strengths and weaknesses?

A

.

A) benchmarking

B

.

B) SLDC

C

.

C) SWOT analysis

D

.

D) DevOps

正確答案: C

11.81) Which of the following statements about mobile websites is not true?

A

.

A) Mobile websites run on a firm's servers, just like a traditional website.

B

.

B) Mobile websites can be built using standard web tools such as server-side HTML, Linux, PHP and SQL.

C

.

C) Generally, mobile websites operate more quickly than traditional websites viewed on a desktop computer connected to a broadband office network.

D

.

D) Most large firms today have mobile websites.

正確答案: C

12.23) The concept of a “sprint” is related to which of the following development methodologies?

A

.

A) prototyping

B

.

B) Scrum

C

.

C) component-based development

D

.

D) DevOps

正確答案: B

13.66) All of the following are website design features that annoy customers except:

A

.

A) slow-loading pages.

B

.

B) pop-under ads.

C

.

C) splash pages.

D

.

D) multi-browser functionality.

正確答案: D

14.43) Which of the following cannot be used to retrieve objects from a database?

A

.

A) Node.js

B

.

B) ASP.NET

C

.

C) JSP

D

.

D) HTML

正確答案: D

15.1. 電子憑證是?(單選)

A

.

(A) 網路購物的身分證明

B

.

(B) 軟體的序號

C

.

(C) 應用軟體的開發商

D

.

(D) 作業系統中使用者的帳號和密碼

正確答案: A

16.79) Which of the following statements about responsive web design (RWD) is not true?

A

.

A) RWD works best for sites that have complex functionality.

B

.

B) RWD tools include HTML5 and CSS3.

C

.

C) RWD makes it possible to design a website that automatically adjusts its layout and display according to the screen resolution of the device on which it is being viewed.

D

.

D) RWD can be costly.

正確答案: A

17.SET 機制中,除認證授權者、商家(特約商店)、持卡者外,還有那個重    要個體?[單選]

A

.

A. 發卡者

B

.

B. 取得者

C

.

C. 信用卡品牌

D

.

D. 付款閘道

正確答案: D

18.電子現金的哪一個特性,可經由不同的存、提款設備,將電子現金儲存在    不同的設備中?[單選]

A

.

A. 匿名性

B

.

B. 可分性

C

.

C. 離線付款

D

.

D. 可轉換性

正確答案: D

19.39) All of the following are basic functionality provided by web servers except:

D) a shopping cart.

20.防火牆的設定步驟為?[單選]

A. 開啟防火牆勾選設定值新增例外連結

21.11) Which system functionality must your website have to be able to personalize or customize a product for a client?

A

.

A) an ad server

B

.

B) a site tracking and reporting system

C

.

C) an inventory management system

D

.

D) customer on-site tracking

正確答案: D

22.24) Which of the following involves creating a skeleton version that focuses on functionality rather than design?

A

.

A) web services

B

.

B) wireframing

C

.

C) Scrum

D

.

D) DevOps

正確答案: B

23.41) All of the following are examples of an open source content management system (CMS) except: 回答錯誤

C) Dreamweaver CC.

24.電子商務網站最大的安全威脅來源是?[單選]

A

.

A. 詐欺

B

.

B. 內部鬆散的安全程序

C

.

C. 監聽程式的竊聽

D

.

D. 駭客入侵

正確答案: B

25.25) Which of the following is the preferred method of implementing a service-oriented architecture? 

A

.

A) prototyping

B

.

B) Scrum

C

.

C) web services

D

.

D) DevOps

正確答案: C

26.7) What are the two most important management challenges in building a successful e-commerce presence?

A

.

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

B

.

B) having an accurate understanding of your business environment and an achievable business plan

C

.

C) building a team with the right skill sets and closely managing the development process

D

.

D) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

正確答案: A

27.72) Django follows the ________ programming principle.

A

.

A) CoC

B

.

B) WYSIWYG

C

.

C) DRY

D

.

D) LAMP

正確答案: C

28.下列何者不屬於電子現金的特性?[單選]

A

.

A. 不易被複製或篡改

B

.

B. 不可轉換性

C

.

C. 具匿名性

D

.

D. 不可回溯性

正確答案: B

29.47) All of the following are basic functionality provided by e-commerce merchant server software except: 回答錯誤

B) marketing analytics.

30.9) ________ are the types of information systems capabilities needed to meet business objectives.

A

.

A) Information requirements

B

.

B) System functionalities

C

.

C) System design specifications

D

.

D) Physical design specifications

正確答案: B

31.19) Which of the following involves testing a site's program modules one at a time?

A

.

A) system testing

B

.

B) acceptance testing

C

.

C) unit testing

D

.

D) implementation testing

正確答案: C

32.下列何者不屬於網路信用卡交易的參與者?[單選]

A

.

A. 持卡者

B

.

B. 商家

C

.

C. 發卡銀行

D

.

D. 政府

正確答案: D

33.53) Objects can be retrieved from a database using Java Server Pages.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

34.34) A multi-tier architecture includes a web and database server.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

35.57) Which of the following is not a main factor in determining the overall demand on an e-commerce site?

是非題 (2 ) 2

A

.

A) file sizes of web pages being served

B

.

B) number of simultaneous users in peak periods

C

.

C) speed of legacy applications that are needed to supply data to web pages

D

.

D) whether content is dynamic or static

正確答案: A

36.35) Microservices are a very granular implementation of SOA.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

37.31) Scrum is a type of agile development.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

38.52) Dynamic page generation enables price discrimination.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

39.33) In general, the annual system maintenance cost will roughly parallel the development cost.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

40.83) An HTML5 app is one designed to specifically operate using a mobile device's hardware and operating system.

是非題 (2 ) 2

A

.

A

B

.

B

C

.

 

正確答案: B

41.30) The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

42.60) Upgrading a server from a single processor to multiple processors is an example of scaling a site vertically.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

43.59) All of the following are methods of improving the processing architecture of a website except:

是非題 (2 ) 2

A

.

A) separating static content from dynamic content.

B

.

B) optimizing ASP code.

C

.

C) optimizing the database schema.

D

.

D) adding web servers.

正確答案: D

44.50) The web server software used has a significant impact on how a website's web pages look on a user's computer.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

45.58) All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except:

是非題 (2 ) 2

A

.

A) scaling hardware vertically.

B

.

B) scaling hardware horizontally.

C

.

C) replacing static pages with dynamically generated pages.

D

.

D) improving processing architecture.

正確答案: C

46.73) The current versions of most web browsers no longer support Java applets.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

47.51) DHMTL is used to generate dynamic web pages.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

48.84) Native web apps need to be developed for different mobile platforms.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

49.61) Storing HTML pages in RAM rather than on a server's hard drive is an expensive way to fine-tune the processing architecture of a website.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

50.32) Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

49) Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

A

.

A) CGI

B

.

B) ODBC

C

.

C) MySQL

D

.

D) HTTP

正確答案: B

2.2) The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

A

.

A) increased dramatically

B

.

B) increased moderately

C

.

C) decreased dramatically

D

.

D) decreased slightly

正確答案: C

3.下列何者不屬於網路信用卡交易的參與者?[單選]

A

.

A. 持卡者

B

.

B. 商家

C

.

C. 發卡銀行

D

.

D. 政府

正確答案: D

4.63) Django is based on which of the following?

A

.

A) PHP

B

.

B) Python

C

.

C) Perl

D

.

D) Ruby on Rails

正確答案: B

5.在網路保全的方式中,目前最常用的方式是?[單選]

A

.

A.  DNA 驗證

B

.

B. 生物特徵辨識

C

.

C. 主機保全

D

.

D. 密碼設定

正確答案: D

6.65) Which of the following is the most commonly used server-side scripting language?

A

.

A) Ruby on Rails

B

.

B) Django

C

.

C) PHP

D

.

D) Perl

正確答案: C

7.在網路保全的方式中,目前最常用的方式是?[單選]

A

.

A.  DNA 驗證

B

.

B. 生物特徵辨識

C

.

C. 主機保全

D

.

D. 密碼設定

正確答案: D

8.77) All of the following are key design principles of responsive web design except:

A

.

A) flexible grid-based layouts.

B

.

B) media queries.

C

.

C) coding by convention.

D

.

D) flexible images and media.

正確答案: C

9.「所有和Internet有關的行為都必須經過防火牆,所以防火牆可以記錄所    Internet的活動事件。」此為防火牆的哪個功用?[單選]

A

.

A. 隔離問題

B

.

B. 監視活動

C

.

C. 網路把關

D

.

D. 集中管理

正確答案: B

10.46) MySQL is which of the following?

A

.

A) open source database software

B

.

B) scripting language embedded in HTML documents

C

.

C) web server software

D

.

D) website analytics software

正確答案: A

11.29) The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

A

.

A) split testing.

B

.

B) funnel testing.

C

.

C) benchmarking.

D

.

D) system testing.

正確答案: C

12.55) The term stateless refers to the fact that:

A

.

A) no one government entity controls the Internet.

B

.

B) the server does not have to maintain an ongoing dedicated interaction with the client computer.

C

.

C) system performance degrades as more simultaneous users require service.

D

.

D) web servers may maintain multiple instances of server software to handle requests.

正確答案: B

13.10. 對電子商務安全機制的描述,下列何者不正確?(單選)

A

.

(A) 認證中心是整個電子商務的核心關鍵

B

.

(B) 金鑰有公開金鑰與私有金鑰兩種

C

.

(C) 所謂電子簽章就是把手寫筆跡數位化

D

.

(D) 加密方式目前大多採用 DES RSA 演算法

正確答案: C

14.關於電子支付機制,下列何者有誤?[單選]

A

.

數位簽章具有交易者身份的識別

B

.

防火牆是針對資料庫的保護而設計

C

.

電子簽章具有不可否認性

D

.

電子錢包一般適合處理大額付款

正確答案: D

15.41) All of the following are examples of an open source content management system (CMS) except:

A

.

A) Joomla.

B

.

B) Drupal.

C

.

C) Dreamweaver CC.

D

.

D) WordPress.

正確答案: C

16.防火牆的設定步驟為?[單選]

A

.

A. 開啟防火牆勾選設定值新增例外連結

B

.

B. 勾選設定值新增例外連結開啟防火牆

C

.

C. 勾選設定值開啟防火牆新增例外連結

D

.

D. 新增例外連結勾選設定值開啟防火牆

正確答案: A

17.根據調查,大部分的網路安全性威脅來自於?[單選]

A

.

A. 外部駭客

B

.

B. 內部人士的有心挪用

C

.

C. 網路顧客

D

.

D. 線上供應商

正確答案: B

18.下列何者不屬於網路信用卡交易的參與者?[單選]

A

.

A. 持卡者

B

.

B. 商家

C

.

C. 發卡銀行

D

.

D. 政府

正確答案: D

19.39) All of the following are basic functionality provided by web servers except:

A

.

A) site management tools.

B

.

B) data capture tools.

C

.

C) security services.

D

.

D) a shopping cart.

正確答案: D

20.下列何者不屬於電子現金的特性?[單選]

A

.

A. 不易被複製或篡改

B

.

B. 不可轉換性

C

.

C. 具匿名性

D

.

D. 不可回溯性

正確答案: B

21.15) All of the following are basic information requirements for a product database except:

A

.

A) product descriptions.

B

.

B) stock numbers.

C

.

C) customer ID numbers.

D

.

D) inventory levels.

正確答案: C

22.28) When using multivariate testing, if you wish to test three elements, such as an image, a button, and a piece of text, each with two different versions, how many combinations will you need to test?

A

.

A) 2

B

.

B) 4

C

.

C) 6

D

.

D) 8

正確答案: D

23.26) Which form of testing compares a control page with one that is very different?

A

.

A) template test

B

.

B) new concept test

C

.

C) funnel test

D

.

D) system test

正確答案: B

24.27) A template test is a form of which type of testing?

A

.

A) unit testing

B

.

B) system testing

C

.

C) acceptance testing

D

.

D) A/B testing

正確答案: D

25.關於電子支付機制,下列何者有誤?[單選]

A

.

數位簽章具有交易者身份的識別

B

.

防火牆是針對資料庫的保護而設計

C

.

電子簽章具有不可否認性

D

.

電子錢包一般適合處理大額付款

正確答案: D

26.電子商務網站最大的安全威脅來源是?[單選]

A

.

A. 詐欺

B

.

B. 內部鬆散的安全程序

C

.

C. 監聽程式的竊聽

D

.

D. 駭客入侵

正確答案: B

27.23) The concept of a “sprint” is related to which of the following development methodologies?

A

.

A) prototyping

B

.

B) Scrum

C

.

C) component-based development

D

.

D) DevOps

正確答案: B

28.「保護的對象應該是全部的Internet,而不只是在Internet和內部網路的連    接處進行安全措施」此為防火牆需注意的哪個項目?[單選]

B. 系統的補強角色

29.47) All of the following are basic functionality provided by e-commerce merchant server software except:

A

.

A) a product catalog.

B

.

B) marketing analytics.

C

.

C) a shopping cart.

D

.

D) credit card processing.

正確答案: B

30.關於SET 的敘述,下列何者有誤?[單選]

A

.

A. 可確認在Internet 線上交易,每個節點之訊息傳遞都是安全的

B

.

B. 可確保顧客資料輸入的隱密性

C

.

C. 可確認商店及持卡人雙方身份的正確性

D

.

D. 確認在SET 通訊協定中商店可看到客戶端之個人資訊,以確保交易進行

正確答案: D

31.18) Which of the following verifies that the business objectives of the system are in fact working?

A

.

A) system testing

B

.

B) acceptance testing

C

.

C) unit testing

D

.

D) implementation testing

正確答案: B

32.44) Which of the following monitors and controls access to a main web server, and implements firewall protection?

A

.

A) proxy server

B

.

B) list server

C

.

C) groupware server

D

.

D) mail server

正確答案: A

33.52) Dynamic page generation enables price discrimination.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

34.61) Storing HTML pages in RAM rather than on a server's hard drive is an expensive way to fine-tune the processing architecture of a website.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

35.51) DHMTL is used to generate dynamic web pages.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

36.32) Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

37.31) Scrum is a type of agile development.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

38.58) All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except:

是非題 (2 ) 2

A

.

A) scaling hardware vertically.

B

.

B) scaling hardware horizontally.

C

.

C) replacing static pages with dynamically generated pages.

D

.

D) improving processing architecture.

正確答案: C

39.33) In general, the annual system maintenance cost will roughly parallel the development cost.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

40.59) All of the following are methods of improving the processing architecture of a website except:

是非題 (2 ) 2

A

.

A) separating static content from dynamic content.

B

.

B) optimizing ASP code.

C

.

C) optimizing the database schema.

D

.

D) adding web servers.

正確答案: D

41.57) Which of the following is not a main factor in determining the overall demand on an e-commerce site?

是非題 (2 ) 2

A

.

A) file sizes of web pages being served

B

.

B) number of simultaneous users in peak periods

C

.

C) speed of legacy applications that are needed to supply data to web pages

D

.

D) whether content is dynamic or static

正確答案: A

42.34) A multi-tier architecture includes a web and database server.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

43.84) Native web apps need to be developed for different mobile platforms.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

44.50) The web server software used has a significant impact on how a website's web pages look on a user's computer.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

45.53) Objects can be retrieved from a database using Java Server Pages.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

46.30) The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

47.83) An HTML5 app is one designed to specifically operate using a mobile device's hardware and operating system.

是非題 (2 ) 2

A

.

A

B

.

B

C

.

 

正確答案: B

48.60) Upgrading a server from a single processor to multiple processors is an example of scaling a site vertically.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

49.73) The current versions of most web browsers no longer support Java applets.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

50.35) Microservices are a very granular implementation of SOA.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

-----------

1) Offline media is typically used for all of the following marketing activities except:

A) education.

B) exposure.

C) conversation.

D) branding

c

2) The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

A) increased dramatically

B) increased moderately

C) decreased dramatically

D) decreased slightly

c

3) Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

A) website

B) e-mail

C) social media

D) offline media

c

7) What are the two most important management challenges in building a successful e-commerce presence?

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

B) having an accurate understanding of your business environment and an achievable business plan

C) building a team with the right skill sets and closely managing the development process

D) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

a

8) In order from beginning to end, the major steps in the SDLC are:

A) systems analysis/planning; systems design; building the system; testing; and implementation.

B) systems design; testing; building the system; and implementation.

C) systems analysis/planning; systems design; building the system; implementation; and testing.

D) systems analysis/planning; implementation; building the system; and testing.

a

9) ________ are the types of information systems capabilities needed to meet business objectives.

A) Information requirements

B) System functionalities

C) System design specifications

D) Physical design specifications

b

10) Which of the following basic system functionalities is used to display goods on a website?

A) product database

B) digital catalog

C) shopping cart system

D) customer database system

b

11) Which system functionality must your website have to be able to personalize or customize a product for a client?

A) an ad server

B) a site tracking and reporting system

C) an inventory management system

D) customer on-site tracking

d

12) Which of the following are the two main components of a systems design?

A) logical design and physical design

B) behavioral design and technological design

C) business objectives and technology requirements

D) front-end systems and back-end system

a

13) Which of the following helps you engage your customers in a conversation?

A) shopping cart

B) product database

C) on-site blog

D) site tracking and reporting system

c

14) Which of the following is not one of the basic business objectives for an e-commerce site?

A) display goods

B) execute a transaction

C) provide production and supplier links

D) optimize system architecture

d

15) All of the following are basic information requirements for a product database except:

A) product descriptions.

B) stock numbers.

C) customer ID numbers.

D) inventory levels.

c

16) Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site?

A) physical design

B) logical design

C) testing plan

D) co-location plan

b

17) Which of the following details the actual hardware components to be used in a system?

A) architecture plan

B) system functionalities plan

C) logical design

D) physical design

d

18) Which of the following verifies that the business objectives of the system are in fact working?

A) system testing

B) acceptance testing

C) unit testing

D) implementation testing

b

19) Which of the following involves testing a site's program modules one at a time?

A) system testing

B) acceptance testing

C) unit testing

D) implementation testing

c

20) Most of the time required to maintain an e-commerce site is spent on:

A) debugging code.

B) responding to emergency situations.

C) general administration and making changes and enhancements to the system.

D) changes in reports, data files, and links to backend databases.

c

21) All of the following are simple steps for optimizing web page content except:

A) reducing unnecessary HTML comments.

B) segmenting computer servers to perform dedicated functions.

C) using more efficient graphics.

D) avoiding unnecessary links to other pages on the site.

b

22) Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

A) single-tier architecture

B) two-tier architecture

C) three-tier architecture

D) multi-tier architecture

b

23) Which of the following does not offer website building tools?

A) Squarespace

B) Google Sites

C) WordPress

D) Apache

d

24) All of the following are major players in hosting/co-location/cloud services except:

A) GoDaddy.

B) WordPress.

C) Verio.

D) Liquid Web.

b

25) Which form of testing compares a control page with one that is very different?

A) template test

B) new concept test

C) funnel test

D) system test

b

26) A template test is a form of which type of testing?

A) unit testing

B) system testing

C) acceptance testing

D) A/B testing

d

27) When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test?

A) 2

B) 4

C) 6

D) 8

d

28) The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

A) split testing.

B) funnel testing.

C) benchmarking.

D) system testing.

c

36) All of the following might be part of a website's middle-tier layer except:

A) a database server.

B) an ad server.

C) legacy corporate applications.

D) a mail server.

c

37) The leading web server software is:

A) Apache.

B) Microsoft Internet Information Server.

C) Sun Solaris.

D) Google Enterprise Server

a

38) All of the following are basic functionality provided by web servers except:

A) site management tools.

B) data capture tools.

C) security services.

D) a shopping cart.

d

39) Which of the following is used to process certificates and private/public key information?

A) HTTP

B) Secure Sockets Layer/Transport Layer Security

C) File Transfer Protocol

D) data capture tools

b

40) Which of the following would you use to verify that links on web pages are valid?

A) HTTP

B) FTP

C) data capture tools

D) site management tools

d

41) Which of the following is an example of a CMS?

A) Apache

B) Drupal

C) Dreamweaver CC

D) Webtrends Analytics

b

42) Advantages of dynamic page generation include all of the following except:

A) lowered menu costs.

B) market segmentation.

C) nearly cost-free price discrimination.

D) client-side execution of programming.

d

43) Which of the following cannot be used to retrieve objects from a database?

A) CGI

B) ASP

C) JSP

D) HTML

d

44) Which of the following types of application server monitors and controls access to a main web server, and implements firewall protection?

A) proxy server

B) list server

C) groupware server

D) mail server

a

45) Which of the following technologies is used to separate the design and presentation of content from the content creation process?

A) CGI

B) proxy server

C) shopping cart

D) CMS

d

---

C) SWOT analysis

Which of the following is a simple but powerful method for strategizing about a business?

A) benchmarking

B) SLDC

C) SWOT analysis

D) DevOps

C) decreased dramatically

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

A) increased dramatically

B) increased moderately

C) decreased dramatically

D) decreased slightly

C) social media

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

A) website

B) e-mail

C) social media

D) offline media

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

What are the two most important management challenges in building a successful e-commerce presence?

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

B) having an accurate understanding of your business environment and an achievable business plan

C) building a team with the right skill sets and closely managing the development process

D) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

A) systems analysis/planning; systems design; building the system; testing; and implementation.

In order from beginning to end, the major steps in the SDLC are:

A) systems analysis/planning; systems design; building the system; testing; and implementation.

B) systems design; testing; building the system; and implementation.

C) systems analysis/planning; systems design; building the system; implementation; and testing.

D) systems analysis/planning; implementation; building the system; and testing.

B) System functionalities

________ are the types of information systems capabilities needed to meet business objectives.

A) Information requirements

B) System functionalities

C) System design specifications

D) Physical design specifications

B) digital catalog

Which of the following basic system functionalities is used to display goods on a website?

A) product database

B) digital catalog

C) shopping cart system

D) customer database system

D) customer on-site tracking

Which system functionality must your website have to be able to personalize or customize a product for a client?

A) an ad server

B) a site tracking and reporting system

C) an inventory management system

D) customer on-site tracking

A) logical design and physical design

Which of the following are the two main components of a systems design?

A) logical design and physical design

B) behavioral design and technological design

C) business objectives and technology requirements

D) front-end systems and back-end systems

C) on-site blog

Which of the following helps you engage your customers in a conversation?

A) shopping cart

B) product database

C) on-site blog

D) site tracking and reporting system

D) optimize system architecture

Which of the following is not one of the basic business objectives for an e-commerce site?

A) display goods

B) execute a transaction

C) provide production and supplier links

D) optimize system architecture

C) customer ID numbers.

All of the following are basic information requirements for a product database except:

A) product descriptions.

B) stock numbers.

C) customer ID numbers.

D) inventory levels.

B) logical design

Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site?

A) physical design

B) logical design

C) testing plan

D) co-location plan

D) physical design

Which of the following details the actual hardware components to be used in a system?

A) architecture plan

B) system functionalities plan

C) logical design

D) physical design

B) acceptance testing

Which of the following verifies that the business objectives of the system are in fact working?

A) system testing

B) acceptance testing

C) unit testing

D) implementation testing

C) unit testing

Which of the following involves testing a site's program modules one at a time?

A) system testing

B) acceptance testing

C) unit testing

D) implementation testing

C) general administration and making changes and enhancements to the system.

Most of the time required to maintain an e-commerce site is spent on:

A) debugging code.

B) responding to emergency situations.

C) general administration and making changes and enhancements to the system.

D) changes in reports, data files, and links to backend databases.

B) segmenting computer servers to perform dedicated functions.

All of the following are simple steps for optimizing web page content except:

A) reducing unnecessary HTML comments.

B) segmenting computer servers to perform dedicated functions.

C) using more efficient graphics.

D) avoiding unnecessary links to other pages on the site.

B) two-tier architecture

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

A) single-tier architecture

B) two-tier architecture

C) three-tier architecture

D) multi-tier architecture

B) Scrum

The concept of a "sprint" is related to which of the following development methodologies?

A) prototyping

B) Scrum

C) component-based development

D) DevOps Apache

B) wireframing

Which of the following involves creating a skeleton version that focuses on functionality rather than design?

A) web services

B) wireframing

C) Scrum

D) DevOps

B) new concept test

Which form of testing compares a control page with one that is very different?

A) template test

B) new concept test

C) funnel test

D) system test

D) A/B testing

A template test is a form of which type of testing?

A) unit testing

B) system testing

C) acceptance testing

D) A/B testing

D) 8

When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test?

A) 2

B) 4

C) 6

D) 8

C) benchmarking.

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

A) split testing.

B) funnel testing.

C) benchmarking.

D) system testing.

C) legacy corporate applications.

All of the following might be part of a website's middle-tier layer except:

A) a database server.

B) an ad server.

C) legacy corporate applications.

D) a mail server.

A) Apache.

The leading web server software is:

A) Apache.

B) Microsoft Internet Information Server.

C) Sun Solaris.

D) Google Enterprise Server.

D) a shopping cart.

All of the following are basic functionality provided by web servers except:

A) site management tools.

B) data capture tools.

C) security services.

D) a shopping cart.

B) Secure Sockets Layer/Transport Layer Security

Which of the following is used to process certificates and private/public key information?

A) HTTP

B) Secure Sockets Layer/Transport Layer Security

C) File Transfer Protocol

D) data capture tools

D) site management tools

Which of the following would you use to verify that links on web pages are valid?

A) HTTP

B) FTP

C) data capture tools

D) site management tools

C) Dreamweaver CC

All of the following are examples of open source CMSs except:

A) Joomla

B) Drupal

C) Dreamweaver CC

D) WordPress

D) client-side execution of programming.

Advantages of dynamic page generation include all of the following except:

A) lowered menu costs.

B) market segmentation.

C) nearly cost-free price discrimination.

D) client-side execution of programming.

D) HTML

Which of the following cannot be used to retrieve objects from a database?

A) CGI

B) ASP

C) JSP

D) HTML

A) proxy server

Which of the following monitors and controls access to a main web server, and implements firewall protection?

A) proxy server

B) list server

C) groupware server

D) mail server

D) CMS

Which of the following technologies is used to separate the design and presentation of content from the content creation process?

A) CGI

B) proxy server

C) shopping cart

D) CMS

A) open source database software

MySQL is which of the following?

A) open source database software

B) scripting language embedded in HTML documents

C) web server software

D) website analytics software

B) marketing analytics.

All of the following are basic functionality provided by e-commerce merchant server software except:

A) a product catalog.

B) marketing analytics.

C) a shopping cart.

D) credit card processing.

A) Application servers

________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.

A) Application servers

B) Web page servers

C) Database servers

D) Content management servers

B) ODBC

Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

A) CGI

B) ODBC

C) MySQL

D) HTTP

B) the server does not have to maintain an ongoing dedicated interaction with the client computer.

The term stateless refers to the fact that:

A) no one government entity controls the Internet.

B) the server does not have to maintain an ongoing dedicated interaction with the client computer.

C) system performance degrades as more simultaneous users require service.

D) web servers may maintain multiple instances of server software to handle requests.

C) trading

Which of the following types of sites typically require a high percentage of secure pages?

A) web services

B) customer self-service

C) trading

D) publishing/subscription

A) file sizes of web pages being served

Which of the following is not a main factor in determining the overall demand on an e-commerce site?

A) file sizes of web pages being served

B) number of simultaneous users in peak periods

C) speed of legacy applications that are needed to supply data to web pages

D) whether content is dynamic or static

C) replacing static pages with dynamically generated pages.

All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except:

A) scaling hardware vertically.

B) scaling hardware horizontally.

C) replacing static pages with dynamically generated pages.

D) improving processing architecture.

D) adding web servers.

All of the following are methods of improving the processing architecture of a website except:

A) separating static content from dynamic content.

B) optimizing ASP code.

C) optimizing the database schema.

D) adding web servers.

B) Python

Django is based on which of the following?

A) PHP

B) Python

C) Perl

D) Ruby on Rails

B) CoC

Ruby on Rails is based on which of the following philosophies?

A) SLDC

B) CoC

C) LAMP

D) Ajax

C) PHP

Which of the following is the most commonly used server-side scripting language?

A) Ruby on Rails

B) Django

C) PHP

D) Perl

D) multi-browser functionality.

All of the following are website design features that annoy customers except:

A) slow-loading pages.

B) pop-under ads.

C) splash pages.

D) multi-browser functionality.

D) adhering to privacy policies.

All of the following are important factors in search engine optimization except:

A) selecting keywords and page titles.

B) encouraging other sites to link to your site.

C) buying search engine ads.

D) adhering to privacy policies.

A) CGI

________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server.

A) CGI

B) ColdFusion

C) JavaScript

D) VBScript

D) JavaScript

________ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser.

A) VBScript

B) ActiveX

C) ColdFusion

D) JavaScript

B) cookies.

The primary way a website is able to personalize the content presented to a visitor is through the use of:

A) privacy policies.

B) cookies.

C) accessibility rules.

D) site management tools.

C) Microsoft IIS

Which of the following is not part of the LAMP open source web development model?

A) Linux

B) Apache

C) Microsoft IIS

D) PHP

C) DRY

Django follows the ________ programming principle.

A) CoC

B) WYSIWYG

C) DRY

D) LAMP

C) coding by convention.

All of the following are key design principles of responsive web design except:

A) flexible grid-based layouts.

B) media queries.

C) coding by convention.

D) flexible images and media.

B) AWD

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device?

A) LAMP

B) AWD

C) mobile first design

D) RoR

A) RWD works best for sites that have complex functionality.

Which of the following statements about responsive web design (RWD) is not true?

A) RWD works best for sites that have complex functionality.

B) RWD tools include HTML5 and CSS3.

C) RWD makes it possible to design a website that automatically adjusts its layout and display according to the screen resolution of the device on which it is being viewed.

D) RWD can be costly.

B) mobile website

Building which of the following is the least expensive path to creating a mobile presence?

A) native app

B) mobile website

C) mobile web app

D) hybrid HTTP

C) Generally, mobile websites operate more quickly than traditional websites viewed on a desktop computer connected to a broadband office network.

Which of the following statements about mobile websites is not true?

A) Mobile websites run on a firm's servers, just like a traditional website.

B) Mobile websites can be built using standard web tools such as server-side HTML, Linux, PHP and SQL.

C) Generally, mobile websites operate more quickly than traditional websites viewed on a desktop computer connected to a broadband office network.

D) Most large firms today have mobile websites.

C) mobile first design

Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?

A) RWD

B) AWD

C) mobile first design

D) RESS

1) Which of the following is a simple but powerful method for strategizing about a business?

A) benchmarking

B) SLDC

C) SWOT analysis

D) DevOps

Answer: C

2) The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

A) increased dramatically

B) increased moderately

C) decreased dramatically

D) decreased slightly

Answer: C

3) Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

A) website

B) e-mail

C) social media

D) offline media

Answer: C

7) What are the two most important management challenges in building a successful e-commerce presence?

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

B) having an accurate understanding of your business environment and an achievable business plan

C) building a team with the right skill sets and closely managing the development process

D) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

Answer: A

8) In order from beginning to end, the major steps in the SDLC are:

A) systems analysis/planning; systems design; building the system; testing; and implementation.

B) systems design; testing; building the system; and implementation.

C) systems analysis/planning; systems design; building the system; implementation; and testing.

D) systems analysis/planning; implementation; building the system; and testing.

Answer: A

9) ________ are the types of information systems capabilities needed to meet business objectives.

A) Information requirements

B) System functionalities

C) System design specifications

D) Physical design specifications

Answer: B

10) Which of the following basic system functionalities is used to display goods on a website?

A) product database

B) digital catalog

C) shopping cart system

D) customer database system

Answer: B

11) Which system functionality must your website have to be able to personalize or customize a product for a client?

A) an ad server

B) a site tracking and reporting system

C) an inventory management system

D) customer on-site tracking

Answer: D

12) Which of the following are the two main components of a systems design?

A) logical design and physical design

B) behavioral design and technological design

C) business objectives and technology requirements

D) front-end systems and back-end systems

Answer: A

13) Which of the following helps you engage your customers in a conversation?

A) shopping cart

B) product database

C) on-site blog

D) site tracking and reporting system

Answer: C

14) Which of the following is not one of the basic business objectives for an e-commerce site?

A) display goods

B) execute a transaction

C) provide production and supplier links

D) optimize system architecture

Answer: D

15) All of the following are basic information requirements for a product database except:

A) product descriptions.

B) stock numbers.

C) customer ID numbers.

D) inventory levels

Answer: C

16) Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site?

A) physical design

B) logical design

C) testing plan

D) co-location plan

Answer: B

17) Which of the following details the actual hardware components to be used in a system?

A) architecture plan

B) system functionalities plan

C) logical design

D) physical design

Answer: D

18) Which of the following verifies that the business objectives of the system are in fact working?

A) system testing

B) acceptance testing

C) unit testing

D) implementation testing

Answer: B

19) Which of the following involves testing a site's program modules one at a time?

A) system testing

B) acceptance testing

C) unit testing

D) implementation testing

Answer: C

20) Most of the time required to maintain an e-commerce site is spent on:

A) debugging code.

B) responding to emergency situations.

C) general administration and making changes and enhancements to the system.

D) changes in reports, data files, and links to backend databases

Answer: C

21) All of the following are simple steps for optimizing web page content except:

A) reducing unnecessary HTML comments.

B) segmenting computer servers to perform dedicated functions.

C) using more efficient graphics.

D) avoiding unnecessary links to other pages on the site.

Answer: B

22) Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

A) single-tier architecture

B) two-tier architecture

C) three-tier architecture

D) multi-tier architecture

Answer: B

23) The concept of a "sprint" is related to which of the following development methodologies?

A) prototyping

B) Scrum

C) component-based development

D) DevOps Apache

Answer: B

24) Which of the following involves creating a skeleton version that focuses on functionality rather than design?

A) web services

B) wireframing

C) Scrum

D) DevOps

Answer: B

25) Which form of testing compares a control page with one that is very different?

A) template test

B) new concept test

C) funnel test

D) system test

Answer: B

26) A template test is a form of which type of testing?

A) unit testing

B) system testing

C) acceptance testing

D) A/B testing

Answer: D

27) When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test?

A) 2

B) 4

C) 6

D) 8

Answer: D

28) The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

A) split testing.

B) funnel testing..

C) benchmarking.

D) system testing.

Answer: C

29) The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.

TRUE

30) Scrum is a type of agile development.

TRUE

31) Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.

TRUE

32) In general, the annual system maintenance cost will roughly parallel the development cost.

TRUE

33) A multi-tier architecture typically includes only a web server and a database server.

FALSE

34) Web services are loosely coupled, reusable software components based on XML and other open protocols and standards that enable an application to communicate with another application without requiring any custom programming.

TRUE

36) All of the following might be part of a website's middle-tier layer except:

A) a database server.

B) an ad server.

C) legacy corporate applications.

D) a mail server.

Answer: C

37) The leading web server software is:

A) Apache.

B) Microsoft Internet Information Server.

C) Sun Solaris.

D) Google Enterprise Server.

Answer: A

38) All of the following are basic functionality provided by web servers except:

A) site management tools.

B) data capture tools.

C) security services.

D) a shopping cart.

Answer: D

39) Which of the following is used to process certificates and private/public key information?

A) HTTP

B) Secure Sockets Layer/Transport Layer Security

C) File Transfer Protocol

D) data capture tools

Answer: B

40) Which of the following would you use to verify that links on web pages are valid?

A) HTTP

B) FTP

C) data capture tools

D) site management tools

Answer: D

41) All of the following are examples of open source CMSs except:

A) Joomla

B) Drupal

C) Dreamweaver CC

D) WordPress

Answer: C

42) Advantages of dynamic page generation include all of the following except:

A) lowered menu costs.

B) market segmentation.

C) nearly cost-free price discrimination.

D) client-side execution of programming.

Answer: D

43) Which of the following cannot be used to retrieve objects from a database?

A) CGI

B) ASP

C) JSP

D) HTML

Answer: D

44) Which of the following monitors and controls access to a main web server, and implements firewall protection?

A) proxy server

B) list server

C) groupware server

D) mail server

Answer: A

45) Which of the following technologies is used to separate the design and presentation of content from the content creation process?

A) CGI

B) proxy server

C) shopping cart

D) CMS

Answer: D

46) MySQL is which of the following?

A) open source database software

B) scripting language embedded in HTML documents

C) web server software

D) website analytics software

Answer: A

47) All of the following are basic functionality provided by e-commerce merchant server software except:

A) a product catalog.

B) marketing analytics.

C) a shopping cart.

D) credit card processing.

Answer: B

48) ________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.

A) Application servers

B) Web page servers

C) Database servers

D) Content management servers

Answer: A

49) Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

A) CGI

B) ODBC

C) MySQL

D) HTTP

Answer: B

50) The web server software used has a significant impact on how a website's web pages look on a user's computer.

FALSE

51) DHMTL is used to generate dynamic web pages

FALSE

52) Dynamic page generation enables price discrimination.

TRUE

53) Objects can be retrieved from the database using Java Server Pages.

TRUE

55) The term stateless refers to the fact that:

A) no one government entity controls the Internet.

B) the server does not have to maintain an ongoing dedicated interaction with the client computer.

C) system performance degrades as more simultaneous users require service.

D) web servers may maintain multiple instances of server software to handle requests.

Answer: B

56) Which of the following types of sites typically require a high percentage of secure pages?

A) web services

B) customer self-service

C) trading

D) publishing/subscription

Answer: C

57) Which of the following is not a main factor in determining the overall demand on an e-commerce site?

A) file sizes of web pages being served

B) number of simultaneous users in peak periods

C) speed of legacy applications that are needed to supply data to web pages

D) whether content is dynamic or static

Answer: A

58) All of the following are steps one can take to right-size a website's hardware platform and meet demands for service except:

A) scaling hardware vertically.

B) scaling hardware horizontally.

C) replacing static pages with dynamically generated pages.

D) improving processing architecture.

Answer: C

59) All of the following are methods of improving the processing architecture of a website except:

A) separating static content from dynamic content.

B) optimizing ASP code.

C) optimizing the database schema.

D) adding web servers.

Answer: D

60) Upgrading a server from a single processor to multiple processors is an example of scaling a site vertically.

TRUE

61) Storing HTML pages in RAM rather than on a server's hard drive is an expensive way to fine-tune the processing architecture of a website.

FALSE

63) Django is based on which of the following?

A) PHP

B) Python

C) Perl

D) Ruby on Rails

Answer: B

64) Ruby on Rails is based on which of the following philosophies?

A) SLDC

B) CoC

C) LAMP

D) Ajax

Answer: B

65) Which of the following is the most commonly used server-side scripting language?

A) Ruby on Rails

B) Django

C) PHP

D) Perl

Answer: C

66) All of the following are website design features that annoy customers except:

A) slow-loading pages.

B) pop-under ads.

C) splash pages.

D) multi-browser functionality

Answer: D

67) All of the following are important factors in search engine optimization except:

A) selecting keywords and page titles.

B) encouraging other sites to link to your site.

C) buying search engine ads.

D) adhering to privacy policies

Answer: D

68) ________ provides a set of standards for communicating between a browser and a program running on a server that allows for interaction between the user and server.

A) CGI

B) ColdFusion

C) JavaScript

D) VBScript

Answer: A

69) ________ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser.

A) VBScript

B) ActiveX

C) ColdFusion

D) JavaScript

Answer: D

70) The primary way a website is able to personalize the content presented to a visitor is through the use of:

A) privacy policies.

B) cookies.

C) accessibility rules.

D) site management tools.

Answer: B

71) Which of the following is not part of the LAMP open source web development model?

A) Linux

B) Apache

C) Microsoft IIS

D) PHP

Answer: C

72) Django follows the ________ programming principle.

A) CoC

B) WYSIWYG

C) DRY

D) LAMP

Answer: C

73) A security hole known as Shellshock enabled hackers to target JavaScript running on Apache web servers.

FALSE

77) All of the following are key design principles of responsive web design except:

A) flexible grid-based layouts.

B) media queries.

C) coding by convention.

D) flexible images and media.

Answer: C

78) Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the

device?

A) LAMP

B) AWD

C) mobile first design

D) RoR

Answer: B

79) Which of the following statements about responsive web design (RWD) is not true?

A) RWD works best for sites that have complex functionality.

B) RWD tools include HTML5 and CSS3.

C) RWD makes it possible to design a website that automatically adjusts its layout and display according to the screen resolution of the device on which it is being viewed.

D) RWD can be costly.

Answer: A

80) Building which of the following is the least expensive path to creating a mobile presence?

A) native app

B) mobile website

C) mobile web app

D) hybrid HTTP

Answer: B

81) Which of the following statements about mobile websites is not true?

A) Mobile websites run on a firm's servers, just like a traditional website.

B) Mobile websites can be built using standard web tools such as server-side HTML, Linux, PHP and SQL.

C) Generally, mobile websites operate more quickly than traditional websites viewed on a desktop computer connected to a broadband office network.

D) Most large firms today have mobile websites.

Answer: C

82) Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?

A) RWD

B) AWD

C) mobile first design

D) RESS

Answer: C

83) An HTML5 app is one designed to specifically operate using a mobile device's hardware and operating system.

FALSE

84) Native web apps need to be developed for different mobile platforms

TRUE

In order from beginning to end, the major steps in the SDLC are:

systems analysis/planning; systems design; building the system; testing; and implementation.

A multi-tier architecture includes a web and database server.

False

Which of the following is not one of the basic business objectives for an e-commerce site?

optimize system architecture

Microservices are a very granular implementation of SOA.

True

A template test is a form of which type of testing?

A/B testing

Which of the following is the preferred method of implementing a service-oriented architecture?

web services

Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.

True

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

decreased dramatically

Scrum is a type of agile development.

True

Which of the following involves testing a site's program modules one at a time?

unit testing

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?

logical design

The concept of a "sprint" is related to which of the following development methodologies?

Scrum

Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?

SWOT Analysis

Which of the following basic system functionalities is used to display goods on a website?

digital catalog

Which form of testing compares a control page with one that is very different?

new concept test

What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which system functionality must your website have to be able to personalize or customize a product for a client?

customer on-site tracking

The SDLC methodology helps developers to understand the business objectives of a system and design an appropriate solution.

True

The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:

benchmarking

________ are the types of information systems capabilities needed to meet business objectives.

System functionalites

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

two-tier architecture

In general, the annual system maintenance cost will roughly parallel the development cost.

True

All of the following are simple steps for optimizing web page content except:

segmenting computer servers to perform dedicated functions.

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

social media

Which of the following details the actual hardware components to be used in a system?

physical design

Which of the following involves creating a skeleton version that focuses on functionality rather than design?

wireframing

All of the following are basic information requirements for a product database except:

customer ID numbers

Which of the following are the two main components of a systems design?

logical design and physical design

Which of the following verifies that the business objectives of the system are in fact working?

acceptance testing

Which of the following helps you engage your customers in a conversation?

on-site blog

1.下列何者非數位匯流的概念?[單選]

B. 經由郵局寄送信件

2.Amazon.com提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一個概念?[單選]

A. 網路交易模式

3.請問下列何者非呈現式廣告的概念?[單選]

B. 又稱為關鍵字廣告

4.我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術是下列何者?[單選]

D. 影音串流

5.下列何者非數位匯流的概念?[單選]

B. 經由郵局寄送信件

6.Amazon.com提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一個概念?[單選]

A. 網路交易模式

7.讓使用者透過網路來通話、訊息傳遞、資訊往來或分享影像的系統,這是指下列何者?[單選]

C. 即時通訊

8.適地性服務(Location Based ServiceLBS)就屬於環境感知所延伸出的應用,請問此服務教符合下列何者應用?[單選]

B. 行動商務

9.下列何者非數位匯流的概念?(單選)

(B) 經由郵局寄送信件

10.讓使用者透過網路來通話、訊息傳遞、資訊往來或分享影像的系統,是指下列何者?(單選)

(C) 即時通訊

11.請問下列何者非呈現式廣告的概念?(單選)

(B) 又稱為關鍵字廣告

12.我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術是下列何者?(單選)

(D) 影音串流

13.Confidentiality is sometimes confused with:

A) privacy.

14.________ is the ability to ensure that e-commerce participants do not deny their online actions.

A) Nonrepudiation

15.________ is the ability to identify the person or entity with whom you are dealing on the Internet.

B) Authenticity

16.________ is the ability to ensure that an e-commerce site continues to function as intended.

C) Availability

17.Which of the following is an example of an online privacy violation?

B) your online purchasing history being sold to other merchants without your consent

18.Which of the following is not a key factor for establishing e-commerce security?

A) data integrity

19.According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes?

D) botnets

20.Which of the following statements about data breaches in 2019 is not true?

C) According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

21.Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations?

A) credential stuffing

22.Which of the following is not an example of malicious code?

D) sniffer

23.Beebone is an example of which of the following?

B) botnet

24.Which of the following is not an example of a potentially unwanted program (PUP)?

C) drive-by download

25.Which of the following was designed to cripple Iranian nuclear centrifuges?

A) Stuxnet

26.________ typically attack governments, organizations, and sometimes individuals for political purposes.

D) Hacktivists

27.A Trojan horse appears to be benign, but then does something other than expected.

是非題 (2 ) 2

A.O

28.Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

是非題 (2 ) 2

A.O

29.A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

是非題 (2 ) 2

A.O

30.FREAK is an example of a software vulnerability.

是非題 (2 ) 2

A.O

31.The Data Encryption Standard uses a(n) ________-bit key.

B) 56

32.All of the following statements about public key cryptography are true except:

B) public key cryptography ensures authentication of the sender.

33.All of the following are features of WPA3 except:

B) it enables the creation of a VPN.

34.All of the following statements about PKI are true except:

C) PKI guarantees that the verifying computer of the merchant is secure.

35.Which of the following dimensions of e-commerce security is not provided for by encryption?

B) availability

36.A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

A) firewall

37.Proxy servers are also known as __________ because they have two network interfaces.

C) dual home systems

38.Which of the following statements is not true?

A) Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

39.Face ID is an example of which of the following?

是非題 (2 ) 2

A) biometrics

40.Which of the following is the most common protocol for securing a digital channel of communication?

是非題 (2 ) 2

B) TLS

41.The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

是非題 (2 ) 2

A.O

42.What is the first step in developing an e-commerce security plan?

C) Perform a risk assessment.

43.Which of the following statements is not true?

C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

44.Which of the following statements about blockchain is not true?

B) A blockchain system is inherently centralized.

45.PCI-DSS is a standard established by which of the following?

B) the credit card industry

46.Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

B) NFC

47.All of the following are examples of cryptocurrencies except:

C) Zelle.

48.Bluetooth is the primary enabling technology for mobile wallets.

是非題 (2 ) 2

B.X

49.There is a finite number of Bitcoins that can be created.

是非題 (2 ) 2

A.O

50.According to the most recent Fiserv survey, 65% of consumers in the United States have used online bill payment.

是非題 (2 ) 2

A.O

<第五章> 電子商務的應用技術發展

1.(B) 下列何者非數位匯流的概念?

B. 經由郵局寄送信件

2.(ABCD) 數位匯流可以包括哪四種不同的產業?

A. IT產業                 B. 電信產業

C. 消費性電子產業  D. 娛樂產業

3.(A) Amazon.com 提供更多樣的產品與快速的送貨服務,是

屬於網路應用技術發展的哪一個概念?

A. 網路交易模式

4. (ABC) 第三方支付包括下列哪些特點?

A. 靈活的支付模式 B. 嚴格的監督機制

C. 保障的獨立機構

5.(C) 讓使用者透過網路來通話、訊息傳遞、資訊往來或分享

影像的系統,這是指下列何者?

C. 即時通訊

6.(ABCD)下列哪些屬於即時通訊?

A. MSN                  B. Whatapp

C. WeChat             D. Line

7.(B) 請問下列何者非呈現式廣告的概念?

B. 又稱為關鍵字廣告

8.(D) 我們可以利用網路直接進行觀看,傳輸時就可以同步觀

賞的技術是下列何者?

D.影音串流

9.(ABC) 影音串流的三大平臺是指哪三個?

A. Windows Media Player  B. Real Player

C. QuickTime Player

10.(ABCD) 社群網站的商業模式包括哪些?

 A. 廣告收入模式 B. 使用者收費模式

 C. 導購模式     D. 遊戲模式

11.(B) 適地性服務(Location Based ServiceLBS) 就屬於環境

感知所延伸出的應用,請問此服務叫符合下列何者應用?

 B. 行動商務

1) Confidentiality is sometimes confused with:

A) privacy.

2) ________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

A) Nonrepudiation

3) ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

B) Authenticity

4) Which of the following is an example of an integrity violation of e-commerce security?

D) An unauthorized person intercepts an online communication and changes its contents.

5) ________ refers to the ability to ensure that an e-commerce site continues to function as intended.

C) Availability

6) Which of the following is an example of an online privacy violation?

B) your online purchasing history being sold to other merchants without your consent

7) ________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

A) Confidentiality

10) All of the following experienced high-profile data breaches in 2015 except:

C) Amazon.

11) Bitcoins are an example of:

A) digital cash.

13) Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

C) Adobe Flash

14) Accessing data without authorization on Dropbox is an example of which of the following?

B) cloud security issue

15) All of the following are prominent hacktivist groups except:

D) Avid Life.

16) Conficker is an example of a:

B) worm.

17) Which of the following is the leading cause of data breaches?

C) hackers

18) Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:]

A) spyware.

19) In 2016, Yahoo revealed that it had experienced which of the following?

A) a high-profile data breach

20) What is the most frequent cause of stolen credit cards and card information today?

B) the hacking and looting of corporate servers storing credit card information

21) Which dimension(s) of security is spoofing a threat to?

C) integrity and authenticity

22) ________ is not an example of malicious code.

D) A sniffer

23) The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following?

C) DDoS attack

24) Angler is an example of:

B) an exploit kit.

25) Malware that comes with a downloaded file requested by a user is called a:

C) drive-by download.

26) Which of the following is not an example of a PUP?

C) drive-by download

27) Which of the following was designed to cripple Iranian nuclear centrifuges?

A) Stuxnet

28) Automatically redirecting a web link to a different address is an example of:

C) pharming.

29) Shellshock is an example of which of the following?

B) software vulnerability

30) According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?

D) botnets

31) ________ typically attack governments, organizations, and sometimes individuals for political purposes.

D) Hacktivists

44) Next generation firewalls provide all of the following except:

C) the ability to automatically update applications with security patches.

48) All of the following statements about public key cryptography are true except:

B) public key cryptography ensures authentication of the sender.

51) A digital certificate contains all of the following except the:

A) subject's private key.

52) Which of the following dimensions of e-commerce security does not involve encryption?

B) availability

54) A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.

A) firewall

55) Proxy servers are also known as:

C) dual home systems.

56) All of the following are used for authentication except:

D) packet filters.

57) An intrusion detection system can perform all of the following functions except:

D) blocking suspicious activity.

58) Which of the following is not an example of an access control?

C) digital signatures

60) Which of the following statements is not true?

A) Apple's Touch ID stores a user's actual fingerprint.

61) A fingerprint scan is an example of which of the following?

A) biometrics

68) What is the first step in developing an e-commerce security plan?

C) Perform a risk assessment.

69) To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

B) an authorization management system.

70) Which of the following statements is not true?

C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

71) All of the following are examples of social/mobile peer-to-peer payment systems except:

B) Bill Me Later.

72) All of the following statements about Apple Pay are true except which of the following?

A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.

73) PayPal is an example of a(n):

A) online stored value payment system.

74) PCI-DSS is a standard established by which of the following?

B) the credit card industry

75) Which of the following is not a major trend in e-commerce payments in 2016-2017?

A) Mobile retail payment volume decreases.

76) All of the following are limitations of the existing online credit card payment system except:

B) cost to consumers.

77) Linden Dollars, created for use in Second Life, are an example of:

B) virtual currency.

1) Confidentiality is sometimes confused with:

A) privacy.

B) authenticity.

C) integrity.

D) nonrepudiation

a

2) ________ is the ability to ensure that e-commerce participants do not deny their online actions.

A) Nonrepudiation

B) Authenticity

C) Availability

D) Integrity

a

3) ________ is the ability to identify the person or entity with whom you are dealing on the Internet.

A) Nonrepudiation

B) Authenticity

C) Availability

D) Integrity

b

4) Which of the following is an example of an integrity violation of e-commerce security?

A) A website is not actually operated by the entity the customer believes it to be.

B) A merchant uses customer information in a manner not intended by the customer.

C) A customer denies that he is the person who placed the order.

D) An unauthorized person intercepts an online communication and changes its contents

d

5) ________ is the ability to ensure that an e-commerce site continues to function as intended.

A) Nonrepudiation

B) Authenticity

C) Availability

D) Integrity

c

6) Which of the following is an example of an online privacy violation?

A) your e-mail being read by a hacker

B) your online purchasing history being sold to other merchants without your consent

C) your computer being used as part of a botnet

D) your e-mail being altered by a hacker

b

7) ________ is the ability to ensure that messages and data are only available to those authorized to view them.

A) Confidentiality

B) Integrity

C) Privacy

D) Availability

a

11) Bitcoins are an example of:

A) digital cash.

B) virtual currency.

C) a stored value payment system.

D) an EBPP system.

a

12) The overall rate of online credit card fraud is ________ of all online card transactions.

A) less than 1%

B) around 5%

C) around 10%

D) around 15%

a

13) Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

A) HTML

B) HTML5

C) Adobe Flash

D) Adobe Acrobat

c

14) Accessing data without authorization on Dropbox is an example of a:

A) social network security issue.

B) cloud security issue.

C) mobile platform security issue.

D) sniffing issue

b

15) Which of the following is not a key factor for establishing e-commerce security?

A) data integrity

B) technology

C) organizational policies

D) laws and industry standards

a

16) Conficker is an example of a:

A) virus.

B) worm.

C) Trojan horse.

D) botnet

b

17) Which of the following is the leading cause of data breaches?

A) theft of a computer

B) accidental disclosures

C) hackers

D) DDoS attacks

c

18) Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

A) spyware.

B) a backdoor.

C) browser parasite.

D) adware.

a

19) According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:

A) China.

B) Russia.

C) Nigeria.

D) North Korea

c

20) What is the most frequent cause of stolen credit cards and card information today?

A) lost cards

B) the hacking and looting of corporate servers storing credit card information

C) sniffing programs

D) phishing attacks

b

21) Which dimension(s) of security is spoofing a threat to?

A) integrity

B) availability

C) integrity and authenticity

D) availability and integrity

c

22) Which of the following is not an example of malicious code?

A) scareware

B) Trojan horse

C) bot

D) sniffer

d

23) The attack on Dyn Inc., in October 2016 is an example of which of the following?

A) SQL injection attack

B) browser parasite

C) DDoS attack

D) MitM attack

c

24) Angler is an example of which of the following?

A) worm

B) exploit kit

C) phishing

D) hacktivism

b

25) Malware that comes with a downloaded file that a user requests is called a:

A) Trojan horse.

B) backdoor.

C) drive-by download.

D) PUP

c

26) Which of the following is not an example of a PUP?

A) adware

B) browser parasite

C) drive-by download

D) spyware

c

27) Which of the following was designed to cripple Iranian nuclear centrifuges?

A) Stuxnet

B) Flame

C) Snake

D) Storm

a

28) Automatically redirecting a web link to a different address is an example of which of the following?

A) sniffing

B) social engineering

C) pharming

D) DDoS attack

c

29) According to Symantec, the number of data breaches in 2016 increased by ________ compared to 2015.

A) 100%

B) 15%

C) 150%

D) 20%

d

30) According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes?

A) malicious insiders

B) malicious code

C) denial of service

D) botnets

d

31) ________ typically attack governments, organizations, and sometimes individuals for political purposes.

A) Crackers

B) White hats

C) Grey hats

D) Hacktivists

d

44) Next generation firewalls provide all of the following except:

A) an application-centric approach to firewall control.

B) the ability to identify applications regardless of the port, protocol, or security evasion tools used.

C) the ability to automatically update applications with security patches.

D) the ability to identify users regardless of the device or IP address.

c

45) Asymmetric key cryptography is also known as:

A) public key cryptography.

B) secret key cryptography.

C) PGP.

D) PKI

a

46) All the following statements about symmetric key cryptography are true except:

A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.

B) the Data Encryption Standard is a symmetric key encryption system.

C) symmetric key cryptography is computationally slower.

D) symmetric key cryptography is a key element in digital envelopes.

c

47) The Data Encryption Standard uses a(n) ________-bit key.

A) 8

B) 56

C) 256

D) 512

b

48) All of the following statements about public key cryptography are true except:

A) public key cryptography uses two mathematically related digital keys.

B) public key cryptography ensures authentication of the sender.

C) public key cryptography does not ensure message integrity.

D) public key cryptography is based on the idea of irreversible mathematical functions.

b

49) Which of the following is the current standard used to protect Wi-Fi networks?

A) WEP

B) TLS

C) WPA2

D) WPA3

c

50) All of the following statements about PKI are true except:

A) the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.

B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.

C) PKI guarantees that the verifying computer of the merchant is secure.

D) the acronym PKI stands for public key infrastructure.

c

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

There is a finite number of Bitcoins that can be created.

True

IoT botnets became the preferred platform for launching DDoS attacks in 2017.

True

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:

Nigeria.

Proxy servers are also known as:

dual home systems.

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

Which of the following statements about blockchain is not true?

A blockchain system is inherently centralized.

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

The attack on Dyn Inc. in 2016 is an example of which of the following?

DDoS attack

Which of the following statements is NOT true?

Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

All of the following statements about PKI are true EXCEPT:

PKI guarantees that the verifying computer of the merchant is secure.

A Trojan horse appears to be benign, but then does something other than expected.

True

Which of the following is the leading cause of data breaches?

Hackers

Beebone is an example of which of the following?

Botnet

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

A digital certificate contains all of the following except the:

subject's private key.

Exploit kits can be purchased by users to protect their computers from malware.

False

What is the first step in developing an e-commerce security plan?

Preform a risk assessment

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

Spyware

According to Ponemon Institute's 2017 survey, which of the following was NOT among the causes of the most costly cybercrimes?

Botnets

Which of the following is NOT an example of an access control?

digital signatures

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

Accessing data without authorization on Dropbox is an example of a:

Cloud Security Issue

PayPal is an example of what type of payment system?

online stored value payment system.

Which of the following dimensions of e-commerce security is NOT provided for by encryption?

availability

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

Adobe Flash

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is the most popular alternative payment method in the United States.

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

True

All of the following are features of WPA3 except:

it enables the creation of a VPN.

Bluetooth is the primary enabling technology for mobile wallets.

False

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

an authorization management system.

The Data Encryption Standard uses a(n) ________-bit key.

56

Automatically redirecting a web link to a different address is an example of which of the following?

pharming

Which of the following statements is not true?

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

Which of the following statements about data breaches in 2017 is not true?

According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________.

more than 55%; less than 20%

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity.

According to the Identity Theft Resource Center, the number of data breaches in 2017 increased by ________ compared to 2016.

55%

All of the following are used for authentication except:

packet filters.

Zelle is an example of a P2P mobile payment app.

True

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

Which of the following is not an example of malicious code?

sniffer

________ is the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Which of the following is not an example of an access control?

digital signatures

Malware that comes with a downloaded file that a user requests is called a:

drive-by download.

Which of the following is not a key factor for establishing e-commerce security?

data integrity

Conficker is an example of a:

worm.

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

Which of the following is not an example of a potentially unwanted program (PUP)?

drive-by download

Phishing attacks rely on browser parasites.

False

The creation of Bitcoins consumes a significant amount of energy.

True

SSL/TLS cannot provide irrefutability.

True

Which of the following statements about data breaches in 2017 is not true?

According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

All of the following are limitations of the existing online credit card payment system except:

cost to consumers.

Which of the following statements about Bitcoin is NOT true?

Bitcoins are completely secure.

Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations?

credential stuffing

Automatically redirecting a web link to a different address is an example of which of the following?

pharming

Beebone is an example of which of the following?

botnet

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

Accessing data without authorization on Dropbox is an example of a:

cloud security issue

________ is the ability to ensure that an e-commerce site continues to function as intended.

Availability

Which dimensions of security is spoofing a threat to?

integrity and authenticity

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

Which of the following technologies is aimed at reducing e-mail address spoofing and phishing?

DMARC

FREAK is an example of a software vulnerability.

True

Which of the following is not a key factor for establishing e-commerce security?

data integrity

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

The attack against Dyn servers is an example of a(n):

DDoS attack

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

Phishing attacks rely on browser parasites.

False

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

Adobe Flash

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

True

Exploit kits can be purchased by users to protect their computers from malware.

False

Which of the following is not an example of a potentially unwanted program (PUP)?

drive-by download

Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders?

social engineering

Which of the following is the leading cause of data breaches?

hackers

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

WannaCry is an example of ransomware.

True

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Malware that comes with a downloaded file requested by a user is called a:

drive-by download

Confidentiality is sometimes confused with:

privacy

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

True

A Trojan horse appears to be benign, but then does something other than expected.

True

Which of the following is not an example of malicious code?

sniffer

Conficker is an example of a:

worm

According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes?

botnets

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following is not an example of a PUP?

Drive-by download

BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet:

Authenticity

Online bill payments are believed to cost BLANK to process compared to BLANK for paper bills:

20 to 30 cents, 3 to 7

Which of the following is not a key point of vulnerability when dealing with e-commerce?

The credit card companies

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure

Botnets are typically used for all of the following except:

phishing attacks

Linden Dollars, created for use in Second Life, are an example of:

virtual currency

A BLANK is hardware or software that acts as a filter to prevent unwanted packets from entering a network:

Firewall

none of the following payment systems offers immediate monetary value except:

Store value/debit card

Most of the world's spam is delivered via which of the following?

Botnets

All of the following are examples of an access control?

Digital signatures

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012:

3.5 billion

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

All of the following are factors in contributing to the increase in cybercrime except:

The Internet's similarity to telephone networks

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

two-factor authenticiation

Which of the following is the current standard used to protect Wi-Fi networks?

WPA2

A BLANK is a hardware or software that acts as a filter to prevent unwanted packets from entering a network:

Firewall

Malware that comes with a downloaded file that a user requests is called a:

Drive-by download

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

The six dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

Confidentiality

Which of the following dimensions of e-commerce security is not provided for by encryption?

Availability

BLANK refers to the ability to ensure that messages and data are only available to those authorized to view them:

Privacy

Online bill payments now accounts for BLANK of all bill payments:

50%

Bitcoins are an example of:

Digital cash

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

Checking network traffic to see if it matches certain patterns or preconfigured rules

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents

Which of the most frequent cause of stolen credit cards and card information today?

The hacking and looting of corporate servers storing credit card information

Botnets are typically used for all of the following except:

phishing attacks

Which of the following countries has been found to have engaged in cyberespionage against Google?

China

The overall rate of online credit card fraud is BLANK% of all online card transactions

Less than 1

In the United States, the primary form of online payment is:

credit cards

BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Nonrepudiation

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

An example of a privacy violation of e-commerce security is:

Your online purchasing history being sold to other merchants without your consent.

Which of the following is not a key point of vulnerability when dealing with e-commerce?

The credit card companies

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

Two-factor authentication

Most of the world's spam is delivered via which of the following?

botnets

Software that is used to obtain private user information such as user's keystrokes or copies of e-mail is referred to as:

Spyware

What is the most frequent cause of stolen credit cards and card information today?

The hacking and looting of corporate servers storing credit card information

Which dimensions of security is spoofing a threat to?

Integrity and authenticity

All of the following statements about symmetric key encryption are true except:

symmetric key encryption is computationally slower

The Data Encryption Standard uses a BLANK bit key

56

All of the following statements about public key encryption are true except:

Public key encryption ensures authentication of the sender

A digital certificate contains all of the following except the:

Subject's private key

All of the following are used for authentication except:

Packet filters

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?

DDoS attack

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012.

3.5 billion

P2P payment systems are a variation on what type of payment system?

Stored value payment system

Rustock is an example of which of the following?

botnet

All of the following are limitations of the existing online credit card payment systems except:

Cost to consumers

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

NFC

51) A digital certificate contains all of the following except the:

A) subject's private key.

B) subject's public key.

C) digital signature of the certification authority.

D) digital certificate serial number

a

52) Which of the following dimensions of e-commerce security is not provided for by encryption?

A) confidentiality

B) availability

C) message integrity

D) nonrepudiation

b

53) All of the following are methods of securing channels of communication except:

A) SSL/TLS.

B) digital certificates.

C) VPN. D) FTP

d

54) A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

A) firewall

B) virtual private network

C) proxy server

D) PPTP

a

55) Proxy servers are also known as:

A) firewalls.

B) application gateways.

C) dual home systems.

D) packet filters

c

56) All of the following are used for authentication except:

A) digital signatures.

B) certificates of authority.

C) biometric devices.

D) packet filters

d

57) An intrusion detection system can perform all of the following functions except:

A) examining network traffic.

B) setting off an alarm when suspicious activity is detected.

C) checking network traffic to see if it matches certain patterns or preconfigured rules.

D) blocking suspicious activity.

d

58) Which of the following is not an example of an access control?

A) firewalls

B) proxy servers

C) digital signatures

D) login passwords

c

59) Which of the following statements is not true?

A) A VPN provides both confidentiality and integrity.

B) A VPN uses both authentication and encryption.

C) A VPN uses a dedicated secure line.

D) The primary use of VPNs is to establish secure communications among business partners.

c

60) Which of the following statements is not true?

A) Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

B) Biometric devices reduce the opportunity for spoofing.

C) A retina scan is an example of a biometric device.

D) Biometric data stored on an iPhone is encrypted.

a

61) Face ID is an example of which of the following?

A) biometrics

B) encryption

C) IDS

D) firewall

a

62) Which of the following is the most common protocol for securing a digital channel of communication?

A) DES

B) SSL/TLS

C) VPN

D) HTTP

b

68) What is the first step in developing an e-commerce security plan?

A) Create a security organization.

B) Develop a security policy.

C) Perform a risk assessment.

D) Perform a security audit.

c

69) To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

A) access controls.

B) an authorization management system.

C) security tokens.

D) an authorization policy.

b

70) Which of the following statements is not true?

A) A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.

B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.

C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices.

c

71) All of the following are examples of social/mobile peer-to-peer payment systems except:

A) Venmo.

B) Bill Me Later.

C) Square Cash.

D) Google Wallet

b

72) All of the following statements about Apple Pay are true except which of the following?

A) Apple Pay is subject to regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.

B) Apple Pay is based on Touch ID biometric fingerprint scanning.

C) Apple Pay can be used for mobile payments at the point of sale at a physical store.

D) Apple Pay relies on NFC chip technology

a

73) PayPal is an example of what type of payment system?

A) online stored value payment system

B) digital checking system

C) accumulating balance system

D) digital credit card system

a

74) PCI-DSS is a standard established by which of the following?

A) the banking industry

B) the credit card industry

C) the federal government

D) the retail industry

b

75) Which of the following is not a major trend in e-commerce payments in 2017-2018?

A) Mobile retail payment volume decreases.

B) PayPal remains the most popular alternative payment method.

C) Google refocuses Google Wallet solely on sending and receiving money.

D) Payment by credit and/or debit card remains the dominant form of online payment.

a

76) All of the following are limitations of the existing online credit card payment system except:

A) poor security.

B) cost to consumers.

C) cost to merchant.

D) social equity.

b

77) Linden Dollars, created for use in Second Life, are an example of:

A) digital cash.

B) virtual currency.

C) EBPP.

D) peer-to-peer payment systems.

b

78) Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

A) DES

B) NFC

C) IM

D) text messaging

b

84) Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________.

A) less than 10%; less than 25%

B) about 25%; about 10%

C) more than 55%; less than 20%

D) 100%; 0%

c

1) Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

TRUE

2) A worm does not need to be activated by a user in order for it to replicate itself.

TRUE

3) A Trojan horse appears to be benign, but then does something other than expected.

TRUE

4) Phishing attacks rely on browser parasites.

FALSE

5) Insiders present a greater security threat to e-commerce sites than outsiders.

TRUE

6) Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.

True

7) Drive-by downloads are now the most common method of infecting computers.

TRUE

8) Smishing attacks exploit SMS messages.

TRUE

9) TLS does not guarantee server-side authentication.

FALSE

10) The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

TRUE

11) The U.S. federal government has historically not been in favor of the development and export of strong encryption systems.

TRUE

12) Credit cards are the dominant form of online payment throughout the world.

FALSE

13) In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

TRUE

14) Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

FALSE

15) PayPal requires the recipient of a payment to have a PayPal account to receive funds.

TRUE

A) privacy.

Confidentiality is sometimes confused with:

A) privacy.

B) authenticity.

C) integrity.

D) nonrepudiation.

A) Nonrepudiation

________ is the ability to ensure that e-commerce participants do not deny their online actions.

A) Nonrepudiation

B) Authenticity

C) Availability

D) Integrity

B) Authenticity

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

A) Nonrepudiation

B) Authenticity

C) Availability

D) Integrity

D) An unauthorized person intercepts an online communication and changes its contents.

Which of the following is an example of an integrity violation of e-commerce security?

A) A website is not actually operated by the entity the customer believes it to be.

B) A merchant uses customer information in a manner not intended by the customer.

C) A customer denies that he is the person who placed the order.

D) An unauthorized person intercepts an online communication and changes its contents.

C) Availability

________ is the ability to ensure that an e-commerce site continues to function as intended.

A) Nonrepudiation

B) Authenticity

C) Availability

D) Integrity

B) your online purchasing history being sold to other merchants without your consent

Which of the following is an example of an online privacy violation?

A) your e-mail being read by a hacker

B) your online purchasing history being sold to other merchants without your consent

C) your computer being used as part of a botnet

D) your e-mail being altered by a hacker

A) Confidentiality

________ is the ability to ensure that messages and data are only available to those authorized to view them.

A) Confidentiality

B) Integrity

C) Privacy

D) Availability

C) According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

Which of the following statements about data breaches in 2017 is not true?

A) According to the Identity Theft Resource Center, the number of breaches in 2017 increased by almost 45% from 2016.

B) According to the Identity Theft Resource Center, over 50% of data breaches involved social security numbers.

C) According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

D) According to the Identity Theft Resource Center, data breaches involving the business sector represented over 55% of all breaches.

C) Zelle.

All of the following are examples of cryptocurrencies except:

A) Ethereum.

B) Ripple.

C) Zelle.

D) Monero.

A) less than 1%

The overall rate of online credit card fraud is ________ of all online card transactions.

A) less than 1%

B) around 5%

C) around 10%

D) around 15%

C) Adobe Flash

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

C) Adobe Flash

1.79) Which of the following statements about responsive web design (RWD) is not true?

A

.

A) RWD works best for sites that have complex functionality.

B

.

B) RWD tools include HTML5 and CSS3.

C

.

C) RWD makes it possible to design a website that automatically adjusts its layout and display according to the screen resolution of the device on which it is being viewed.

D

.

D) RWD can be costly.

正確答案: A

2.1. 下列敘述何者錯誤?(單選)

A

.

(A) 供應鏈是指從製造產品的原料、原物料、半成品,到製成品送至消費者手中的過程,包括供應商、製造商、配銷商、物流商等不同的企業,以處理產品由原物料到運送至消費者手中所需解決的金流、物流等問題

B

.

(B) 供應鏈導源於流通,原指軍方的後勤補給活動,隨著商業的蓬勃發展,逐漸推廣應用到商業活動上,其泛指能夠滿足消費者需求的產品流通過程,包括上、下游相關廠商都可納入供應鏈的範疇中

C

.

(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果

D

.

(D) 供應鏈管理具有協同整合、非核心業務外包、減少長鞭效應和即時、最佳化四種特性

正確答案: C

3.有關專利權的敘述,下列何者正確?[單選]

A

.

A. 可永久保護所研發的專利

B

.

B. 在非營利情況下使用具專利權保護的新發明屬於違反專利權

C

.

C. 專利權只限於申請的國家,出了國境就不受保護

D

.

D. 專利權不具獨占性,每個人都能生產與仿冒

正確答案: C

4.45) All of the following statements about public key cryptography are true except:

A

.

A) public key cryptography uses two mathematically related digital keys.

B

.

B) public key cryptography ensures authentication of the sender.

C

.

C) public key cryptography does not ensure message integrity.

D

.

D) public key cryptography is based on the idea of irreversible mathematical functions.

正確答案: B

5.31) The incremental cost of building the next unit of a good is called the:

A

.

A) Law of One Price.

B

.

B) variable cost.

C

.

C) marginal cost.

D

.

D) fixed cost.

正確答案: C

6.63) Django is based on which of the following?

A

.

A) PHP

B

.

B) Python

C

.

C) Perl

D

.

D) Ruby on Rails

正確答案: B

7.78) View-to-cart ratio is a measure of the: 回答錯誤

A

.

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

B

.

B) percentage of views that lead to an add-to-cart action.

C

.

C) percentage of existing customers who continue to buy on a regular basis.

D

.

D) percentage of shoppers who do not return within a year after their initial purchase.

正確答案: B

8.82) Which of the following is a programming language introduced by Apple specifically for developing iOS applications?

A

.

A) Objective-C

B

.

B) C

C

.

C) C++

D

.

D) Swift

正確答案: D

9.83) Applications for Android operating system-based smartphones are typically written in which of the following?

A

.

A) Swift

B

.

B) Java

C

.

C) ActiveX

D

.

D) ColdFusion

正確答案: B

10.4. 小駱是個很認真的保險業務員,每當拜訪舊顧客時,總會拿出顧客從前留下的資料加以研讀,藉此提供最符合顧客需求的保險建議。請問這是屬於下列何種概念?(單選)

A

.

(A) 企業資源規劃

B

.

(B) 知識管理

C

.

(C) 商業智慧

D

.

(D) 顧客關係管理

正確答案: D

11.30) The NIKEiD program is an example of which of the following marketing techniques?

A

.

A) customer co-production

B

.

B) transactive content

C

.

C) price discrimination

D

.

D) permission marketing

正確答案: A

12.24.阿傑是個Apple的重度使用者,每天都會逛AppleApp Store搜尋最新的應用程式,請問App Store豐富的數位化內容是屬於網路商業模式的哪種特性? [單選]

A

.

服務面

B

.

核心面

C

.

策略面

D

.

客訴面

正確答案: B

13.23) Which of the following is not a primary source of ad fraud?

A

.

A) browser extensions that insert ads into a premium publisher's website and then list the ads as available on a programmatic ad exchange

B

.

B) ad targeting firms that create bots that imitate the behavior of real shoppers and then charge advertisers

C

.

C) botnets hired by publishers to click on web pages to create phony traffic

D

.

D) native advertising that is displayed on a social media site

正確答案: D

14.1. 下列何者非企業電子化的主要應用範圍?(單選)

A

.

(A) 六個標準差

B

.

(B) SCM

C

.

(C) CRM

D

.

(D) ERP

正確答案: A

15.9. 阿斌是 Apple 的瘋狂粉絲,在 iPad mini 尚未在台灣上市時,就透過拍賣網站先買到,請問這是屬於 C to C 網路交易模式帶來的何種效益?(單選)

A

.

(A) 獲利性

B

.

(B) 特殊性

C

.

(C) 低價性

D

.

(D) 流動性

正確答案: B

16.9. 在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)

A

.

(A) 駭客

B

.

(B) 網路專家

C

.

(C) 釣客

D

.

(D) 網路作家

正確答案: A

17.25) Which of the following statements about CAN-SPAM is not true?

A

.

A) CAN-SPAM went into effect in January 2004.

B

.

B) CAN-SPAM prohibits unsolicited e-mail (spam).

C

.

C) CAN-SPAM prohibits the use of deceptive subject lines and false headers.

D

.

D) Large spammers are among CAN-SPAM's biggest supporters.

正確答案: B

18.42. 女鞋業者Grace Gift利用素人以及知名部落客合作,推出其專屬商品,成功擄獲消費者的心而使商品大賣,請問Grace Gift是考慮到網路商業模式的哪種特性?[單選] 回答錯誤

A

.

服務面

B

.

核心面

C

.

策略面

D

.

業務面

正確答案: A

19.1. 網站藉由銷售商品、資訊或服務給消費者而從中賺取價差,這是屬於下列哪一種收益模式?(單選)

A

.

(A) 廣告收益模式

B

.

(B) 訂閱收益模式

C

.

(C) 手續費收益模式

D

.

(D) 銷售收益模式

正確答案: D

20.供應鏈上基於資訊回饋困難與前置時間的延遲,造成許多決策者容易做出   重複訂購或臨時取消訂單的決策,而產生需求放大(或縮小)的效果。請問上   述是指哪個問題?[單選]

A

.

A. 長鞭效應

B

.

B. 長尾理論

C

.

C. 成本加成理論

D

.

D. 浮動訂單理論

正確答案: A

21.26) Which form of testing compares a control page with one that is very different?

A

.

A) template test

B

.

B) new concept test

C

.

C) funnel test

D

.

D) system test

正確答案: B

22.68) Which of the following is an example of an e-commerce first mover that failed?

A

.

A) Etsy

B

.

B) eToys

C

.

C) eBay

D

.

D) E*Trade

正確答案: B

23.下列何者不是顧客關係管理的關鍵成功因素?[單選]

A

.

A. 整合內部的資訊

B

.

B. 強化溝通的管道

C

.

C. 上、下游廠商配合度

D

.

D. 處理變革的抗拒

正確答案: C

24.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]

A

.

商流

B

.

服務流

C

.

金流

D

.

資訊流

正確答案: C

25.21) Amazon's Associates program is an example of which of the following?

A

.

A) viral marketing

B

.

B) local marketing

C

.

C) affiliate marketing

D

.

D) lead generation marketing

正確答案: C

26.6) A firm's ________ describes how a firm will produce a superior return on invested capital.

A

.

A) value proposition

B

.

B) revenue model

C

.

C) market strategy

D

.

D) competitive advantage

正確答案: B

27.將傳統拍賣方式轉換到網際網路上來進行,此模式稱為?[單選] 回答錯誤

A

.

Internet

B

.

Intranet

C

.

Extranet

D

.

Outranet

正確答案: D

28.5. 供應鏈管理的發展流程為以下何者?(單選)

A

.

(A) 物流管理階段運籌管理階段單一企業階段供應鏈管理階段

B

.

(B) 單一企業階段物流管理階段運籌管理階段供應鏈管理階段

C

.

(C) 供應鏈管理階段單一企業階段物流管理階段運籌管理階段

D

.

(D) 運籌管理階段單一企業管理階段物流管理階段供應鏈管理階段

正確答案: B

29.小泰規劃著他與小仙的甜蜜旅行,並且打算在晶華酒店住下並求婚,為了以防萬一,他使用晶華酒店的線上訂房服務,請問晶華酒店提供線上訂房的服務是屬於網路交易市場的哪個角色?

A

.

電子資料交換

B

.

基本的電子商務

C

.

電子交易市集

D

.

協同商務

正確答案: B

30.49) Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

A

.

A) CGI

B

.

B) ODBC

C

.

C) MySQL

D

.

D) HTTP

正確答案: B

31.8) The Internet Layer of TCP/IP is responsible for which of the following?

A

.

A) placing packets on and receiving them from the network medium

B

.

B) addressing, packaging, and routing messages

C

.

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

D

.

D) providing a variety of applications with the ability to access the services of the lower layers

正確答案: B

32.ERP」是指?[單選]

A

.

A. 企業資源規劃

B

.

B. 供應鏈管理

C

.

C. 顧客關係管理

D

.

D. 知識管理

正確答案: A

33.14) Which of the following did the Internet Advertising Bureau urge advertisers to abandon? 回答錯誤

A

.

A) HTML

B

.

B) HTML5

C

.

C) Adobe Flash

D

.

D) Adobe Acrobat

正確答案: C

34.Morgan Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選]

A

.

吸引人潮

B

.

發展交易

C

.

匯聚人潮

D

.

獲得錢潮

正確答案: C

35.8. 下列何者不受著作權法的保護?(單選)

A

.

(A) 三歲小孩的畫作

B

.

(B) 中華民國憲法

C

.

(C) 學校的試題

D

.

(D) 學校的網頁

正確答案: B C D

36.3. 下列哪些是常見的網路犯罪?(複選)

A

.

(A) 網路販賣盜版光碟

B

.

(B) 網路販賣贓物

C

.

(C) 入侵他人網站

D

.

(D) 散發電腦病毒

正確答案: A B C

37.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

A

.

(A) 隱私權

B

.

(B) 著作權

C

.

(C) 專利權

D

.

(D) 商標權

正確答案: B C D

38.3. 有關電子商務的定義,下列哪些錯誤?(複選)

A

.

(A) 電子商務就是不用在網路上做生意

B

.

(B) 電子商務就是把傳統的商業活動搬到網際網路上來進行

C

.

(C) 電子商務一定要透過網路線來傳遞

D

.

(D) 電子商務是商業交易或工作流程自動化的技術應用

正確答案: A C

39.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

A

.

(A) 隱私權

B

.

(B) 著作權

C

.

(C) 專利權

D

.

(D) 商標權

正確答案: B C D

40.6. 有關網路禮儀,下列哪些正確?(複選)

A

.

(A) 電腦禮儀的基本原則是「尊重」

B

.

(B) 雖是未經證實的消息,也要先讓大家知道

C

.

(C) 轉載別人的文章時,最好註明出處

D

.

(D) 最好取得原作者的同意後再進行轉載

正確答案: A C D

41.C)72) The emergence of mobile, social, and local e-commerce occurred during the Consolidation period of e-commerce.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

42.84) The information systems discipline spans the technical and behavioral approaches to e-commerce.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

43.8) A roughly equal percentage of men and women in the United States use the Internet today.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

44.80) Bluetooth is the primary enabling technology for mobile wallets.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

45.45) Lead generation marketing firms specialize in inbound marketing.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

46.39) E-commerce technologies provide a unique, many-to-many model of mass communication.

是非題 (2 ) 2

A

.

  A

B

.

B

正確答案: A

47.73) The current versions of most web browsers no longer support Java applets.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

48.59) All of the following are methods of improving the processing architecture of a website except:

是非題 (2 ) 2

A

.

A) separating static content from dynamic content.

B

.

B) optimizing ASP code.

C

.

C) optimizing the database schema.

D

.

D) adding web servers.

正確答案: D

49.56) Bluetooth is a high-speed, fixed broadband wireless local area network for commercial and residential use.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

50.65) SaaS and PaaS providers can typically provide services at lower costs through scale economies.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

B) cloud security issue.

Accessing data without authorization on Dropbox is an example of a:

A) social network security issue.

B) cloud security issue.

C) mobile platform security issue.

D) sniffing issue.

A) data integrity

Which of the following is not a key factor for establishing e-commerce security?

A) data integrity

B) technology

C) organizational policies

D) laws and industry standards

B) worm.

Conficker is an example of a:

A) virus.

B) worm.

C) Trojan horse.

D) botnet.

C) hackers

Which of the following is the leading cause of data breaches?

A) theft of a computer

B) accidental disclosures

C) hackers

D) DDoS attacks

A) spyware.

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

A) spyware.

B) a backdoor.

C) browser parasite.

D) adware.

C) Nigeria.

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:

A) China.

B) Russia.

C) Nigeria.

D) North Korea.

B) the hacking and looting of corporate servers storing credit card information

What is the most frequent cause of stolen credit cards and card information today?

A) lost cards

B) the hacking and looting of corporate servers storing credit card information

C) sniffing programs

D) phishing attacks

C) integrity and authenticity

Which dimension(s) of security is spoofing a threat to?

A) integrity

B) availability

C) integrity and authenticity

D) availability and integrity

D) sniffer

Which of the following is not an example of malicious code?

A) scareware

B) Trojan horse

C) bot

D) sniffer

C) DDoS attack

The attack on Dyn Inc. in 2016 is an example of which of the following?

A) SQL injection attack

B) browser parasite

C) DDoS attack

D) MitM attack

B) botnet

Beebone is an example of which of the following?

A) worm

B) botnet

C) phishing

D) hacktivism

C) drive-by download.

Malware that comes with a downloaded file that a user requests is called a:

A) Trojan horse.

B) backdoor.

C) drive-by download.

D) PUP.

C) drive-by download

Which of the following is not an example of a potentially unwanted program (PUP)?

A) adware

B) browser parasite

C) drive-by download

D) spyware

A) Stuxnet

Which of the following was designed to cripple Iranian nuclear centrifuges?

A) Stuxnet

B) Shamoon

C) Snake

D) Storm

C) pharming

Automatically redirecting a web link to a different address is an example of which of the following?

A) sniffing

B) social engineering

C) pharming

D) DDoS attack

C) 55%

According to the Identity Theft Resource Center, the number of data breaches in 2017 increased by ________ compared to 2016.

A) 15%

B) 45%

C) 55%

D) 75%

D) botnets

According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes?

A) malicious insiders

B) malicious code

C) denial of service

D) botnets

D) Hacktivists

________ typically attack governments, organizations, and sometimes individuals for political purposes.

A) Crackers

B) White hats

C) Grey hats

D) Hacktivists

C) the ability to automatically update applications with security patches.

Next generation firewalls provide all of the following except:

A) an application-centric approach to firewall control.

B) the ability to identify applications regardless of the port, protocol, or security evasion tools used.

C) the ability to automatically update applications with security patches.

D) the ability to identify users regardless of the device or IP address.

A) public key cryptography.

Asymmetric key cryptography is also known as:

A) public key cryptography.

B) secret key cryptography.

C) PGP.

D) PKI.

C) symmetric key cryptography is computationally slower.

All the following statements about symmetric key cryptography are true except:

A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.

B) the Data Encryption Standard is a symmetric key encryption system.

C) symmetric key cryptography is computationally slower.

D) symmetric key cryptography is a key element in digital envelopes.

B) 56

The Data Encryption Standard uses a(n) ________-bit key.

A) 8

B) 56

C) 256

D) 512

B) public key cryptography ensures authentication of the sender.

All of the following statements about public key cryptography are true except:

A) public key cryptography uses two mathematically related digital keys.

B) public key cryptography ensures authentication of the sender.

C) public key cryptography does not ensure message integrity.

D) public key cryptography is based on the idea of irreversible mathematical functions.

B) it enables the creation of a VPN.

All of the following are features of WPA3 except:

A) it implements a more robust key exchange protocol.

B) it enables the creation of a VPN.

C) it provides a more secure way to connect IoT devices.

D) it features expanded encryption for public networks.

C) PKI guarantees that the verifying computer of the merchant is secure.

All of the following statements about PKI are true except:

A) the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.

B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.

C) PKI guarantees that the verifying computer of the merchant is secure.

D) the acronym PKI stands for public key infrastructure.

A) subject's private key.

A digital certificate contains all of the following except the:

A) subject's private key.

B) subject's public key.

C) digital signature of the certification authority.

D) digital certificate serial number.

B) availability

Which of the following dimensions of e-commerce security is not provided for by encryption?

A) confidentiality

B) availability

C) message integrity

D) nonrepudiation

D) FTP.

All of the following are methods of securing channels of communication except:

A) SSL/TLS.

B) digital certificates.

C) VPN.

D) FTP.

A) firewall

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

A) firewall

B) virtual private network

C) proxy server

D) PPTP

C) dual home systems.

Proxy servers are also known as:

A) firewalls.

B) application gateways.

C) dual home systems.

D) packet filters.

D) packet filters.

All of the following are used for authentication except:

A) digital signatures.

B) certificates of authority.

C) biometric devices.

D) packet filters.

D) blocking suspicious activity.

An intrusion detection system can perform all of the following functions except:

A) examining network traffic.

B) setting off an alarm when suspicious activity is detected.

C) checking network traffic to see if it matches certain patterns or preconfigured rules.

D) blocking suspicious activity.

C) digital signatures

Which of the following is not an example of an access control?

A) firewalls

B) proxy servers

C) digital signatures

D) login passwords

C) A VPN uses a dedicated secure line.

Which of the following statements is not true?

A) A VPN provides both confidentiality and integrity.

B) A VPN uses both authentication and encryption.

C) A VPN uses a dedicated secure line.

D) The primary use of VPNs is to establish secure communications among business partners.

A) Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

Which of the following statements is not true?

A) Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

B) Biometric devices reduce the opportunity for spoofing.

C) A retina scan is an example of a biometric device.

D) Biometric data stored on an iPhone is encrypted.

A) biometrics

Face ID is an example of which of the following?

A) biometrics

B) encryption

C) IDS

D) firewall

B) SSL/TLS

Which of the following is the most common protocol for securing a digital channel of communication?

A) DES

B) SSL/TLS

C) VPN

D) HTTP

B) an authorization management system.

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

A) a firewall.

B) an authorization management system.

C) security tokens.

D) an authorization policy.

C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

Which of the following statements is not true?

A) A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.

B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.

C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices.

B) A blockchain system is inherently centralized.

Which of the following statements about blockchain is not true?

A) A blockchain system is composed of a distributed network of computers.

B) A blockchain system is inherently centralized.

C) A blockchain system is a transaction processing system.

D) Cryptocurrencies are based on blockchain technology.

A) Apple Pay is the most popular alternative payment method in the United States.

All of the following statements about Apple Pay are true except which of the following?

A) Apple Pay is the most popular alternative payment method in the United States.

B) Apple Pay is an example of a universal proximity mobile wallet.

C) Apple Pay can be used for mobile payments at the point of sale at a physical store.

D) Apple Pay has more users than either Google Pay or Samsung Pay.

A) online stored value payment system

PayPal is an example of what type of payment system?

A) online stored value payment system

B) digital checking system

C) accumulating balance system

D) digital credit card system

B) the credit card industry

PCI-DSS is a standard established by which of the following?

A) the banking industry

B) the credit card industry

C) the federal government

D) the retail industry

A) Mobile retail payment volume decreases.

Which of the following is not a major trend in e-commerce payments in 2018-2019?

A) Mobile retail payment volume decreases.

B) PayPal remains the most popular alternative payment method.

C) Large banks enter the mobile wallet and P2P payments market.

D) Payment by credit and/or debit card remains the dominant form of online payment.

B) cost to consumers.

All of the following are limitations of the existing online credit card payment system except:

A) poor security.

B) cost to consumers.

C) cost to merchant.

D) social equity.

B) Bitcoins are completely secure.

Which of the following statements about Bitcoin is not true?

A) The computational power required to mine Bitcoins has increased over time.

B) Bitcoins are completely secure.

C) Bitcoins are illegal in some countries.

D) In 2018, Bitcoin reprsented just under 40% of the full market for cryptocurrencies.

B) NFC

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

A) DES

B) NFC

C) IM

D) text messaging

C) more than 55%; less than 20%

Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________.

A) less than 10%; less than 25%

B) about 25%; about 10%

C) more than 55%; less than 20%

D) about 95%; about 5%

(T/F)A Trojan horse appears to be benign, but then does something other than expected.

True

A _______ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

-virtual private network

-proxy server

-firewall

-PPTP

Firewall

A digital certificate contains all of the following EXCEPT the:

-digital certificate serial number

-digital signature of the certification authority

-subject's private key

-subject's public key

Subject's private key

(T/F) A drive-way download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

True

Accessing data without authorization on Dropbox is an example of a:

-social network security issue

-sniffing issue

-mobile platform security issue

-cloud security issue

Cloud security issue

(T/F) According to the most recent Fiserv's survey, 65% of consumers in the United States have used online bill payment.

True

According to Ponemon Institute's 2019 survey, which of the following was NOT among the causes of the costliest cybercrimes?

-malicious insiders

-denial of service

-web-based attacks

-botnets

Botnets

All of the following are examples of cryptocurrencies EXCEPT:

-Monero

-Zelle

-Ethereum

-Ripple

Zelle

All of the following are features of WPA3 EXCEPT:

-it implements a more robust key exchange protocol.

-it features expanded encryption for public networks.

-it provides a more secure way to connect IoT devices.

-it enables the creation of a VPN.

it enables the creation of a VPN.

All of the following ae limitations of the existing online credit card payment system EXCEPT:

-cost to the consumers.

-cost to the merchant.

-poor security.

-social equity.

Cost to the consumers.

All of the following are methods of securing channels of communication EXCEPT:

-digital certificates.

-FTP.

-VPN.

-TLS.

FTP

All of the following are used for authentication EXCEPT:

-biometric devices.

-digital signatures.

-packet filters.

-certificates of authority.

Packet filters.

All of the following statements about Apple Pay are true EXCEPT which of the following?

-Apple Pay is an example of a universal mobile wallet.

-Apple Pay is the most popular alternative payment method in the United States.

-Apple Pay can be used for mobile payments at the point of sale at a physical store.

-Apple Pay had more users than either Google Pay or Samsung Pay.

Apple Pay is the most popular alternative payment method in the United States.

All of the following about PKI are true EXCEPT:

-PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.

-the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.

-PKI guarantees that the verifying computer of the merchant is secure.

-the acronym PKI stands for public key infrastructure.

PKI guarantees that the verifying computer of the merchant is secure.

All of the following statements about symmetric key cryptography are true EXCEPT:

-the Data Encryption Standard is a symmetric key encryption system.

-symmetric key cryptography is a key element in digital envelopes.

-symmetric key cryptography is computationally slower.

-in symmetric cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.

Symmetric key cryptography is computationally slower.

An intrusion detection system can perform all of the following functions EXCEPT:

-examining network traffic.

-setting off an alarm when suspicious activity is detected.

-checking network traffic to see if it matches certain patterns or preconfigured rules.

-blocking suspicious activity.

Blocking suspicious activity.

Asymmetric key cryptography is also known as:

-secret key cryptography

-public key cryptography

-PGP

-PKI

Public key cryptography

Automatically redirecting a web link to a different address is an example of which of the following?

-DDoS attack.

-pharming.

-social engineering.

-sniffing.

Pharming.

Beebone is an example of which of the following?

-phishing

-botnet

-worm

-hacktivism

Botnet

(T/F) Bluetooth is the primary enabling technology for mobile wallets.

False.

Conficker is an example of a:

-botnet

-virus

-worm

-Trojan horse

Worm

Confidentiality is sometimes confused with:

-integrity

-authenticity

-privacy

-nonrepudiation

Privacy

(T/F) Exploit kits can be purchased by users to protect their computers from malware.

False.

(T/F) FREAK is an example of a software vulnerability.

True.

Face ID is an example of which of the following?

-biometrics

-firewall

-IDS

-encryption

Biometrics

Malware that comes with a downloaded file requested by a user is called a:

-backdoor.

-PUP.

-drive-by download.

-Trojan horse.

Drive-by download.

Mint Bills is an example of which of the following EBPP business models?

-consolidator

-biller-direct

-online banking

-mobile

Consolidator

(T/F) Most computers and mobile devices today have built-in encryption software that users can enable.

Ture.

Next generation firewalls provide all of the following EXCEPT:

-the ability to identify users regardless of the device or IP address.

-the ability to automatically update applications on a client computer with security patches.

-the ability to identify applications regardless of the port, protocol, or security evasion tools used.

-an application-centric approach to firewall control.

The ability to automatically update applications on a client computer with security patches.

PCI-DSS is a standard established by which of the following?

-the banking industry

-the credit card industry

-the retail industry

-the federal government

The credit card industry

PayPal is an example of which of the following types of payment system?

-digital checking system.

-online stored value payment system.

-accumulating balance system.

-digital credit card system.

Online stored value payment system.

(T/F) Phishing attacks rely on browser parasites.

False.

Proxy servers are also known as ______ because they have two network interfaces.

-firewalls

-application gateways

-packet filter

-dual home systems

Dual home systems

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

-adware

a browser parasite

-spyware

-a backdoor

Spyware

(T/F) Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

True.

The Data Encryption Standard uses a(n) _____-bit key.

-8

-56

-256

-512

56

The attack against DYN servers is an example of a(n):

-browser parasite

-SQL injection attack

-MitM attack

-DDoS attack

DDoS attack

(T/F) The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True.

(T/F) There is finite number of Bitcoins that can be created.

True.

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

-an authorization management system.

-a firewall.

-an authorization policy.

-security tokens.

An authorization management system.

(T/F) Typically, the more security measures added to an e-Commerce site, the slower and more difficult it becomes to use.

True.

(T/F) WannaCry is an example of ransomware.

True.

1.在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

2.智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

3.下列哪些是常見的網路犯罪?(複選)

(A) 網路販賣盜版光碟

(B) 網路販賣贓物

(C) 入侵他人網站

正確答案: A B C

4.智慧財產權法想要保護的是下列何者?(單選)

(A) 人類腦力辛勤創作的結晶

5.任何能用來識別、找出或聯絡個人的資料,稱為?(單選)

(D) 個人可識別資訊

6.有關網路禮儀,下列哪些正確?(複選)

(A) 電腦禮儀的基本原則是「尊重」

(C) 轉載別人的文章時,最好註明出處

(D) 最好取得原作者的同意後再進行轉載

正確答案: A C D

7.擅自拷貝網站會員個人資料檔的行為可能觸犯下列哪一項法律?(單選)

(D) 電腦處理個人資料保護法

正確答案: D

8.下列何者不受著作權法的保護?(單選)

複選題 (2 ) 0

(B) 中華民國憲法

(C) 學校的試題

(D) 學校的網頁

正確答案: B C D

9.在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)

(A) 駭客

10.網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關係?(單選)

(C) 網站是否提供線上購物的服務

11.Approximately ________ of U.S. Internet users research online but do not buy.

B) 10%

12.A roughly equal percentage of men and women in the United States use the Internet today.

是非題 (2 ) 2

A.O

13.Online traffic is partially driven by offline brands and traditional shopping.

是非題 (2 ) 2

A.O

14.Which of the following forms of online advertising is expected to grow the most between 2020 and 2024?

D) video

15.Which of the following search engine algorithm updates targets websites that violate Google’s guidelines?

D) Fred

16.Pinterest’s Lens is an example of which of the following?

D) visual search

17.Amazon's Associates program is an example of which of the following?

C) affiliate marketing

18.Ad blockers operate in a manner similar to which of the following?

B) firewalls

19.Which of the following is not a primary source of ad fraud?

D) native advertising that is displayed on a social media site

20.Which of the following statements about CAN-SPAM is not true?

B) CAN-SPAM prohibits unsolicited e-mail (spam).

21.Which of the following statements about Canada's anti-spam law is not true?

B) The law has no impact on companies located within the United States.

22.Which of the following is the most important tool in establishing a relationship with the customer?

A) company website

23.All of the following are "traditional" online marketing tools except:

C) social marketing.

24.All of the following are among those most frequently affected by ad-blocking except:

D) online retailers.

25.The NIKEiD program is an example of which of the following marketing techniques?

A) customer co-production

26.The incremental cost of building the next unit of a good is called the:

C) marginal cost.

27.Which of the following involves getting customers to pass along a company's marketing message to friends, family, and colleagues?

B) viral marketing

28.Group M, the world’s largest advertising buyer, requires which of the following in order for an ad to be considered viewable?

C) 100% of the pixels must be in view for at least one second

29.Which of the following statements about native advertising is not true?

B) Most consumers are able to easily distinguish editorial content from native advertising.

30.Which of the following is an automated, auction-based method for matching demand and supply for online display ads?

C) programmatic advertising

31.Research has found that most of the ad impressions served across display advertising platforms are not viewable.

是非題 (2 ) 2

A.O

32.A significant percentage of online ad impressions served are not actually viewed or even viewable.

是非題 (2 ) 2

A.O

33.Lead generation marketing firms specialize in inbound marketing.

是非題 (2 ) 2

A.O

34.The concept of "customer satisfaction" is broader than the concept of "customer experience."

是非題 (2 ) 2

B.X

35.Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.

是非題 (2 ) 2

A.O

36.Which of the following features of e-commerce technology decreases the cost of delivering marketing messages and receiving feedback from users?

B) universal standards

37.All of the following statements about cookies are true except:

B) the data typically stored in cookies includes a unique ID and e-mail address.

38.________ is an open source database that can store and analyze both structured and unstructured data.

C) Hadoop

39.A ________ is a repository of customer information that records all contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

B) CRM system

40.The marketing technique known as ________ involves merchants offering many products for which there is little demand.

A) long tail marketing

41.Transaction logs are built into client software and not the web server software.

是非題 (2 ) 2

B.X

42.Regular in-app cookies can be shared between apps.

是非題 (2 ) 2

B.X

43.Cross-platform attribution refers to:

A) how to assign credit to different marketing initiatives.

44.VTR measures the ________ response rate to an ad.

D) 30-day

45.What kinds of ads have the lowest CTR?

D) banner display ads

46.Which of the following measures the average length of stay at a website?

B) stickiness

47.View-to-cart ratio is a measure of the:

B) percentage of views that lead to an add-to-cart action.

48.Which of the following measures the ratio of items purchased to product views?

C) browse-to-buy ratio

49.Which of the following is the most meaningful metric for video ads?

C) completion rate

50.The average abandonment rate is highest for shopping carts accessed via smartphones.

是非題 (2 ) 2

B.X

1.網路蟑螂行為主要侵犯哪一種權利?[單選]

D. 網域名稱權

2.關於專利權的特性,下列敘述何者錯誤?[單選]

A. 識別性

3.網路蟑螂行為主要侵犯哪一種權利?[單選]

D. 網域名稱權

4.有關專利權的敘述,下列何者正確?[單選]

C. 專利權只限於申請的國家,出了國境就不受保護

5.如果要在自己的網頁引用他人的文章,必須得到原作者同意,以免侵犯到   下列何者?[單選]

D. 著作權

6.在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

7.智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

正確答案: B C D

8.下列哪些是常見的網路犯罪?(複選)

(A) 網路販賣盜版光碟

(B) 網路販賣贓物

(C) 入侵他人網站

正確答案: A B C

9.智慧財產權法想要保護的是下列何者?(單選)

(A) 人類腦力辛勤創作的結晶

10.任何能用來識別、找出或聯絡個人的資料,稱為?(單選)

(D) 個人可識別資訊

11.有關網路禮儀,下列哪些正確?(複選) 回答錯誤

複選題 (2 ) 0

(A) 電腦禮儀的基本原則是「尊重」

(C) 轉載別人的文章時,最好註明出處

(D) 最好取得原作者的同意後再進行轉載

正確答案: A C D

12.擅自拷貝網站會員個人資料檔的行為可能觸犯下列哪一項法律?(單選)

(D) 電腦處理個人資料保護法

13.下列何者不受著作權法的保護?(單選)

(B) 中華民國憲法

(C) 學校的試題

(D) 學校的網頁

正確答案: B C D

14.網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關係?(單選)

(C) 網站是否提供線上購物的服務

15.What was the approximate Internet penetration rate in 2019 for individuals that have attained less than a high-school education?

C) 71%

16.Approximately ________ of U.S. Internet users research online but do not buy.

B) 10%

17.Research shows the two key factors shaping the decision to purchase online are utility and trust.

是非題 (2 ) 2

A.O

18.Consumers choose the online channel primarily due to social media influence.

是非題 (2 ) 2

B.X

19.Online traffic is partially driven by offline brands and traditional shopping.

是非題 (2 ) 2

A.O

20.Which of the following online advertising formats attracted the least amount of spending in 2020?

D) e-mail

21.Which of the following search engine algorithm updates targets websites that violate Google’s guidelines?

D) Fred

22.Which of the following is a Google algorithm update related to local search?

D) Possum

23.Amazon's Associates program is an example of which of the following?

C) affiliate marketing

24.Ad blockers operate in a manner similar to which of the following?

B) firewalls

25.The percentage of all e-mail that is spam averaged around ________ in 2020.

A) 55%

26.Which of the following statements about Canada's anti-spam law is not true?

B) The law has no impact on companies located within the United States.

27.All of the following are among those most frequently affected by ad-blocking except:

D) online retailers.

28.The incremental cost of building the next unit of a good is called the:

C) marginal cost.

29.Which of the following statements about a free pricing strategy is not true?

B) The free pricing strategy was born in the early days of the Web.

30.Group M, the world’s largest advertising buyer, requires which of the following in order for an ad to be considered viewable?

C) 100% of the pixels must be in view for at least one second

31.Which of the following industries accounted for the highest percentage of spending on online advertising in 2019?

B) retail

32.Which of the following statements about native advertising is not true?

B) Most consumers are able to easily distinguish editorial content from native advertising.

33.Research has found that most of the ad impressions served across display advertising platforms are not viewable.

是非題 (2 ) 2

A.O

34.The highest amount of online advertising spending is for online video ads.

是非題 (2 ) 2

B.X

35.Lead generation marketing firms specialize in inbound marketing.

是非題 (2 ) 2

A.O

36.The concept of "customer satisfaction" is broader than the concept of "customer experience."

是非題 (2 ) 2

B.X

37.Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.

是非題 (2 ) 2

A.O

38.Which of the following is an open source software framework used to collect and analyze a company's big data?

B) Hadoop

39.Which of the following statements about the Internet's impact on marketing is not true?

B) The Internet has decreased the impact of brands.

40.Which of the following features of e-commerce technology enables marketers to engage customers in a dialog and dynamically adjust the experience to the consumer?

D) interactivity

41.Which of the following features of e-commerce technology decreases the cost of delivering marketing messages and receiving feedback from users? 回答錯誤

B) universal standards

42.A web beacon is:

D) a tiny graphics file embedded in an e-mail or web page.

43.The marketing technique known as ________ involves merchants offering many products for which there is little demand.

A) long tail marketing

44.Transaction logs are built into client software and not the web server software.

是非題 (2 ) 2

B.X

45.VTR measures the ________ response rate to an ad.

D) 30-day

46.Uber has been criticized for using which of the following?

C) surge pricing

47.Which of the following measures the average length of stay at a website?

B) stickiness

48.Acquisition rate is a measure of the:

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

49.Recency refers to the:

B) time elapsed since the last visit made by a customer.

50.Which of the following measures the percentage of times an ad is clicked?

是非題 (2 ) 2

B) CTR

網路行銷與經營管理

評量題庫與解答

選擇題

1. 1)電子憑證是? (1) 網路購物的身分證明 (2) 軟體的序號 (3) 應用軟體的開發

(4) 作業系統中使用者的帳號和密碼

2. 1)下列何者不是電子付款的安全保密要求? (1) 本人 (2) 身分認證 (3) 完整性

(4) 防止拒付

3. 4)下列何者不屬於網路信用卡交易的參與者? (1) 持卡者 (2) 商家 (3) 發卡銀

(4) 政府

4. 2)下列何者不屬於電子現金的特性? (1) 不易被複製或篡改 (2) 不可轉換性(3)

具匿名性 (4) 不可回溯性

5. 4)在 SET 機制中,除認證授權者、商家 (特約商店)、持卡者外,還有哪個重

要個體? (1) 發卡者 (2) 取得者(3) 信用卡品牌 (4) 付款閘道

6. 4)關於電子付款機制,下列何者有誤? (1) 數位簽章具有交易者身分的識別 (2)

防火牆是針對資料庫的保護而設計 (3) 電子簽章具有不可否認性(4) 電子錢包一般

適合處理大額付款

7. 4)關於 SET 的敘述,下列何者有誤? (1) 可確認在 Internet 線上交易,每個節

點之訊息傳遞都是安全的(2) 可確保顧客資料輸入的隱密性(3) 可確認商店及持卡

人雙方身分的正確性(4) 確認在 SET 通訊協定中,商店可看到顧客端之個人資

訊,以確保交易進行

8. 2)「只要透過個人電腦,結合『晶片金融卡』及『晶片卡讀卡機』連結至銀行

網站,即可隨時隨地在網際網路上享有銀行所提供之 ATM 金融服務。」這是

指? (1) iCash (2) Web ATM(3) Mondex (4) MasterCard

9. 4)電子現金的哪一個特性,可經由不同的存、提款設備,將電子現金儲存在

不同的設備中? (1) 匿名性 (2) 可分性(3) 離線付款 (4) 可轉換性

11. 1B2B 電子商務付款較常使用下列哪種方式? (1) EFT (2) SET (3) VAN (4)

EDI

12. 1)由字義上來看,「商務」的目的就是希望對內降低營運成本、提高作業效率,對外

吸引更多的顧客上門,以增加企業的利潤;而「電子」則是指資訊科技,主要是:

(1)Internet Web (2)Internet HTML (3)HTML JAVA (4)Web Database 的技術。

13. 4)網路拍賣是屬於何種類型的電子商務?(1)B2B (2)B2C (3)C2B (4)C2C

14. 2)關於電子商務三流的敘述何者錯誤?(1)EC 三流是指金流、物流與資訊流 (2)「物

流」是指產品從製造商移轉到經銷商、消費者的整個流通過程,在 EC 中是核心部分 (3)

產品規格、詢報價、訂單、發票等企業間各種資料的交換是屬於「資訊流」的範疇 (4)

款、與金融機構連線、信用查詢、交易安全認證機制等是屬於「金流」的範疇。

15. 4)哪些項目可能是「虛擬社群網站」的獲利模式?(1)會員費、使用費 (2)廣告收益、

交易佣金 (3)出售會員資料 (4)以上皆是。

16. 3)企業網站系統基礎設施不包含以下哪個項目?(1)網站伺服器 (2)資料庫系統伺服器

(3)網誌(Blog)系統伺服器 (4)應用系統伺服器。

17. 3)網域名稱的命名原則有一定的規範,想要使用.com.tw 的網址,其申請對象必須是

從事商業活動的:(1)個人 (2)非營利組織 (3)公司行號 (4)產業公協會。

18. 1)要架設一個網路商店可以採用下列哪四種方式:(1)租用網路商店、租用虛擬主

機、主機代管、自行架設 (2)租用網路商店、租用虛擬主機、主機自管、自行架設 (3)

用網路商店、租用實體主機、主機代管、自行架設 (4)租用實體店面、租用虛擬主機、主

機代管、自行架設。

19. 1)有關商品圖片的使用,何者敘述錯誤?(1)商品圖片可以用中文命名,以方便管理

(2)不可以使用 bmp 格式的圖片來做為商品圖片 (3)商品圖片的名稱為英文時,中間不可

以出現空格 (4)不可以直接使用放置在桌面上的圖片檔案來做為商品圖片。

20. 3)對電子商務安全機制的描述,下列何者不正確? (1) 認證中心是整個電子商

務的核心關鍵(2) 金鑰有公開金鑰 (Public Key) 與私有金鑰 (Private Key) 兩種(3)

所謂電子簽章就是把手寫筆跡數位化(4) 加密方式目前大多採用 DES RSA 演算

21. 1)防火牆通常建置在哪裡? (1) 私用網路與公用網路連接點 (2) 公用網路與公

用網路連接點 (3) 私用網路與私用網路連接點 (4) 網際網路與公用網路連接點

22. 2)網域名稱中,代表商業機構或公司的是下列何者? (1) .net (2) .com (3) .org

(4) .edu

23. 2)下列哪一種電子商務應用技術的發展時間最早? (1) HTML (2) EDI (3) Java

(4) XML

24. 4)何者不屬於電子商務後端資料庫系統? (1) Oracle (2) MySQL (3) MS SQL (4)

Linux

25. 1Apache 是屬於? (1) 網頁伺服器 (2) 資料庫伺服器 (3) FTP 伺服器 (4) SMTP

伺服器

26. 2)下列哪一種網路寬頻技術主要利用「第四台電視纜線」做為傳輸媒介? (1)

ADSL (Asymmetric Digital Subscriber Line) (2) Cable Modem (3) Direct PC (4) FTTH

(Fiber To The Home)

27. 4)下列哪一種網路寬頻技術主要利用「光纖」做為傳輸媒介? (1) ADSL

(Asymmetric Digital Subscriber Line) (2) Cable Modem (3) Direct PC (4) FTTH (Fiber

To The Home)

28. 3)下列哪一種網路寬頻技術主要利用「衛星」做為傳輸媒介? (1) ADSL

(Asymmetric Digital Subscriber Line) (2) Cable Modem (3) Direct PC (4) FTTH (Fiber

To The Home)

4)網際網路服務提供者 (ISP) 最主要提供下列何種服務? (1) 線上購物 (2) 線上團

(3) 線上拍賣 (4) 連線服務

適中

29. 3HTTP 的預設連接埠 (Port) 之值為何? (1) 21 (2) 25 (3) 80 (4) 143

30. 1)下列何者不是正確的 IP 位址? (1) 257.25.26.22 (2) 101.101.101.101 (3)

168.95.1.1 (4) 127.0.0.1

31. 3)瀏覽器是用何種通訊協定與網頁伺服器進行溝通? (1) SMTP (2) FTP (3)

HTTP (4) HTML

32. 2)一般靜態網頁設計所用的語法為下列何者? (1) HTTP (2) HTML (3) XML (4)

SXML

33. 2)目前大部分電子郵件「收信」時所使用的通訊協定為下列何者? (1) SNMP

(2) POP3 (3) HTTP (4) SMTP

34. 4)目前大部分電子郵件傳送附件檔案時,最常用的編碼方式為下列何者? (1)

ZIP (2) SMTP (3) POP3 (4) MIME

35. 4)目前在網路上傳輸最佔用頻寬的是下列哪一種資料類型? (1) 文字檔 (2)

圖形檔 (3) 音樂檔 (4) 視訊檔

36. 4)下列哪一個程式語言比較適合用來撰寫直接產出 HTML 網頁的應用程式?

(1) C (2) Basic (3) Java (4) PHP

37. 1)下列哪一項網頁程式的功能不是在瀏覽器端直接執行? (1) 執行 CGI 程式 (2)

執行 JavaScript 的程式 (3) 顯示 HTML 文件中的圖形 (4) 傳遞使用者輸入的資料

38. 2)下列何者不是網頁上使用的語言? (1) HTML (2) ML(3) WML (4) XML

39. 4)網路蟑螂的行為主要侵犯哪一種權利? (1) 隱私權 (2) 著作權 (3) 專利權 (4)

網域名稱權

40. 1)智慧財產權法想要保護的是下列何者? (1) 人類腦力辛勤創作的結晶 (2)

業機密 (3) 商業利益 (4) 一般人知的權利

41. 4)擅自拷貝網站會員個人資料檔的行為可能觸犯下列哪一項法律? (1) 商標法

(2) 隱私權法 (3) 消費者保護法 (4) 電腦處理個人資料保護法

42. 2)下列何者不受著作權法的保護? (1) 三歲小孩的畫作 (2) 中華民國憲法 (3)

學校的試題 (4) 學校的網頁

43. 1)在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為? (1)

(2) 網路專家 (3) 釣客 (4) 網路作家

44. 3)網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關

係? (1) 可否應當事人的要求,停用該當事人的會員資料 (2) 網站是否標示個人

資料的使用目的 (3) 網站是否提供線上購物的服務 (4) 網站未經本人同意,是否

會將個人資料轉讓給第三者

45. 4)行動設備包括下列何者? (1) 智慧型手機 (2) PDA (3) 小筆電 (4) 以上皆是

46. 4)行動商務中的「行動」是指? (1) 行動設備 (2) 行動通訊(3) 無線網路 (4)

上皆是

47. 4)下列何者為行動商務模式的特性? (1) 易變性 (2) 不可儲存性 (3) 分享性 (4)

互動性

48. 3)下列何者不是行動商務的應用? (1) 簡訊應用 (2) 行動購物 (3) 拍照 (4) 行動

遊戲

49. 4)下列何者為行動商務的阻礙? (1) 病毒威脅 (2) 資料外洩 (3) 頻寬不足 (4)

上皆是

50. 3)下列何者不是行動商務的成功因素? (1) 便利性 (2) 使用性(3) 炫耀性 (4)

富性

51. 4)行動商務的效益包含下列何者? (1) 傳輸無線化 (2) 連線快速化 (3) 追蹤便

捷化 (4) 以上皆是

52. 1)行動通訊的發展共有幾個階段? (1) 六個 (2) 五個(3) 四個 (4) 三個

53. 2)第 1 代行動通訊為下列何者? (1) 數位式 (2) 類比式 (3) 高速封包存取系統

(4) 分碼多重存取系統

54. 2)第 2.5 代行動通訊其傳輸速度可達多少? (1) 56 Kbps (2) 150 Kbps (3) 256

Kbps (4) 512 Kbps

55. 4)第 3 代行動通訊其傳輸速度可達多少? (1) 1 M (2) 512 Kbps (3) 256 Kbps (4)

2 M

56. 4)無線網路的技術規格是以下列何者為主? (1) 802.12 (2) 802.10 (3) 801.11 (4)

802.11

57. 3)下列何者為 802.11 b 的別稱? (1) RFID (2) WiMAX (3) Wi-Fi (4) Bluetooth

58. 3WiMAX 為下列何者的應用範疇之一? (1) 3 GS (2) 2 G (3) 4 G (4) 3 G

59. 2WiMAX 傳遞距離可以長達多少? (1) 500 公尺 (2) 50 公里(3) 10 公里 (4) 100

公里

60. 4)藍芽的傳遞距離大約為多少? (1) 1 公尺內 (2) 1 公里內 (3) 500 公尺內 (4) 10

公尺內

61. 4)無線射頻辨識系統 (RFID) 包括以下何者? (1) 電子標籤 (2) 讀取器 (3) 天線

(4) 以上皆是

62. 2)「訂單處理」屬於網路商店運作的:(1)前台作業 (2)後台作業 (3)準備作業 (4)服務作

項目。

63. 3)公司組織型態不包括:(1)獨資 (2)合夥 (3)加盟連鎖 (4)股份有限公司。

64. 4)創業的資金來源不包含以下哪個項目?(1)個人出資 (2)他人出資 (3)銀行貸款 (4)

票融資。

65. 3)網友註冊新帳號時,密碼不得少於幾個字?(1)三個字 (2)四個字 (3)五個字 (4)六個

字。

66. 2(1)會員登入 (2)管理者登入 (3)管理者註冊 (4)管理者註冊 是使用「後台管理工具」

時必經的身份辨識步驟,後台管理是經營網路商店非常重要的工作。

67. 3)管理帳號頁面的:(1)管理員登入 (2)管理次數 (3)登入次數 (4)累積次數 是顯示管理

者操作「後台管理工具」的總次數,請留意此數字與您使用的次數是否相符,如果大過

您使用的次數太多,可能密碼已遭他人盜用。

68. 3)如果要讓顧客可以切換至不同語系以觀看商品,在輸入「新增商品」時,哪兩個

項目一定要輸入不同語系的資料?(1)品名、商品圖片 (2)商品廠商、品名 (3)品名、商品

說明 (4)商品圖片、商品說明。

69. 4M 化系統的可分為哪些? (1) 離線型、線上型、隨機型 (2) 離線型、簡易

型、搭配型 (3) 線上型、隨機型、離線型 (4) 離線型、線上型、搭配型

70. 1M 化系統的過程中常會產生一些問題包括下列哪些? (1) 企業面、員工面、

系統面 (2) 企業面、顧客面、服務面 (3) 業務面、員工面、系統面 (4) 客訴面、服

務面、業務面

71. 3M 化系統正確的導入步驟為下列何者? (1) 定義 M 化需求選擇系統廠商

→建立控制機制→進行內部溝通與訓練教育 (2) 選擇系統廠商建立控制機制

定義 M 化需求進行內部溝通與訓練教育 (3) 定義 M 化需求選擇系統廠商

進行內部溝通與訓練教育→建立控制機制 (4) 選擇系統廠商進行內部溝通與訓

練教育→定義 M 化需求建立控制機制

72. 4)下列何者是手機 3.75 G 通訊協定技術? (1) WiMAX (Worldwide

Interoperability for Microwave Access) (2) GPRS (General Packet Radio Service)

73. 3HSDPA (High Speed Downlink Packet Access) (4) HSUPA (High-Speed Uplink

Packet Access)

74. 3WiMAX 無線通訊屬於下列哪一種標準? (1) IEEE 802.11 (2) IEEE 802.15

(3) IEEE 802.16 (4) IEEE 802.20

75. 3)如果 Windows 系統已經啟動了 IIS 服務,將會造成後續無法正常啟動 Apache

Server 的狀況。其主要原因是兩者都會佔用到 TCP/IP 網路協定的:(1)21 (2)25 (3)80

(4)101 通訊埠,所以你必須先把 IIS 的服務停止才能正常啟動 Apache

76. 2)關於安裝 AppServ 軟體的敘述何者正確?(1)安裝時若使用預設的字集(如 latin1

而不變更,則網站一樣會顯示繁體中文 (2)要將 Server Name 的名稱從 localhost 改為

Domain name IP address 才能讓其他人看到你的網站 (3)如果沒有申請 Domain name

不能架設網站 (4)Apache 網站的 Port 21

77. 2)在 Windows XP 的環境下要查出 PC IP Address 可以使用下列那個指令:

(1)ipdisplay (2)ipconfig (3)netconfig (4)netstat

78. 1AppServ 軟體的安裝包含那些項目?(1)ApacheMySQLPHP (2)ApacheSQL

ServerPHP (3)ApacheMySQLJSP (4)ApacheMySQLosCommerce

79. 4AppServ 安裝完成啟動後會在螢幕右下角出現紅綠燈(亮綠燈)的小圖示,表示何

種功能已執行?(1)Apache Server (2)Web Server (3)SMTP Server (4)MySQL Server

80. 1)在安裝 osCommerce PC 上,想要執行「後台管理」的功能,必須在瀏覽器的

「網址」處鍵入:(1)http://localhost/catalog/admin (2)http://localhost/catalog

(3)http://localhost/admin (4)http://localhost/catalog/manage

81. 3)使用本地主機安裝時,前台 Logo 的位置在:(1)C:/AppServ/www/images

(2)C:/AppServ/www/catalog/images/logo (3)C:/AppServ/www/catalog/images

(4)C:/AppServ/www/catalog/admin/images

82. 4)使用本地主機安裝時,後台 Logo 的位置在:(1)C:/AppServ/www/admin/images

(2)C:/AppServ/www/catalog/images/logo (3)C:/AppServ/www/catalog/images

(4)C:/AppServ/www/catalog/admin/images

簡答題

1. 請說明按照維護方式的差異,可以區分為哪幾種架設網站的方式?

答案:租用網路商店、租用虛擬主機、主機代管、自行架設。

2. 採用租用網路商店開店有何優點?

答案:不必處理技術問題,只要處理商店管理的部分,也能快速開立網路商店。

3. 採用主機代管方式架設網站,其優點為何?

答案:因為是直接使用 ISP 機房的網路,所以可以獲得較大的網路頻寬。

4. 說明何謂虛擬主機?

答案:廠商提供一個分組的網路主機空間,因為可以設立獨立的網路位址,以及獨立的

硬碟空間,所以運作上跟租用了一台網路上的主機相似,因此稱之為虛擬主機。

5. 採用自行架設的方式建置網站,有哪些項目是要由自己來維護的?

答案:包括商店、網站、主機、線路等所有項目都要由自己維護。

6. 請說明架設網站方式的選擇,可以按照哪幾個方向來考量?

答案:整體成本費用、服務品質的要求、管理的方便性、資料的安全性。

7. Kalakota Whinston 等學者對電子商務所下的定義為何?

答案:Kalakota Whinston1997)認為,所謂電子商務(EC)是指利用網際網路進行

購買、銷售或交換產品與服務。功能在降低成本、縮短產品的生命週期、加速得到顧客

的回應,及增加服務的品質。

8. 如果根據 EC 買賣雙方的參與對象來區分,EC 可包含哪四大基本類型?

答案:B2C 企業對企業、B2C 企業對消費者、C2B 消費者對企業以及 C2C 消費者對消費

者。

9. 什麼是 Intranet

答案:Intranet(企業內部網路)指的是:企業內部利用 Internet Web 的技術,設置於

防火牆內,支援內部員工知識與資訊的存取、傳遞與內部溝通協調合作的一個企業內部

網路系統。

10. 什麼是 Extranet

答案:Extranet(企業間網路或商際網路)指的是:企業利用 Internet 的技術來與外部相

關的供應商、顧客、策略夥伴相連結,以提升彼此之間的資訊分享與協同合作績效的網

路系統。

11. 什麼是經營模式?

答案:基本上,所謂經營模式是指一個組織在複雜而競爭劇烈的環境中,企圖塑造自己

的差異化優勢。簡單的說就是:「一個企業為了獲利、成長與存活,其所設計的一組市場

定位、產品提供、資源配置與財務結構的架構藍圖」

12. 線上購物的經營模式有哪些項目?

答案:線上購物網站的經營模式:

(1)提供線上直接訂購商品、(2)提供訂貨及付款方式資訊、(3)提供商品一次購足的服務、

(4)提供實體產品的線上展示、(5)利用網頁橫幅廣告方式宣傳、(6)掌握顧客上網與交易情

形。

13. 網路拍賣的六步驟為哪些項目?

答案:(1)選擇拍賣網站、(2)註冊成為會員、(3)賣家登錄「信用卡資料」確認身份、(4)

刊登物品、(5)開始進行拍賣交易、(6)金流與物流作業。

14. 網路商店開店八步驟為何?

答案:(1)辦理網域名稱申請、(2)決定網路商店架設方式、(3)採購電腦軟硬體設施、(4)

設計或選用網路商店軟體系統、(5)規劃後台作業程序、(6)連線測試、(7)至搜尋引擎做網

站登錄、(8)正式營運與宣傳。

15. 對創業者而言,營運計畫書有哪些功能?

答案:檢視創意的可行性、釐清事業藍圖、認清經營模式、協助募集資金。

16. 一份完整供網路創業時使用的營運計畫書,必須包括哪四個主要的部分?

答案:創業類型、經營管理架構、機會的評估及利用、資源的運用及配置。

17. 由外而內說明架設網站的設備有哪幾種?

答案:網際網路線路、ATU-R、頻寬分享器、集線器/交換器、個人電腦。

18. 請從網站的角度來說明下載及上傳頻寬。

答案:網站的下載頻寬是指從客戶端傳遞資料到網站的頻寬;上傳頻寬則是由網站傳遞

資料到客戶端的頻寬。

19. 說明租用網際網路線路時的固定及浮動 IP 位址分別指什麼?

答案:固定 IP 位址是指每次線路與 ISP 廠商連結時都會被指定同一個 IP 位址;浮動 IP

位址則是沒有分配固定的 IP 位址,每次與 ISP 連線都重新分配一個目前閒置的 IP

址。

20. 租用 ADSL 線路時,在 ATU-R 前端接的分歧器作用為何?

答案:分歧器的作用為分離低頻的電話訊號與高頻的網路訊號,加掛分歧器才能讓上網

與電話同時使用。

21. 頻寬分享器可以將單機型的 ADSL 線路提供給多台電腦上網,其運作原理為何?

答案:頻寬分享器主要運作原理是利用網路位址轉換(NAT)技術,將多個私有 IP 位址對

應到公共正式的 IP 位址,因此只要有一個公共正式 IP 位址,都可以分享給多個私有 IP

使用,讓多台電腦透過 IP 分享器,以同一組公共正式 IP 上網。

22. 網站運作時,電腦主機中會持續運轉的機械式動作零件包含哪些?

答案:硬碟、電源供應器、散熱風扇。

23. 建置網站常用的描述語言,請說明其執行的方式。

答案:網站的描述語言一般是由網站系統以直譯的方式來執行,也就是以原始程式直接

執行,因此放在網站的執行檔都是原始的程式檔。

24. 一般國內的網域名稱,由右至左各段文字所代表的意義為何?

答案:國碼、類別碼、網域、主機名

25. 國內網域名稱的管理及申請單位為何?

答案:管理單位為台灣網路資訊中心 TW-NIC,申請單位為台灣網路資訊中心授權的網

域服務代理商,如:SEED NetPCHomeHiNet、台灣固網、Yahoo 奇摩等。

26. IP 位址與網域名稱對應的數量原則為何?

答案:一個網域名稱只能對應到一個 IP 位址,一個 IP 位址則可以對應到多個網域名

稱。

適中

27. 目前虛擬主機提供的主機控制有哪幾種?

答案:主要有兩種,一種是支援直接以 telnet ssh 等協定軟體來與主機連結操作,另一

種則是透過 Web 介面提供主機的控制。

28. 帳號新增已完成,但網路商店無法寄出確認信函的原因為何?

答案:造成的原因是後台管理工具【系統管理→系統設定→電子郵件選項→傳送電子郵

件】的內容設定為 true,但伺服器電腦又沒有設定送件電子郵件伺服器(SMTP)的緣

故。

29. 請問「商品評論」的用途為何?要輸入的內容有三個項目?

答案:「商品評論」可以顯示其他顧客對此商品的建議。輸入的內容有:評論人、商品評

論及評等三項。

30. 商品「評等」分成幾個等級?

答案:「評等」由「差」到「好」分五個等級,由會員自由評分。

31. 撰寫商品評論時要注意什麼事情?

答案:評論的字數不可少於 25 個字。

32. 請問「購物車管理」的用途為何?

答案:「購物車管理」讓顧客在進入「結帳作業」前隨時可以查看目前已挑選的商品數量

與總金額等資訊,就如同大賣場的手推車功能一樣,不過網路商店的購物車是虛擬的,

由電腦程式組合而成。

33. 「購物車管理」的使用時機有哪兩項?

答案:(1)顧客查看購物車的內容時;(2)顧客修改購物車內已挑選的商品時。

34. 「購物車管理」的功能有哪四項?

答案:(1)移除商品;(2)修改數量;(3)自動計算總計與小計;(4)繼續購物。

35. 「出貨資訊」中的「送貨地址」是否一定要由顧客自己重新填寫?

答案:送貨地址預設為會員的中文姓名及地址,如送貨地址另有他處,可按「變更出貨

地址」修改之。

36. 「確認訂單-我準備好要買了」會顯示本次線上購物的訂單內容,請問「訂單內容」包

括哪六個項目?

答案:出貨地址、出貨方式、商品、帳單資訊、付款資訊、訂單意見欄。

37. 「我的帳號」內容包括哪些項目?

答案:(1)簡述:顯示全部訂單;(2)我的帳號:檢視或修改帳號資訊、檢視或修改我的通

訊錄、變更帳號密碼;(3)我的訂單:檢視我的訂單;(4)E-Mail 通知:訂閱或取消訂閱電

子信、檢視或修改商品通知清單。

38. 請設定前台客戶註冊畫面,在客戶註冊時必須填寫生日資料。

答案:登入後台,選擇選單 「系統設定」「客戶帳號資訊」,將「生日」參數設定為

true

39. 請設定前台商品列表畫面,依順序顯示商品圖片、品名、型號、價格、馬上買等項目。

答案:登入後台,選擇選單 「系統設定」「商品列表」,分別設定「顯示商品圖

片」、「顯示品名」、「顯示商品型號」、「顯示商品價格」、「顯示馬上買」等參數為非零的

數字,並將其他參數設定為零。

40. 請設定前台點選某商品分類後的商品列表畫面,每頁顯示 10 個商品。

答案:登入後台,選擇選單 「系統設定」「最大值設定」,將「搜尋結果筆數」參數

設定為 10

41. 「商品上架」的使用時機為何?

答案:(1)網路商店新店開張,管理員要將銷售之商品放入商品目錄時;(2)要設定商品主

分類目錄或次分類目錄時;(3)有新進的商品需要放入商品目錄時。

42. 新增「次分類目錄」的使用時機為何?

答案:是在「主分類目錄」之下,還可以再細分出其他項目時才使用。

43. 輸入「新增商品」時,能否在「商品說明」的文字方塊內加入 HTML 格式的內容?

答案:可以。

44. 「商品移動」的使用時機為何?

答案:假如新增商品之後由於商品分類的調整,必須將商品從原來的商品分類目錄搬移

到新的商品分類時,就可以使用「商品移動」的功能來處理。

45. 為什麼需要讓商品在多組商品分類中出現?

答案:商品分類的主要目的是讓顧客能夠找到所要購買的商品,因此商品分類命名必須

符合顧客對商品分類的習慣,才能方便顧客儘快找到所要商品完成商品的訂購。但有時

候會遇到不同顧客對商品的分類不一致的情況,比如說「蕃茄」這項商品是屬於蔬菜還

是水果?每位顧客習慣分法可能有所不同。在虛擬的網路商店只要增加蕃茄商品與蔬菜

分類跟水果分類的連結就可以,這也是為什麼有需要讓商品在多組商品分類中出現的原

因。

46. 網路商店進貨有哪兩種策略可應用?各項策略需要注意何種條件?

答案:進貨有「大量進貨」與「零庫存接單」兩種策略應用。「大量進貨」可以降低進貨

的價格,但要考慮供應商提供的條件、商品的保存特性以及實際的銷貨情況。「零庫存接

單」因為沒有預先進貨的庫存,所以要注意到訂單履行品質以及商品供應特性。

47. 請問特價商品的使用時機為何?

答案:網路商店店主要以「折扣」或「低價」的方式促銷商品時使用。

48. 設定「特價商品」時需要輸入哪三項資料?

答案:商品、特價及特價結束日。

49. 某件商品原價為 100 元,如果將它設定成特價商品時,在特價欄內直接輸入 20%,請問

該特價商品的售價會是多少元?

答案:80 元。

50. 「特價結束日」若為空白,表示何種意義?

答案:表示特價沒有結束日期,一直特價到將該特價商品刪除為止。

51. 請說明網路商店管理者,在選擇合適的付款方式時,可以考慮付款方式的哪幾種特性?

答案:付款時間點、手續費負擔、延遲現金支付。

52. 你認為首次交易的客戶,對於付款時間點的主要考量會是什麼?

答案:在首次交易的情況下,因為客戶無法確認商家是否值得信賴,有可能不願意使用

出貨前付款的付款方式。首次交易的客戶可能會對於收到貨品當時或收到商品之後才付

款的方式比較安心。

53. 你認為使用信用卡付款對高單價商品的商店比較有助益;還是對低單價商品的商店比較

有助益?為什麼?

答案:對高單價商品的商店比較有助益。因為客戶使用信用卡付款可以延遲現金支付,

會提高客戶對購買高單價商品的意願。

54. 付款模組安裝後的設定中,有一個顯示順序欄位,說明這個設定欄位的作用。

答案:顯示順序欄位是設定該付款模組,在結帳畫面中所有付款方式之間的顯示順序,

數字越小的會在越前面。

55. 說明網路商店管理者,在選擇出貨方式時,可以考慮出貨方式的哪幾種特性?

答案:運送商品限制、運送地區限制、運送時間、貨運成本負擔、理賠金額。

56. 各類型的運送方式對於運送商品內容是否會有限制?請舉例說明。

答案:部分的運送方式對於運送貨品的內容會有限制,比如郵局的規定便不能寄送液體

或易碎的玻璃製品。

57. 貨運業者對於運送商品遺失或損壞,是否都會照價賠償?這點對於出貨方式的考量有何

影響?

答案:貨運業者都會定出商品理賠的上限金額,因此網路商店管理者必須考量萬一商品

有所損失,所獲得理賠的金額與商品本身價值的比例。假如銷售的是高價的商品,甚至

要考慮使用專門的運送方式或由商家自行運送。

58. 完整的顧客訂貨所需要的程序,包括了哪些作業項目?

答案:前端的訂單輸入、訂單處理、揀貨與包裝、送貨以及處理顧客退貨事宜。

59. 「訂單處理」是在訂單輸入到發出通知至倉儲之間的一連串作業,這些作業包括了哪三

個項目?

答案:(1)訂單批次作業;(2)揀貨及送貨作業之指派;(3)訂單處理進度報告以及訂單改

變。

60. 「已被瀏覽商品」所顯示的結果可以供 EC 經營者做為哪些後續應用?

答案:(1)調整「最佳被觀看商品」網頁的擺放位置順序,讓點選次數高者更容易被會員

看到。(2)比對「已被瀏覽商品」次數高者與「已賣商品」數量大者之間是否有關聯,原

因為何。(3)檢討某些商品從未被瀏覽的原因並考慮下架。

61. 「已賣商品」所顯示的結果可以供 EC 經營者做為哪些後續應用?

答案:(1)找出店內熱賣的人氣商品有那些?這些商品為什麼受歡迎?(2)瞭解商品的銷售

狀況以便備貨,並將人氣商品的庫存量適度提高。(3)比對「已被瀏覽商品」次數高者與

「已賣商品」數量大者之間是否有關聯,原因為何。

62. 「客戶購物排行榜」所顯示的結果可以供 EC 經營者做為哪些後續應用?

答案:(1)找出店裡的重要顧客,對他們加強個別化服務(譬如增加折扣率、提供客製化

的商品…等)。(2)比對「重要顧客」所買的商品是哪些,可以做為進行後續的交叉銷

售。

63. 假設在月初 1 號做資料庫備份,有某位客戶 A 在該月 10 號註冊新資料,而在該月 20

時發生客戶資料表錯誤,請問你用該月 1 號的備份資料還原資料庫後,A 客戶的註冊資

料是否還在資料庫中?為什麼?

答案:A 客戶的註冊資料不在資料庫中。

因為資料還原時間差的問題,在 1 號備份的資料裡面並沒有 A 客戶的資料,而當資料庫

發生錯誤以 1 號備份的資料還原後,資料庫便還原到月初 1 號時的資料內容,因此沒有

A 客戶的資料。

64. 什麼是「直效行銷」?直效行銷與「資料庫行銷」的關係為何?

答案:(1)「直效行銷」是指審慎地選定個別目標顧客,然後與其進行直接溝通,期望能

獲得他們立即的回應並藉此培養可長可久的顧客關係。(2)「資料庫行銷」是一種新的直

效行銷模式。

65. 請問學者 Kotler 對「資料庫行銷」下的定義為何?

答案:資料庫行銷係指維持與建立顧客長久關係的過程,並且使用顧客資料庫與其他資

料庫(有關產品、供應商及中間商等的資料),以達到接觸顧客且與其交易的目的。

66. 企業進行資料庫行銷時可利用哪些工具?

答案:企業進行資料庫行銷,可利用的工具,除了銷售人員與顧客的直接接觸外,還包

括:電視廣告、平面廣告(包括報紙、雜誌)、直接信函(DM)、網際網路 E-mail

銷…等。

67. 「顧客區隔」的目的為何?區隔的方式有哪兩種?

答案:「顧客區隔」是進行資料庫行銷的首要工作,區隔的目的是希望制定不同內容的

「行銷策略」與「顧客服務政策」。區隔的方式有:「一維分群」及「二維分群」兩種。

68. 請問對「顧客忠誠度高」與「顧客忠誠度低」的黃金級顧客,制定的行銷策略有何不

同?

答案:對「忠誠度高」的黃金級顧客,應該提供尊榮的專屬服務,並維持長久的良好關

係。對「忠誠度低」的黃金級顧客,應該盡力運用各種強化顧客忠誠的方法留住顧客,

因為高價值的顧客對企業的貢獻度很大。

69. REM 分析的 RFM 各代表什麼隱含意義?

答案:(1) R:最近購買日期,R 的時間距現時愈近,隱含著該顧客再次選購此產品的購

買程度愈高;若 R 距離現時愈遠,隨著時間的拉長該顧客持續購買慾隨之降低,則表示

著此顧客的購買行為可能改變或是變節至他處消費。(2) F:購買頻率,F 愈高代表此顧

客與企業互動程度愈高。購買紀錄中若購買某產品的 F 愈高,表示該顧客對此產品有愈

高的熱衷程度,持續購買之動機亦較強。(3) M:購買總金額,某顧客對某產品消費愈多

的金額,代表該顧客大量購買此產品,對此商品具有大量的需求。

70. 何謂顧客淨值(Customer Equity, CE)?

答案:一個或一群企業的顧客,在存續期間內對企業所貢獻的收益,扣除為獲取、發展

及維繫該(群)顧客所產生的成本後,所獲得的淨現金流量稱之為顧客淨值,又叫做顧

客關係價值(CRV)或顧客獲利(CP)。

71. 顧客交易資料分析的過程可分成哪四個步驟?

答案:(1)資料來源、(2)資料加工、(3)資料儲存、(4)分析處理。

72. 顧客交易資料分析的「資料來源」可能有哪些項目?

答案:「資料來源」指得是存放顧客交易資料的原始紀錄,它可能是任何格式的電子檔案

(如 WordExcel…等)或應用系統(如電子商務網站系統、POS 銷售點系統、進銷存

管理系統、ERP 系統的銷售模組等)使用的資料庫管理系統(如 AccessMySQL

SQL ServerOracleSybase… DBMS)。

73. 資料加工主要的工作是 ETL,它包括哪三個項目?

答案:資料萃取(Data Extraction)、資料轉換(Data Transformation)與資料載入(Data

Loading)。

74. 請問什麼是線上即時分析處理(On-Line Analytical Processing, OLAP)?

答案:OLAP 可操作儲存在資料倉儲內廣泛的資料,透過快速、一致、互動式的介面對

同一資料提供各種不同觀點或角度的呈現方式,供不同層面的使用者使用。

75. 請問資料探勘(Data Mining)的定義為何?

答案:資料探勘是指:「從大量資料中,尋找事前未知、有效且可以付諸行動的規則或知

識。」它提供企業從龐大的資料倉儲系統中,發掘出顧客感興趣或是有意義的資訊。

76. 物流學者 Frezelle 認為顧客活動剖析檔案應該包括三個主要項目,請問是哪三個項目?

答案:顧客銷售活動輪廓檔案(Customer Sales Activity Profile, CSAP)、產品品項銷售活

動輪廓檔案(Item Sales Activity Profile, ISAP)及顧客-產品品項銷售活動輪廓檔案

Customer Item Sales Activity Profile, CISAP)。

77. 想要自己動手來進行網路商店系統擴充,必須具備幾種電腦技能?

答案:PHP 網路程式語言的撰寫能力,以及 MySQL 資料庫管理系統的操作經驗。

78. 在修改程式或安裝外掛之前,應該先做好備份的工作,請說明原因。

答案:先做好備份工作,可以在修改或安裝外掛出現錯誤時,將程式系統還原為原來正

常運作的狀態。

在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

3. 下列哪些是常見的網路犯罪?(複選)

(A) 網路販賣盜版光碟

(B) 網路販賣贓物

(C) 入侵他人網站

智慧財產權法想要保護的是下列何者?(單選)

(A) 人類腦力辛勤創作的結晶

12. 關於隱私權的敘述,下列哪些正確?[複選]

(A) 隱私權是一種不受干擾的權利

(B) 垃圾郵件是一種常見的侵犯隱私權行為

(C) 無故打開他人的電子郵件也是一種侵犯隱私權行為

13. 經營電子商務網站,需注意的網站資訊政策有哪些?[複選]

(A) 網站的使用規則

(B) 隱私權政策

(C) 會員資料使用說明

15. 有關著作權的敘述,下列哪些不正確?[複選]

(A) 著作權人死前均受著作權保護

(B) 在不知情情況下代為重製未經授權的他人著作物是無罪的(D) 著作權保護長達 100

17. 關於專利權的特性,下列敘述何者錯誤?[單選]

(A) 識別性

18. 有關專利權的敘述,下列何者正確?[單選]

(C) 專利權只限於申請的國家,出了國境就不受保護

19. 商標權的功能包括下列那些項目?[複選]

(A) 區別商品或服務

(B) 表彰商品或服務的來源

20. 在電子商務中所謂的「智慧財產權」,不包括下列何者?[單選]

(D) 隱私權

在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

(B) 著作權

(C) 專利權

(D) 商標權

3. 下列哪些是常見的網路犯罪?(複選)

(A) 網路販賣盜版光碟

(B) 網路販賣贓物

(C) 入侵他人網站

智慧財產權法想要保護的是下列何者?(單選)

(A) 人類腦力辛勤創作的結晶

12. 關於隱私權的敘述,下列哪些正確?[複選]

(A) 隱私權是一種不受干擾的權利

(B) 垃圾郵件是一種常見的侵犯隱私權行為

(C) 無故打開他人的電子郵件也是一種侵犯隱私權行為

13. 經營電子商務網站,需注意的網站資訊政策有哪些?[複選]

(A) 網站的使用規則

(B) 隱私權政策

(C) 會員資料使用說明

15. 有關著作權的敘述,下列哪些不正確?[複選]

(A) 著作權人死前均受著作權保護

(B) 在不知情情況下代為重製未經授權的他人著作物是無罪的(D) 著作權保護長達 100

17. 關於專利權的特性,下列敘述何者錯誤?[單選]

(A) 識別性

18. 有關專利權的敘述,下列何者正確?[單選]

(C) 專利權只限於申請的國家,出了國境就不受保護

19. 商標權的功能包括下列那些項目?[複選]

(A) 區別商品或服務

(B) 表彰商品或服務的來源

20. 在電子商務中所謂的「智慧財產權」,不包括下列何者?[單選]

(D) 隱私權

1) Which of the following statements about Internet usage in the United States is not true?

A) In 2020 around 290 million people of all ages had access to the Internet.

B) In 2020 the growth in the number of new online users was around 1.5%.

C) Over 90% of all U.S. Internet users access the Internet using a mobile device.

D) Adults in the 25-to-54-age group have the highest percentage of Internet use.

Answer: D

2) Which of the following is not one of the main stages of the online purchasing process?

A) post-purchase service and loyalty

B) awareness

C) engagement

D) conversation

Answer: D

3) What was the approximate Internet penetration rate in 2019 for individuals that have attained less than a high-school education?

A) 51%

B) 61%

C) 71%

D) 81%

Answer: C

4) All of the following are online communications used to support the evaluation of alternatives stages of the consumer decision process except:

A) search engines.

B) online catalogs.

C) social networks.

D) targeted banner ads.

Answer: D

5) Approximately ________ of U.S. Internet users research online but do not buy.

A) 7.5%

B) 10%

C) 25%

D) 80%

Answer: B

6) In modeling online consumer behavior the concept of "consumer skills" refers to the:

A) education level of the consumer.

B) communication skills of the consumer.

C) knowledge consumers have about how to conduct online transactions.

D) product evaluation skills of the consumer.

Answer: C

7) Research shows the two key factors shaping the decision to purchase online are utility and trust.

Answer: TRUE

8) A roughly equal percentage of men and women in the United States use the Internet today.

Answer: TRUE

9) Consumers choose the online channel primarily due to social media influence.

Answer: FALSE

10) Online traffic is partially driven by offline brands and traditional shopping.

Answer: TRUE

11) The majority of online shoppers find vendors by clicking on display ads.

Answer: FALSE

13) Which of the following online advertising formats attracted the least amount of spending in 2020?

A) search

B) classifieds

C) rich media

D) e-mail

Answer: D

14) Google introduced which of the following changes to its search algorithm to weed out low quality sites from search results?

A) Penguin

B) Hummingbird

C) Panda

D) Knowledge Graph

Answer: C

15) Which of the following forms of online advertising is expected to grow the most between 2020 and 2024?

A) paid search

B) sponsorships

C) search engines

D) video

Answer: D

16) Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

A) Nielsen ratings

B) data collected from social networks

C) integration of online data with offline data

D) clickstream data

Answer: A

17) Which of the following search engine algorithm updates targets websites that violate Google's guidelines?

A) Panda

B) Penguin

C) Hummingbird

D) Fred

Answer: D

18) Which of the following is a Google algorithm update related to local search?

A) Penguin

B) Hummingbird

C) Panda

D) Possum

Answer: D

19) Pinterest's Lens is an example of which of the following?

A) keyword advertising

B) SEO

C) voice search

D) visual search

Answer: D

20) Which of the following is not a practice that degrades the results and usefulness of search engines?

A) social search

B) link farms

C) content farms

D) click fraud

Answer: A

21) Amazon's Associates program is an example of which of the following?

A) viral marketing

B) local marketing

C) affiliate marketing

D) lead generation marketing

Answer: C

22) Ad blockers operate in a manner similar to which of the following?

A) anti-virus software

B) firewalls

C) Flash cookies

D) anonymous browsing

Answer: B

23) Which of the following is not a primary source of ad fraud?

A) browser extensions that insert ads into a premium publisher's website and then list the ads as available on a programmatic ad exchange

B) ad targeting firms that create bots that imitate the behavior of real shoppers and then charge advertisers

C) botnets hired by publishers to click on web pages to create phony traffic

D) native advertising that is displayed on a social media site

Answer: D

24) The percentage of all e-mail that is spam averaged around ________ in 2020.

A) 55%

B) 65%

C) 75%

D) 85%

Answer: A

25) Which of the following statements about CAN-SPAM is not true?

A) CAN-SPAM went into effect in January 2004.

B) CAN-SPAM prohibits unsolicited e-mail (spam).

C) CAN-SPAM prohibits the use of deceptive subject lines and false headers.

D) Large spammers are among CAN-SPAM's biggest supporters.

Answer: B

26) Which of the following statements about Canada's anti-spam law is not true?

A) Canada's law is based on an opt-in model.

B) The law has no impact on companies located within the United States.

C) The first phase of the law went into effect in 2014.

D) The law applies to e-mail texts and social media messaging.

Answer: B

27) Which of the following is the most important tool in establishing a relationship with the customer?

A) company website

B) company CRM system

C) Facebook

D) search engine display ads

Answer: A

28) All of the following are "traditional" online marketing tools except:

A) affiliate marketing.

B) e-mail and permission marketing.

C) social marketing.

D) sponsorship marketing.

Answer: C

29) All of the following are among those most frequently affected by ad-blocking except:

A) gaming sites.

B) newsgroup\forums.

C) social network sites.

D) online retailers.

Answer: D

30) The NIKEiD program is an example of which of the following marketing techniques?

A) customer co-production

B) transactive content

C) price discrimination

D) permission marketing

Answer: A

31) The incremental cost of building the next unit of a good is called the:

A) Law of One Price.

B) variable cost.

C) marginal cost.

D) fixed cost.

Answer: C

32) Which of the following statements about a free pricing strategy is not true?

A) Free products and services can knock out potential and actual competitors.

B) The free pricing strategy was born in the early days of the Web.

C) It is difficult to convert free customers into paying customers.

D) Free products and services can help build market awareness.

Answer: B

33) Creating multiple variations of information goods and selling these to different market segments at different prices is called:

A) bundling.

B) customization.

C) dynamic pricing.

D) versioning.

Answer: D

34) All of the following are fixed price strategies except:

A) bundling.

B) versioning.

C) free pricing.

D) yield management.

Answer: D

35) Which of the following involves getting customers to pass along a company's marketing message to friends family and colleagues?

A) affiliate marketing

B) viral marketing

C) native advertising

D) lead generation marketing

Answer: B

36) Group M the world's largest advertising buyer requires which of the following in order for an ad to be considered viewable?

A) 50% of the pixels must be in view for at least one second.

B) 50% of the pixels must be in view for at least two seconds.

C) 100% of the pixels must be in view for at least one second

D) 100% of the pixels must be in view for at least two seconds

Answer: C

37) Which of the following is based on the idea of complete price transparency in a perfect information marketplace?

A) the Law of One Price

B) dynamic pricing

C) price discrimination

D) versioning

Answer: A

38) Which of the following industries accounted for the highest percentage of spending on online advertising in 2019?

A) financial services

B) retail

C) automotive

D) entertainment

Answer: B

39) Which of the following statements about native advertising is not true?

A) Almost all of social network ad spending is native advertising.

B) Most consumers are able to easily distinguish editorial content from native advertising.

C) Native advertising's share of mobile display revenues has grown to 85% in 2020.

D) Consumers look at native ads more frequently than they look at display ads.

Answer: B

40) Which of the following is an automated auction-based method for matching demand and supply for online display ads?

A) retargeting

B) behavioral targeting

C) programmatic advertising

D) keyword advertising

Answer: C

41) Research has found that most of the ad impressions served across display advertising platforms are not viewable.

Answer: TRUE

42) The highest amount of online advertising spending is for online video ads.

Answer: FALSE

43) Evidence suggests that real-time customer chat increases the dollar value of transactions.

Answer: TRUE

44) A significant percentage of online ad impressions served are not actually viewed or even viewable.

Answer: TRUE

45) Lead generation marketing firms specialize in inbound marketing.

Answer: TRUE

46) The concept of "customer satisfaction" is broader than the concept of "customer experience."

Answer: FALSE

47) Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.

Answer: TRUE

51) Which of the following is an open source software framework used to collect and analyze a company's big data?

A) data warehouse

B) Hadoop

C) SQL

D) profiling

Answer: B

52) Which of the following statements about the Internet's impact on marketing is not true?

A) The Internet has broadened the scope of marketing communications.

B) The Internet has decreased the impact of brands.

C) The Internet has increased the richness of marketing communications.

D) The Internet has expanded the information intensity of the marketplace.

Answer: B

53) Which of the following features of e-commerce technology enables marketers to engage customers in a dialog and dynamically adjust the experience to the consumer?

A) ubiquity

B) richness

C) information density

D) interactivity

Answer: D

54) Which of the following features of e-commerce technology decreases the cost of delivering marketing messages and receiving feedback from users?

A) personalization\customization

B) universal standards

C) ubiquity

D) interactivity

Answer: B

55) The richness made possible by e-commerce technologies does which of the following?

A) It reduces the cost of delivering marketing messages and receiving feedback from users.

B) It allows consumers to become co-producers of the goods and services being sold.

C) It allows video audio and text to be integrated into a single marketing message and consuming experience.

D) It enables worldwide customer service and marketing communications.

Answer: C

56) All of the following statements about cookies are true except:

A) cookies can be used to create cross-site profiles of users.

B) the data typically stored in cookies includes a unique ID and e-mail address.

C) cookies make shopping carts possible by allowing a site to keep track of a user's actions.

D) the more cookies are deleted the less accurate ad server metrics become.

Answer: B

57) A web beacon is:

A) a cookie that carries a virus.

B) an executable cookie.

C) an automated applet for performing web searches.

D) a tiny graphics file embedded in an e-mail or web page.

Answer: D

58) ________ is an open source database that can store and analyze both structured and unstructured data.

A) ASP

B) PHP

C) Hadoop

D) JSP

Answer: C

59) A ________ is a repository of customer information that records all contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

A) customer service chat system

B) CRM system

C) data warehouse

D) transactive content system

Answer: B

60) The marketing technique known as ________ involves merchants offering many products for which there is little demand.

A) long tail marketing

B) flash marketing

C) yield management

D) bait-and-switch

Answer: A

61) Which of the following provides web marketers with a very quick means of identifying a customer and understanding his or her behavior at a site?

A) transaction logs

B) cookies

C) registration forms

D) data warehouses

Answer: B

62) Transaction logs are built into client software and not the web server software.

Answer: FALSE

63) Regular in-app cookies can be shared between apps.

Answer: FALSE

68) If you want to determine the size of your website's audience the metric you will use for the most accurate measurement will be:

A) page views.

B) unique visitors.

C) hits.

D) reach.

Answer: B

69) Cross-platform attribution refers to:

A) how to assign credit to different marketing initiatives.

B) understanding why visitors to a website purchase a product.

C) understanding how impressions lead to visits.

D) understanding why people click on ads.

Answer: A

70) VTR measures the ________ response rate to an ad.

A) 30-minute

B) 24-hour

C) 7-day

D) 30-day

Answer: D

71) Uber has been criticized for using which of the following?

A) flash marketing

B) bundling

C) surge pricing

D) malware

Answer: C

72) What kinds of ads have the lowest CTR?

A) video ads

B) e-mails to an in-house list

C) social network display ads

D) banner display ads

Answer: D

73) Purchasing an online ad on a CPA basis means that the advertiser:

A) pays for impressions in 1000 unit lots.

B) pays a pre-negotiated fee for each click an ad receives.

C) pays only for those users who perform a specific action such as registering purchasing etc.

D) exchanges something of equal value for the ad space.

Answer: C

74) eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the following?

A) the total number of impressions

B) the total number of impressions in hundreds

C) the total number of impressions in thousands

D) the total number of impressions in millions

Answer: C

75) Which of the following measures the average length of stay at a website?

A) loyalty

B) stickiness

C) page views

D) retention rate

Answer: B

76) Acquisition rate is a measure of the:

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

B) percentage of visitors who become customers.

C) percentage of existing customers who continue to buy on a regular basis.

D) percentage of shoppers who do not return within a year after their initial purchase.

Answer: A

77) Recency refers to the:

A) percentage of customers who do not return during the next year after an initial purchase.

B) time elapsed since the last visit made by a customer.

C) percentage of existing customers who continue to buy on a regular basis.

D) percentage of customers who return to the site within a year to make additional purchases.

Answer: B

78) View-to-cart ratio is a measure of the:

A) percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

B) percentage of views that lead to an add-to-cart action.

C) percentage of existing customers who continue to buy on a regular basis.

D) percentage of shoppers who do not return within a year after their initial purchase.

Answer: B

79) Which of the following measures the ratio of items purchased to product views?

A) conversion rate

B) cart conversion rate

C) browse-to-buy ratio

D) view-to-cart ratio

Answer: C

80) Which of the following measures the percentage of e-mails that could not be delivered?

A) abandonment rate

B) unsubscribe rate

C) bounce-back rate

D) attrition rate

Answer: C

81) Which of the following is the most meaningful metric for video ads?

A) view time

B) CTR

C) completion rate

D) skip rate

Answer: C

82) Which of the following measures the percentage of times an ad is clicked?

A) retention rate

B) CTR

C) loyalty rate

D) conversion rate

Answer: B

83) The average abandonment rate is highest for shopping carts accessed via smartphones.

Answer: FALSE

-------------

1.5) ________ is the ability to ensure that an e-commerce site continues to function as intended.

A

.

A) Nonrepudiation

B

.

B) Authenticity

C

.

C) Availability

D

.

D) Integrity

正確答案: C

2.11) Which system functionality must your website have to be able to personalize or customize a product for a client?

A

.

A) an ad server

B

.

B) a site tracking and reporting system

C

.

C) an inventory management system

D

.

D) customer on-site tracking

正確答案: D

3.19) Which of the following uses a subscription-based sales revenue model?

A

.

A) Yahoo

B

.

B) eBay

C

.

C) MyPoints

D

.

D) Dollar Shave Club

正確答案: D

4.下列敘述何者有誤?[單選]

A

.

A. 變動性較低、需求固定的市場,可採用拉式基礎的供應鏈

B

.

B. 推式基礎的供應鏈是預測市場的需求

C

.

C. 接單生產的模式為拉式基礎的供應鏈

D

.

D. 目前可先準備半成品,等顧客下單後再進行生產為推式+拉式之混合模式

正確答案: A

5.7) What are the two most important management challenges in building a successful e-commerce presence?

A

.

A) developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

B

.

B) having an accurate understanding of your business environment and an achievable business plan

C

.

C) building a team with the right skill sets and closely managing the development process

D

.

D) identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

正確答案: A

6.77) Above all, e-commerce is a ________ phenomenon.

A

.

A) technology driven

B

.

B) finance-driven

C

.

C) sociological

D

.

D) government-driven

正確答案: A

7.13. 在電子商務交易中,買賣雙方皆為企業,為下列何種型態?[單選]

A

.

B2B2C

B

.

B2C

C

.

C2C

D

.

B2B

正確答案: D

8.18) ________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

A

.

A) Ping

B

.

B) Telnet

C

.

C) Tracert

D

.

D) Finger

正確答案: A

9.請問下列何者非呈現式廣告的概念?[單選]

A

.

A. 主要是在網路發展的早期

B

.

B. 又稱為關鍵字廣告

C

.

C. 要傳遞的內容擺置在網頁的上方(橫幅式廣告)

D

.

D. 跳出新網頁的彈出式廣告

正確答案: B

10.SCM」是指?[單選]

A

.

A. 企業資源規劃

B

.

B. 供應鏈管理

C

.

C. 顧客關係管理

D

.

D. 知識管理

正確答案: B

11.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線   速度,造成使用者點選網頁時需要花很久的時間,再加上添購電子化設備費用   昂貴,最後導致成效不如預期而收編。由上述案例來看,除了外部影響外,   NOVA在內部還遇到哪個困難?[單選]

A

.

A. 導入時程過長

B

.

B. 系統無法整合

C

.

C. 導入費用過高

D

.

D. 系統流程僵化

正確答案: C

12.14) The existence of many competitors in any one market segment may indicate:

A

.

A) an untapped market niche.

B

.

B) the market is saturated.

C

.

C) no one firm has differentiated itself within that market.

D

.

D) a market that has already been tried without success.

正確答案: B

13.台灣銀行在民國861月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]

A

.

電子資料交換

B

.

基本的電子商務

C

.

電子交易市集

D

.

協同商務

正確答案: A

14.2) Which of the following uses a subscription revenue model for books?

A

.

A) Spotify

B

.

B) Amazon Kindle Unlimited

C

.

C) eHarmony

D

.

D) Pandora

正確答案: B

15.52) Proxy servers are also known as __________ because they have two network interfaces.

A

.

A) firewalls

B

.

B) application gateways

C

.

C) dual home systems

D

.

D) packet filters

正確答案: C

16.37) All of the following might be part of a website's middle-tier layer except:

A

.

A) a database server.

B

.

B) an ad server.

C

.

C) legacy corporate applications.

D

.

D) a mail server.

正確答案: C

17.52) All of the following are involved in the effort to create standards for IoT except: 回答錯誤

A

.

A) AllSeen Alliance.

B

.

B) Industrial Internet Consortium.

C

.

C) Open Connectivity Foundation.

D

.

D) W3C.

正確答案: D

18.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]

A

.

人際關係

B

.

交易

C

.

幻想

D

.

興趣

正確答案: D

19.22. 冷門產品的需求量不高,但匯聚多樣的冷門產品所產生之效果會大於傳統熱門產品所產生的效果,這是指?[單選] 回答錯誤

A

.

12

B

.

15

C

.

20

D

.

30

正確答案: B

20.13) ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.

A

.

A) Client/server computing

B

.

B) P2P computing

C

.

C) Mobile computing

D

.

D) Cloud computing

正確答案: D

21.30) ________ typically attack governments, organizations, and sometimes individuals for political purposes.

A

.

A) Crackers

B

.

B) Tiger teams

C

.

C) Bounty hunters

D

.

D) Hacktivists

正確答案: D

22.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]

A

.

需求整合式價格

B

.

目錄式價格

C

.

拍賣式價格

D

.

逆拍賣式價格

正確答案: B

23.導入CRM之各個時期都必須獲得公司各部門鼎力合作才能真正成功,這   是在解決顧客關係管理的哪項失敗因素?[單選]

A

.

A. 與原系統間的整合不易

B

.

B. 初期效益不明顯

C

.

C. 廠商能力不足

D

.

D. 缺乏人才與共識

正確答案: D

24.40) Which of the following would you use to verify that links on web pages are valid? 回答錯誤

A

.

A) HTTP

B

.

B) FTP

C

.

C) data capture tools

D

.

D) site management tools

正確答案: D

25.24) The percentage of all e-mail that is spam averaged around ________ in 2020.

A

.

A) 55%

B

.

B) 65%

C

.

C) 75%

D

.

D) 85%

正確答案: A

26.博客來網路書店承諾「中午前訂,隔天7-11取貨」,此符合B to C電子商務影響因素中的哪一個?[單選]

A

.

充足的信任機制

B

.

易用的網站功能

C

.

特殊的使用經驗

D

.

便捷的運送服務

正確答案: D

27.29) Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America’s most prominent political, entertainment and technology leaders?

A

.

A) DDoS attack

B

.

B) ransomware

C

.

C) social engineering

D

.

D) sniffing

正確答案: C

28.44) Which of the following is an example of a company using the content provider model?

A

.

A) Priceline

B

.

B) Netflix

C

.

C) Dell

D

.

D) eBay

正確答案: B

29.Call Center轉為顧客關係管理時,原先利用電話蒐集到的顧客資訊無法   和網頁整合,此時造成顧客在詢問或購買時不方便,這是屬於顧客關係管理可   能會遇到的困難的哪一種?[單選]

A

.

A. 廠商能力不足

B

.

B. 與原系統整合不易

C

.

C. 初期效益不彰

D

.

D. 缺乏人才及共識

正確答案: B

30.37) Which of the following is based on the idea of complete price transparency in a perfect information marketplace? 回答錯誤

A

.

A) the Law of One Price

B

.

B) dynamic pricing

C

.

C) price discrimination

D

.

D) versioning

正確答案: A

31.27) A template test is a form of which type of testing?

A

.

A) unit testing

B

.

B) system testing

C

.

C) acceptance testing

D

.

D) A/B testing

正確答案: D

32.46) In general, the key to becoming a successful content provider is to:

A

.

A) own the content being provided.

B

.

B) own the technology by which content is created, presented, and distributed.

C

.

C) provide online content for free.

D

.

D) provide other services as well as online content.

正確答案: A

33.50) M-commerce is the type of e-commerce that generates the most revenue.

A

.

A

B

.

B

正確答案: B

34.4. 智慧財產權法想要保護的是下列何者?(單選)

A

.

(A) 人類腦力辛勤創作的結晶

B

.

(B) 商業機密

C

.

(C) 商業利益

D

.

(D) 一般人知的權利

正確答案: A

35.3. 下列哪些是常見的網路犯罪?(複選)

A

.

(A) 網路販賣盜版光碟

B

.

(B) 網路販賣贓物

C

.

(C) 入侵他人網站

D

.

(D) 散發電腦病毒

正確答案: A B C

36.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

A

.

(A) 隱私權

B

.

(B) 著作權

C

.

(C) 專利權

D

.

(D) 商標權

正確答案: B C D

37.8. 下列何者不受著作權法的保護?(單選)

A

.

(A) 三歲小孩的畫作

B

.

(B) 中華民國憲法

C

.

(C) 學校的試題

D

.

(D) 學校的網頁

正確答案: B C D

38.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

A

.

(A) 隱私權

B

.

(B) 著作權

C

.

(C) 專利權

D

.

(D) 商標權

正確答案: B C D

39.6. 有關網路禮儀,下列哪些正確?(複選)

A

.

(A) 電腦禮儀的基本原則是「尊重」

B

.

(B) 雖是未經證實的消息,也要先讓大家知道

C

.

(C) 轉載別人的文章時,最好註明出處

D

.

(D) 最好取得原作者的同意後再進行轉載

正確答案: A C D

40.3. 有關電子商務的定義,下列哪些錯誤?(複選)

A

.

(A) 電子商務就是不用在網路上做生意

B

.

(B) 電子商務就是把傳統的商業活動搬到網際網路上來進行

C

.

(C) 電子商務一定要透過網路線來傳遞

D

.

(D) 電子商務是商業交易或工作流程自動化的技術應用

正確答案: A C

41.58) Face ID is an example of which of the following?

是非題 (2 ) 2

A

.

A) biometrics

B

.

B) encryption

C

.

C) IDS

D

.

D) firewall

正確答案: A

42.59) WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

43.38) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior.

是非題 (2 ) 2

A

.

  A

B

.

B

正確答案: A

44.35) Exploit kits can be purchased by users to protect their computers from malware.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

45.76) Scale economies are efficiencies that result from increasing the size of the business.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

46.7) Research shows the two key factors shaping the decision to purchase online are utility and trust.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

47.79) Interactivity that enables product customization alters industry structure by decreasing the threat of substitutes.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

48.58) The United States has the world’s highest average Internet connection speed. 

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

49.34) A multi-tier architecture includes a web and database server.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: B

50.10) Online traffic is partially driven by offline brands and traditional shopping.

是非題 (2 ) 2

A

.

A

B

.

B

正確答案: A

1.想要跟台塑往來的廠商必須透過台塑網的電子化採購平台,請問這是屬於   企業電子化時應考慮的哪個因素?[單選]

B. 相關廠商的配合姓

2.ERP」是指?[單選]

A. 企業資源規劃

3.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線   速度,造成使用者點選網頁時需花很久的時間,再加上添購電子化設備費用昂   貴,最後導致成效不如預期而收編。由上可知,NOVA沒有考慮到什麼問題?   [單選]

C. 基礎設備的完整性

4. 2009 年以來,便利商店紛紛提供電子化票券的服務,涵蓋遊樂園、交通、展覽等,將訂票的流程簡化,並利用促銷的方法吸引消費者接受與採用,像在 ibon 購票,憑票根就有咖啡買一送一的優惠。請問上述是屬於企業電子化的哪一個策略?(單選)

(B) 創新產業的形成

5.Both mobile and social advertising spending are expected to double from 2017 to 2021.

A.O

6.Ads that appear in a Facebook user's News Feed are called:

C) Page Post Ads.

7.Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?

D) Twitter Card

8.Which of the following allows Facebook to track user behavior on other sites?

B) Like button

9.Which of the following is most similar to Pinterest?

B) Instagram

10.Which of the following involves using a variety of tools to encourage users to interact with content and brand?

B) engagement

11.People spend the most time doing which of the following when using a mobile device?

C) listening to music

12.Which of the following is not a major provider of mobile display advertising?

D) Webtrends

13.A cell phone's GPS is accurate to within five feet of the actual location of the phone.

B.X

14.「減少供應商數量、提高出貨管理、付款管理及銷售部門效率」這是指何   者對電子商務的作用?[單選]

C. 供應鏈管理

15.Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A

.

A) accountability

B

.

B) privacy

C

.

C) responsibility

D

.

D) liability

正確答案: B

16.Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A

.

A) Slippery Slope

B

.

B) Risk Aversion

C

.

C) No Free Lunch

D

.

D) The Collective Utilitarian Principle

正確答案: B

17.A social consequence of the richness of Internet information is:

A

.

A) an increase in shallowness.

B

.

B) an increase in the ease of creating misleading information.

C

.

C) very persuasive messages might reduce the need for multiple independent sources of information.

D

.

D) an increase in vulnerability to hacking attacks.

正確答案: C

18.Which of the following is used to track individuals as they move among thousands of websites?

A

.

A) first-party cookies

B

.

B) digital wallets

C

.

C) advertising networks

D

.

D) shopping carts

正確答案: C

19.What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A

.

A) Require firms to have consumers affirmatively opt-in before PII is collected.

B

.

B) Require firms to allow consumers to opt-out before PII is collected.

C

.

C) Make collection of PII illegal.

D

.

D) Require robust notice only before PII is collected.

正確答案: A

20."Do Not Track" falls under which of the following principles in the FTC's current privacy framework?

A

.

A) Privacy by Design

B

.

B) Simplified Choice

C

.

C) Greater Transparency

D

.

D) Scope

正確答案: B

21.Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?

A

.

A) anonymous surfing

B

.

B) anonymous remailers

C

.

C) differential privacy software

D

.

D) public key encryption

正確答案: C

22.According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A

.

A) used an anonymous web browsing service

B

.

B) encrypted their communications

C

.

C) cleared web browser history and cookies

D

.

D) posted comments online anonymously

正確答案: C

23.Which of the following protects original forms of expression in a tangible medium?

A

.

A) trade secret law

B

.

B) copyright law

C

.

C) patent law

D

.

D) trademark law

正確答案: B

24.Which case was instrumental in paving the way for Internet business methods patents?

A

.

A) Bilski et al. v. Kappos

B

.

B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.

C

.

C) Alice Corporation Pty. Ltd. v. CLS Bank International

D

.

D) Ticketmaster Corp. v. Tickets.com

正確答案: B

25.Registering a domain name similar or identical to a trademark of a legitimate site to divert web traffic to the infringing site is an example of:

A

.

A) keywording.

B

.

B) cyberpiracy.

C

.

C) framing.

D

.

D) metatagging.

正確答案: B

26.Which of the following involves bypassing the target site's home page and going directly to a content page?

A

.

A) cybersquatting

B

.

B) metatagging

C

.

C) framing

D

.

D) deep linking

正確答案: D

27.Which of the following involves the issue of social control?

A

.

A) information rights

B

.

B) governance

C

.

C) public safety and welfare

D

.

D) property rights

正確答案: B

28.Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?

A

.

A) South Dakota v. Wayfair

B

.

B) Bilski et al. v. Kappos

C

.

C) Quill v. North Dakota

D

.

D) Alice Corporation v. CLS Bank International

正確答案: A

29.Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

30.The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

31.Online gambling is now legal throughout the United States.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

32.阿仁很喜歡上Facebook看網友們分享的一些有趣的經驗,但麻煩的是,   一定要按讚才能看到內容。請問這屬於顧客關係管理的哪個階段?[單選] 回答錯誤

A

.

A. 技術與策略階段

B

.

B. 蒐集與接觸階段

C

.

C. 互動與修改階段

D

.

D. 區隔與價值階段

正確答案: A

33.東森購物一開始開台時,利用叫賣的方式來吸引消費者上門,雖達到銷售   的成效,但也帶來大量的退、換貨成本。營運一段時間後,東森累積了一定程   度的顧客資料,也開始分析其擁有的顧客資訊以找出消費者的可能需求,開發   出真正符合顧客需求的產品。由上述例子可知,東森購物克服了什麼困難?[   ]

A

.

A. 初期效益不明顯

B

.

B. 廠商能力不足

C

.

C. 缺乏人才及共識

D

.

D. 與原系統間的整合不易

正確答案: A

34.Call Center轉為顧客關係管理時,原先利用電話蒐集到的顧客資訊無法   和網頁整合,此時造成顧客在詢問或購買時不方便,這是屬於顧客關係管理可   能會遇到的困難的哪一種?[單選]

A

.

A. 廠商能力不足

B

.

B. 與原系統整合不易

C

.

C. 初期效益不彰

D

.

D. 缺乏人才及共識

正確答案: B

35.The online retail sector of the retail industry is most similar to the ________ sector.

A

.

A) specialty stores

B

.

B) general merchandise

C

.

C) mail order/telephone order (MOTO)

D

.

D) consumer durables

正確答案: C

36.Which of the following enabled MOTO firms to make an easier transition to e-commerce?

A

.

A) the national toll-free call system

B

.

B) the fact that they already had efficient customer order fulfillment processes

C

.

C) falling long distance telecommunications prices

D

.

D) the growth of the credit card industry

正確答案: B

37.All of the following have introduced social commerce functionality, such as buy buttons, shoppable ads, and marketplaces, except:

A

.

A) Facebook.

B

.

B) Pinterest.

C

.

C) Instagram.

D

.

D) Tumblr.

正確答案: D

38.Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

39.The existence of substitute products is a key industry strategic factor.

A

.

O

B

.

X

正確答案: A

40.The term supply-push refers to:

A

.

A) making products prior to orders being received based on estimated demand.

B

.

B) waiting for orders to be received before building a product.

C

.

C) channel conflict.

D

.

D) multi-channel manufacturers who sell directly online to consumers.

正確答案: A

41.All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:

A

.

A) moving to a demand-pull model.

B

.

B) high-cost structures.

C

.

C) developing a fast-response online order and fulfillment system.

D

.

D) channel conflict.

正確答案: B

42.Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?

A

.

A) disintermediation

B

.

B) localization

C

.

C) channel conflict

D

.

D) hypermediation

正確答案: C

43.Approximately ________ % of the United States labor force is involved in providing services.

A

.

A) 50

B

.

B) 60

C

.

C) 70

D

.

D) 80

正確答案: D

44.All of the following statements about the online insurance industry are true except:

A

.

A) the Internet has lowered search costs, increased price comparison, and decreased prices to consumers for all forms of insurance.

B

.

B) websites of almost all the major firms provide the ability to obtain an online quote.

C

.

C) the wave of interest in fintech companies is starting to filter into the insurance industry.

D

.

D) the industry has been very successful in attracting visitors searching for information about prices and terms of insurance policies.

正確答案: A

45.In 2020, almost 75% of the adult U.S. population was expected to use online banking.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

46.The online mortgage industry has transformed the process of obtaining a mortgage.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

47.Which of the following job recruitment companies is not a job listing aggregator?

A

.

A) Indeed

B

.

B) SimplyHired

C

.

C) Glassdoor

D

.

D) CareerBuilder

正確答案: D

48.Which of the following is not a major trend in the online recruitment services industry?

A

.

A) disintermediation

B

.

B) video and remote recruiting

C

.

C) social recruiting

D

.

D) use of artificial intelligence technologies in the hiring process

正確答案: A

49.The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

50.Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

1.想要跟台塑往來的廠商必須透過台塑網的電子化採購平台,請問這是屬於   企業電子化時應考慮的哪個因素?[單選]

A

.

A. 網路使用的安全性

B

.

B. 相關廠商的配合姓

C

.

C. 基礎設備的完整性

D

.

D. 目標市場的廣泛性

正確答案: B

2.NOVA2000年的電子化經營除了未考慮到網路連線速度外,也未考慮   到當時使用者尚未習慣網路購物,這是忽略企業電子化時應考慮的哪個因素?   [單選] 回答錯誤

D. 目標市場的廣泛性

3.匯豐汽車藉由資訊科技將複雜的汽車維修流程建立標準化程序,如此一來   能提高工作與管理效率。請問這屬於下列何種概念?[單選]

A

.

A. 企業流程再造

B

.

B. 顧客關係管理

C

.

C. 商業智慧

D

.

D. 知識管理

正確答案: A

4.EZTABLE將合作的餐廳位置、數量傳到網站,這是屬於下列何種概念?[   ] 回答錯誤

D. 企業電子化

5.開發工業自從引進了某套系統之後,清楚地整合工廠及上、下游的供應商、   企業內部的營運流程、零售商與顧客,因而提升整個生產鏈的競爭力。請問上   述是指哪一套系統?[單選]

B. 供應鏈管理

6.企業導入ERP前之認知,下列何者為誤?[單選]

A

.

A. ERP著重的是企業的整體規劃

B

.

B. ERP需全體員工的總動員

C

.

C. ERPIT部門之責任

D

.

D. ERP儘量減少客製化

正確答案: C

7.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線   速度,造成使用者點選網頁時需花很久的時間,再加上添購電子化設備費用昂   貴,最後導致成效不如預期而收編。由上可知,NOVA沒有考慮到什麼問題?   [單選]

A

.

A. 網路使用的安全性

B

.

B. 相關廠商的配合姓

C

.

C. 基礎設備的完整性

D

.

D. 目標市場的廣泛性

正確答案: C

8.一年一度的同學會又到了,為了以防萬一,柔柔立刻打開家中的桌上型電腦,上EZTABLE 網站將餐廳訂好。請問這個動作是屬於下列哪一個概念的範疇?(單選)

A

.

(A) 電子商務

B

.

(B) 產業電子化

C

.

(C) 企業電子化

D

.

(D) 行動商務

正確答案: A

9. 2009 年以來,便利商店紛紛提供電子化票券的服務,涵蓋遊樂園、交通、展覽等,將訂票的流程簡化,並利用促銷的方法吸引消費者接受與採用,像在 ibon 購票,憑票根就有咖啡買一送一的優惠。請問上述是屬於企業電子化的哪一個策略?(單選)

A

.

(A) 目標市場的選擇

B

.

(B) 創新產業的形成

C

.

(C) 聯盟夥伴的成立

D

.

(D) 企業需求的了解

正確答案: B

10.統一超商導入銷售時點系統 (POS),藉此系統來即時記錄顧客購買的產品、時間、年齡等資訊,以改善傳統人工記錄的不便,並提供管理者在制定決策時的參考。請問上述是屬於企業電子化帶來的何種效益?(單選)

A

.

(A) 流程技術的改革

B

.

(B) 顧客關係的發展

C

.

(C) 知識創新的提升

D

.

(D) 銷售管道的創立

正確答案: A

11.In 2020, the amount spent on local (digital) marketing is expected to exceed the amount spent on mobile marketing. 回答錯誤

B.X

12.Pinterest’s Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

13.Brand pages on Facebook typically attract more visitors than a brand's website.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

14.Pinterest's users are predominantly women.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

15.Which of the following statements about Google is not true?

A

.

A) Google has seven of the top 15 apps in terms of percentage of reach.

B

.

B) The prices Google can charge for mobile ads are higher than what it can charge for desktop computer ads.

C

.

C) Facebook surpassed Google in mobile advertising revenue for the first time in 2018.

D

.

D) About 65 % of all mobile search ad revenue is generated by Google.

正確答案: B

16.Which of the following has been a leader in enabling augmented reality for mobile marketing?

A

.

A) Twitter

B

.

B) Google

C

.

C) Snapchat

D

.

D) Apple

正確答案: C

17.Which of the following account for the vast majority of location-based mobile marketing?

A

.

A) Google and Twitter

B

.

B) Google and Facebook

C

.

C) Facebook and Twitter

D

.

D) Facebook and Instagram

正確答案: B

18.A cell phone's GPS is accurate to within five feet of the actual location of the phone.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

19.Dell電腦與全世界各地的電腦代工廠合作,由Dell接單後再將此電腦的   單據交給代工廠進行生產,像是鴻海精密就是Dell的一個主要生產商,鴻海   接單後在向上游的供應商備料來生產,而上游供應商則會事先準備一定的半成   品存量,藉此在限定的時間內完成產品的生產。請問Dell與鴻海的供應鏈是   屬於下列哪種?[單選]

A

.

A. 推式基礎的供應鏈

B

.

B. 推式+拉式基礎的供應鏈

C

.

C. 垂直式基礎的供應鏈

D

.

D. 拉式基礎的供應鏈

正確答案: B

20.下列敘述何者錯誤?(單選)

A

.

(A) 供應鏈是指從製造產品的原料、原物料、半成品,到製成品送至消費者手中的過程,包括供應商、製造商、配銷商、物流商等不同的企業,以處理產品由原物料到運送至消費者手中所需解決的金流、物流等問題

B

.

(B) 供應鏈導源於流通,原指軍方的後勤補給活動,隨著商業的蓬勃發展,逐漸推廣應用到商業活動上,其泛指能夠滿足消費者需求的產品流通過程,包括上、下游相關廠商都可納入供應鏈的範疇中

C

.

(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果

D

.

(D) 供應鏈管理具有協同整合、非核心業務外包、減少長鞭效應和即時、最佳化四種特性

正確答案: C

21.供應鏈管理的工具包括下列何者?(單選)

A

.

(A) 電子資料交換

B

.

(B) 企業資源規劃

C

.

(C) 供應鏈管理工具

D

.

(D) 以上皆是

正確答案: D

22.ZARA 在全球有數個趨勢記錄與預測的機構,以掌握衣服流行的趨勢變化,其將資料上傳至總部後,設計中心、生產中心、工廠等可從該資料庫中存取其所需的資訊,以縮短生產的製程時間。請問這是屬於供應鏈管理的何種特色?(單選)

A

.

(A) 減少長鞭效應

B

.

(B) 協同整合

C

.

(C) 非核心業務外包

D

.

(D) 洞察消費需求

正確答案: B

23.What is the first step in analyzing an ethical dilemma?

A

.

A) Define the conflict or dilemma and identify the higher-order values involved.

B

.

B) Identify the potential consequences of your opinions.

C

.

C) Identify the options you can reasonably take.

D

.

D) Identify and describe the facts.

正確答案: D

24.Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?

A

.

A) Universalism

B

.

B) Slippery Slope

C

.

C) The Social Contract Rule

D

.

D) The Golden Rule

正確答案: B

25.Which of the following is a core Fair Information Practices (FIP) principle?

A

.

A) Choice/Consent

B

.

B) Access/Participation

C

.

C) Security

D

.

D) Enforcement

正確答案: A

26.Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

A

.

A) Notice/Awareness

B

.

B) Choice/Consent

C

.

C) Access/Participation

D

.

D) Security

正確答案: A

27.Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

A

.

A) Notice/Awareness

B

.

B) Choice/Consent

C

.

C) Access/Participation

D

.

D) Security

正確答案: B

28.According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A

.

A) used an anonymous web browsing service

B

.

B) encrypted their communications

C

.

C) cleared web browser history and cookies

D

.

D) posted comments online anonymously

正確答案: C

29.As of 2020, the largest consumer privacy penalty issued by the Federal Trade Commission had been imposed on which of the following companies?

A

.

A) Google

B

.

B) Facebook

C

.

C) Uber

D

.

D) Apple

正確答案: B

30.The California Consumer Privacy Act (CCPA) does all of the following except:

A

.

A) give residents the right to be informed about the kind of personal information that is collected about them.

B

.

B) gives residents the right to opt out of the sale of their information.

C

.

C) gives residents the right to access their information in a usable format so they can transfer it to another service.

D

.

D) gives residents the right to prevent government access to their personal information.

正確答案: D

31.The Federal Communications Commission's privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

32.Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?

A

.

A) Field v. Google, Inc.

B

.

B) Alice Corporation Pty. Ltd. v. CLS Bank International

C

.

C) BMG Rights Management v. Cox Communications

D

.

D) Perfect 10, Inc. v. Amazon.com, Inc. et al.

正確答案: C

33.What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

A

.

A) the ability to make perfect copies of digital works at little cost

B

.

B) the anonymous nature of the Internet

C

.

C) the support for instant peer-to-peer communication

D

.

D) the use of standards for file formats

正確答案: A

34.Which case was instrumental in paving the way for Internet business methods patents?

A

.

A) Bilski et al. v. Kappos

B

.

B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.

C

.

C) Alice Corporation Pty. Ltd. v. CLS Bank International

D

.

D) Ticketmaster Corp. v. Tickets.com

正確答案: B

35.Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

A

.

A) cybersquatting.

B

.

B) cyberpiracy.

C

.

C) framing.

D

.

D) metatagging.

正確答案: A

36.手機與電池、香煙與打火機,這是屬於資料採擷中何種模式的應用?[   ]

A

.

A. 分類

B

.

B. 群聚/分群

C

.

C. 聯合性分析

D

.

D. 順序

正確答案: C

37.東森購物一開始開台時,利用叫賣的方式來吸引消費者上門,雖達到銷售   的成效,但也帶來大量的退、換貨成本。營運一段時間後,東森累積了一定程   度的顧客資料,也開始分析其擁有的顧客資訊以找出消費者的可能需求,開發   出真正符合顧客需求的產品。由上述例子可知,東森購物克服了什麼困難?[   ]

A

.

A. 初期效益不明顯

B

.

B. 廠商能力不足

C

.

C. 缺乏人才及共識

D

.

D. 與原系統間的整合不易

正確答案: A

38.以下何者可稱為忠誠顧客?(單選)

A

.

(A) 使用後非常滿意者

B

.

(B) 再次購買者

C

.

(C) 不但自己購買還推薦給他人

D

.

(D) 以上皆是

正確答案: D

39.The online retail sector of the retail industry is most similar to the ________ sector.

A

.

A) specialty stores

B

.

B) general merchandise

C

.

C) mail order/telephone order (MOTO)

D

.

D) consumer durables

正確答案: C

40.In 2020, the number of online buyers in the United States was around 205 million.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

41.Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

42.Which of the following is not categorized as an operating expense?

A

.

A) the cost of products being sold

B

.

B) marketing costs

C

.

C) administrative overhead

D

.

D) amortization of goodwill

正確答案: A

43.Within the major service industry groups, companies can be categorized generally into those that provide transaction brokering and those that involve which of the following?

A

.

A) retailing goods

B

.

B) personalization

C

.

C) information brokering

D

.

D) providing hands-on services

正確答案: D

44.Which of the following is not an example of a transaction broker?

A

.

A) a stockbroker

B

.

B) a real estate agent

C

.

C) an accountant

D

.

D) an employment agency

正確答案: C

45.All of the following services require extensive personalization except:

A

.

A) financial services.

B

.

B) legal services.

C

.

C) medical services.

D

.

D) accounting services.

正確答案: A

46.The online mortgage industry has transformed the process of obtaining a mortgage.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

47.The Covid-19 pandemic has severely impacted the online travel industry.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

48.Which of the following job recruitment companies is not a job listing aggregator?

A

.

A) Indeed

B

.

B) SimplyHired

C

.

C) Glassdoor

D

.

D) CareerBuilder

正確答案: D

49.Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?

A

.

A) South Dakota v. Wayfair

B

.

B) Bilski et al. v. Kappos

C

.

C) Quill v. North Dakota

D

.

D) Alice Corporation v. CLS Bank International

正確答案: A

50.Which of the following is not an e-commerce public safety and welfare issue?

A

.

A) regulation of gambling

B

.

B) regulation of cigarette sales

C

.

C) regulation of pornography

D

.

D) regulation of taxation

正確答案: D

1.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線   速度,造成使用者點選網頁時需要花很久的時間,再加上添購電子化設備費用   昂貴,最後導致成效不如預期而收編。由上述案例來看,除了外部影響外,   NOVA在內部還遇到哪個困難?[單選]

A

.

A. 導入時程過長

B

.

B. 系統無法整合

C

.

C. 導入費用過高

D

.

D. 系統流程僵化

正確答案: C

2.阿宏是某家企業的老闆,最近想將企業電子化,於是他考慮到企業內部的   電腦等級、資料庫建立情況與資料庫分析的能力。請問這類的問題較接近哪個   面向?[單選]

A

.

A. 財務面

B

.

B. 流程面

C

.

C. 資訊面

D

.

D. 人員面

正確答案: C

3.「建立制定電子化經營策略的準則,藉此找到符合企業所需,能讓企業有   效提高競爭力的資訊科技。」上述是指企業電子化的策略規劃程序之哪個步   驟?[單選]

A

.

A. 交易模式的建立

B

.

B. 成果評估與回饋

C

.

C. 建立企業願景

D

.

D. 創新產業的形成

正確答案: C

4.中華汽車為了提高公司的競爭力而導入一套系統可以建立個人知識平台並與工作管理系統進行結合,經由工作社群網路來建立不同的知識社群,進而發展出團隊的作業模式與規範。請問這套系統是?(單選)

A

.

(A) 企業資源規劃

B

.

(B) 顧客關係管理

C

.

(C) 商業智慧

D

.

(D) 知識管理

正確答案: D

5.PChome Online 商店街推出後,強打免上架費、免月租與手續費打折等優惠,讓許多網拍業者達成開店的夢想,這是屬於企業電子化帶來的何種效益?(單選)

A

.

(A) 流程技術的改革

B

.

(B) 顧客關係的發展

C

.

(C) 知識創新的提升

D

.

(D) 銷售管道的創立

正確答案: D

6.Which of the following attracts a highly educated, professional and managerial audience?

A

.

A) Snapchat

B

.

B) TikTok

C

.

C) LinkedIn

D

.

D) Instagram

正確答案: C

7.Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

A

.

A) Promoted Trends

B

.

B) Amplify

C

.

C) Twitter Cards

D

.

D) Promoted Accounts

正確答案: B

8.Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?

A

.

A) They have a tiny tag indicating that they are sponsored.

B

.

B) They can be liked, shared, and commented on, just like any news feed post.

C

.

C) They cannot contain links.

D

.

D) They have social context.

正確答案: C

9.Which of the following statements about COPPA is not true?

A

.

A) COPPA is not applicable to Internet of Thing (IoT) devices.

B

.

B) COPPA can only be enforced by the Federal Trade Commission.

C

.

C) COPPA provides that companies are not permitted to use personal information collected from children under 13 years of age without the verifiable prior consent of their parents.

D

.

D) The largest fine levied by the FTC under COPPA as of 2020 was against Google and YouTube.

正確答案: A

10.Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?

A

.

A) Facebook

B

.

B) YouTube

C

.

C) Pinterest

D

.

D) Instagram

正確答案: A

11.Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users?

A

.

A) engagement

B

.

B) information density

C

.

C) social density

D

.

D) amplification

正確答案: C

12.Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?

A

.

A) social density

B

.

B) dark social

C

.

C) amplification

D

.

D) engagement

正確答案: B

13.Which of the following involves using a variety of tools to encourage users to interact with content and brand?

A

.

A) social density

B

.

B) engagement

C

.

C) amplification

D

.

D) dark social

正確答案: B

14.Facebook does not sell display ads.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

15.Pinterest's users are predominantly women.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

16.In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

17.Which of the following is the most popular use for mobile devices?

A

.

A) shopping

B

.

B) socializing

C

.

C) entertainment

D

.

D) performing tasks, such as finances

正確答案: C

18.Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

19.SMS text messaging generates most of mobile marketing spending.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

20.Apple's iBeacon uses which of the following technologies?

A

.

A) BLE

B

.

B) NFC

C

.

C) E9-1-1

D

.

D) QR codes

正確答案: A

21.Dell電腦與全世界各地的電腦代工廠合作,由Dell接單後再將此電腦的   單據交給代工廠進行生產,像是鴻海精密就是Dell的一個主要生產商,鴻海   接單後在向上游的供應商備料來生產,而上游供應商則會事先準備一定的半成   品存量,藉此在限定的時間內完成產品的生產。請問Dell與鴻海的供應鏈是   屬於下列哪種?[單選]

A

.

A. 推式基礎的供應鏈

B

.

B. 推式+拉式基礎的供應鏈

C

.

C. 垂直式基礎的供應鏈

D

.

D. 拉式基礎的供應鏈

正確答案: B

22.下列敘述何者錯誤?(單選)

A

.

(A) 供應鏈是指從製造產品的原料、原物料、半成品,到製成品送至消費者手中的過程,包括供應商、製造商、配銷商、物流商等不同的企業,以處理產品由原物料到運送至消費者手中所需解決的金流、物流等問題

B

.

(B) 供應鏈導源於流通,原指軍方的後勤補給活動,隨著商業的蓬勃發展,逐漸推廣應用到商業活動上,其泛指能夠滿足消費者需求的產品流通過程,包括上、下游相關廠商都可納入供應鏈的範疇中

C

.

(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果

D

.

(D) 供應鏈管理具有協同整合、非核心業務外包、減少長鞭效應和即時、最佳化四種特性

正確答案: C

23.ZARA 在全球有數個趨勢記錄與預測的機構,以掌握衣服流行的趨勢變化,其將資料上傳至總部後,設計中心、生產中心、工廠等可從該資料庫中存取其所需的資訊,以縮短生產的製程時間。請問這是屬於供應鏈管理的何種特色?(單選)

A

.

(A) 減少長鞭效應

B

.

(B) 協同整合

C

.

(C) 非核心業務外包

D

.

(D) 洞察消費需求

正確答案: B

24.造成長鞭效應現象的原因有?(單選)

A

.

(A) 安全存量的設立

B

.

(B) 批次訂購的行為

C

.

(C) 價格變動的預期

D

.

(D) 以上皆是

正確答案: D

25.Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A

.

A) accountability

B

.

B) privacy

C

.

C) responsibility

D

.

D) liability

正確答案: B

26.Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A

.

A) The Golden Rule

B

.

B) Risk Aversion Principle

C

.

C) Collective Utilitarian Principle

D

.

D) The Social Contract Rule

正確答案: C

27.Downloading a music track owned by a record company without paying for it is an example of a violation of:

A

.

A) patent law.

B

.

B) copyright law.

C

.

C) trademark law.

D

.

D) privacy law.

正確答案: B

28.Which of the following is used to track individuals as they move among thousands of websites?

A

.

A) first-party cookies

B

.

B) digital wallets

C

.

C) advertising networks

D

.

D) shopping carts

正確答案: C

29.Which of the following is a core Fair Information Practices (FIP) principle?

A

.

A) Choice/Consent

B

.

B) Access/Participation

C

.

C) Security

D

.

D) Enforcement

正確答案: A

30.According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A

.

A) used an anonymous web browsing service

B

.

B) encrypted their communications

C

.

C) cleared web browser history and cookies

D

.

D) posted comments online anonymously

正確答案: C

31.In the United States, Google is not required to remove results from its search engine if requested.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

32.The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

33.Which of the following protects original forms of expression in a tangible medium?

A

.

A) trade secret law

B

.

B) copyright law

C

.

C) patent law

D

.

D) trademark law

正確答案: B

34.Disputes over federal trademarks involve establishing:

A

.

A) underlying ideas.

B

.

B) intent.

C

.

C) piracy.

D

.

D) infringement.

正確答案: D

35.In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

A

.

A) State Street Bank & Trust v. Signature Financial Group, Inc.

B

.

B) Bilski et al. v. Kappos

C

.

C) Alice Corporation Pty. Ltd. v. CLS Bank International

D

.

D) BMG Rights Management v. Cox Communications

正確答案: C

36.Which of the following is not an e-commerce public safety and welfare issue?

A

.

A) regulation of gambling

B

.

B) regulation of cigarette sales

C

.

C) regulation of pornography

D

.

D) regulation of taxation

正確答案: D

37.Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others. 回答錯誤

是非題 (2 ) 0

A.O

正確答案: A

38.資料倉儲(Data Warehousing)技術主要用於哪一種企業電子化功能?[單選]

C. CRM

39.在顧客關係管理的成功要素中,最重要的是?[單選]

B.

40.導入CRM之各個時期都必須獲得公司各部門鼎力合作才能真正成功,這   是在解決顧客關係管理的哪項失敗因素?[單選]

D. 缺乏人才與共識

正確答案: D

41.In 2020, it was estimated that about what percentage of Internet users over the age of 14 would make a purchase at an online retail store?

A

.

A) 40%

B

.

B) 60%

C

.

C) 70%

D

.

D) 80%

正確答案: D

42.In 2020, the number of online buyers in the United States was around 205 million.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

43.Operating margin is defined as:

A

.

A) operating income or loss divided by net sales revenues.

B

.

B) operating income or loss divided by total operating expenses.

C

.

C) net sales revenues divided by net income or loss.

D

.

D) net assets divided by net liabilities.

正確答案: A

44.The term supply-push refers to:

A

.

A) making products prior to orders being received based on estimated demand.

B

.

B) waiting for orders to be received before building a product.

C

.

C) channel conflict.

D

.

D) multi-channel manufacturers who sell directly online to consumers.

正確答案: A

45.All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:

A

.

A) moving to a demand-pull model.

B

.

B) high-cost structures.

C

.

C) developing a fast-response online order and fulfillment system.

D

.

D) channel conflict.

正確答案: B

46.In the United States, the service sector accounts for approximately ________ % of the United States GDP.

A

.

A) 70

B

.

B) 75

C

.

C) 80

D

.

D) 85

正確答案: C

47.The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line?

A

.

A) term life insurance

B

.

B) automobile insurance

C

.

C) health insurance

D

.

D) property and casualty insurance

正確答案: A

48.The Covid-19 pandemic has severely impacted the online travel industry.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

49.Which of the following is not true about on-demand service firms?

A

.

A) The growth of on-demand service firms is supported using online reputation systems based on peer review.

B

.

B) It is not likely that on-demand service firms will totally escape government regulation.

C

.

C) On-demand service firms facilitate access to resources.

D

.

D) On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.

正確答案: D

50.Which of the following is not an e-commerce public safety and welfare issue?

A

.

A) regulation of gambling

B

.

B) regulation of cigarette sales

C

.

C) regulation of pornography

D

.

D) regulation of taxation

正確答案: D

匯豐汽車藉由資訊科技將複雜的汽車維修流程建立標準化程序,如此一來   能提高工作與管理效率。請問這屬於下列何種概念?[單選]

A

.

A. 企業流程再造

B

.

B. 顧客關係管理

C

.

C. 商業智慧

D

.

D. 知識管理

正確答案: A

2.ERP」是指?[單選]

A

.

A. 企業資源規劃

B

.

B. 供應鏈管理

C

.

C. 顧客關係管理

D

.

D. 知識管理

正確答案: A

3.信義房屋在業務員專屬的行動通訊設備裝上可以主動提醒和個人秘書的設定功能,而且只要在無線網路的連結下,業務員便可以隨時隨地連上公司的系統,節省報表往返時間,提高銷售成交的機率。請問這套系統較符合下列何種概念?(單選) 回答錯誤

A

.

(A) 企業資源規劃

B

.

(B) 顧客關係管理

C

.

(C) 供應鏈管理

D

.

(D) 知識管理

正確答案: A

4. 2009 年以來,便利商店紛紛提供電子化票券的服務,涵蓋遊樂園、交通、展覽等,將訂票的流程簡化,並利用促銷的方法吸引消費者接受與採用,像在 ibon 購票,憑票根就有咖啡買一送一的優惠。請問上述是屬於企業電子化的哪一個策略?(單選)

A

.

(A) 目標市場的選擇

B

.

(B) 創新產業的形成

C

.

(C) 聯盟夥伴的成立

D

.

(D) 企業需求的了解

正確答案: B

5.Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

A

.

A) Promoted Trends

B

.

B) Amplify

C

.

C) Twitter Cards

D

.

D) Promoted Accounts

正確答案: B

6.All of the following are Pinterest marketing tools except:

A

.

A) Brand pages.

B

.

B) Rich Pins.

C

.

C) Promoted Pins.

D

.

D) Promoted Accounts.

正確答案: D

7.Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

A

.

A) TweetDeck

B

.

B) Curalate

C

.

C) Amplify

D

.

D) Webtrends

正確答案: B

8.Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?

A

.

A) Facebook

B

.

B) YouTube

C

.

C) Pinterest

D

.

D) Instagram

正確答案: A

9.Which of the following statements about Instagram is not true?

A

.

A) Instagram is owned by Facebook.

B

.

B) Instagram’s most rapidly growing demographic group is comprised of people under the age of 35.

C

.

C) Instagram is expected to generate around $16 billion in ad revenues in 2020.

D

.

D) Instagram has over 1 billion users worldwide.

正確答案: B

10.Which of the following involves using a variety of tools to encourage users to interact with content and brand?

A

.

A) social density

B

.

B) engagement

C

.

C) amplification

D

.

D) dark social

正確答案: B

11.Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

A

.

A) Graph Search

B

.

B) Like button

C

.

C) Messenger

D

.

D) Open Graph

正確答案: D

12.Brand pages on Facebook typically attract more visitors than a brand's website.

是非題 (2 ) 2

A.O

13.Promoted Video is the source of over 60% of Twitter’s ad revenue.

是非題 (2 ) 2

A.O

14.Which of the following statements about Google is not true?

B) The prices Google can charge for mobile ads are higher than what it can charge for desktop computer ads.

15.Which of the following is the most popular use for mobile devices?

C) entertainment

16.Which of the following statements about BLE is not true?

A

.

A) Only Apple iPhones can use BLE.

B

.

B) BLE uses less power than traditional Bluetooth or GPS.

C

.

C) BLE has a two-way, push-pull communication capability.

D

.

D) BLE is more accurate than targeting through Wi-Fi triangulation.

正確答案: A

17.Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

18.Google uses which of the following to build a global database of wireless access points and their geographic locations?

A

.

A) E9-1-1

B

.

B) Street View cars

C

.

C) iBeacons

D

.

D) BLE

正確答案: B

19.各個企業可分享自己手上所獲得的資訊,讓相關廠商都能獲知正確的需求   量,避免加入過高的安全存量來降低長鞭效應所造成的影響。請問上述是啤酒   遊戲的哪個解決方式?[單選]

A

.

A. 資訊分享面

B

.

B. 策略發展面

C

.

C. 知識管理面

D

.

D. 技術分享面

正確答案: A

20.以下何者不是供應鏈管理的特性?[單選]

A

.

A. 非核心業務外包

B

.

B. 社群連結與溝通

C

.

C. 即時、最佳化

D

.

D. 減少長鞭效應

正確答案: B

21.「流程整合重點放在使功能性成本最小化,人員被視為可取代的資產,主   要投資標的在設備修正及調整上面。」這是屬於供應鏈中的何種角色?[單選] 回答錯誤

A. 有回應的供應商

22.供應鏈管理的工具包括下列何者?(單選)

(D) 以上皆是

23.供應鏈管理的發展流程為以下何者?(單選)

(B) 單一企業階段物流管理階段運籌管理階段供應鏈管理階段

24.博客來網路書店面對需求量不高的冷門書籍,大多是採接單後才向書商訂書,藉此降低本身的庫存成本。請問博客來網路書店是屬於何種供應鏈?(單選)

(B) 拉式基礎的供應鏈

25.供應鏈成員的充分合作,將整體供應鏈整合成單一虛擬企業,共同制定供應鏈生產的策略、數量和其他的內容,以解決長鞭效應所造成需求變動的問題。這是屬於解決長鞭效應的哪種面向?(單選)

(D) 供應鏈整合面

26.Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A

.

A) accountability

B

.

B) privacy

C

.

C) responsibility

D

.

D) liability

正確答案: B

27.What is the first step in analyzing an ethical dilemma?

A

.

A) Define the conflict or dilemma and identify the higher-order values involved.

B

.

B) Identify the potential consequences of your opinions.

C

.

C) Identify the options you can reasonably take.

D

.

D) Identify and describe the facts.

正確答案: D

28.Downloading a music track owned by a record company without paying for it is an example of a violation of:

A

.

A) patent law.

B

.

B) copyright law.

C

.

C) trademark law.

D

.

D) privacy law.

正確答案: B

29.Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

30.The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

31.Which of the following is considered one of the most contentious e-commerce patents?

A

.

A) Acacia Technologies’ patent on streaming video media transmission

B

.

B) Priceline’s patent on buyer-driven name your price tools

C

.

C) Amazon’s patent on one-click purchasing

D

.

D) Google's PageRank patent

正確答案: C

32.Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all the following lawsuits except:

A

.

A) a lawsuit filed by the Authors Guild and five major publishing companies against Google

B

.

B) a lawsuit brought by Viacom against YouTube and Google

C

.

C) BMG Rights Management v. Cox Communications.

D

.

D) Mavrix Photographs, LLC v. LiveJournal, Inc.

正確答案: A

33.All of the following cases involved the doctrine of fair use except:

A

.

A) Spokeo v. Robins

B

.

B) Perfect 10, Inc. v. Amazon.com, Inc. et al.

C

.

C) Field v. Google, Inc.

D

.

D) Kelly v. Arriba Soft.

正確答案: A

34.Copyright protection protects against others copying the underlying ideas in a work.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

35.Which of the following involves the issue of social control?

A

.

A) information rights

B

.

B) governance

C

.

C) public safety and welfare

D

.

D) property rights

正確答案: B

36.Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

37.阿仁很喜歡上Facebook看網友們分享的一些有趣的經驗,但麻煩的是,   一定要按讚才能看到內容。請問這屬於顧客關係管理的哪個階段?[單選]

A

.

A. 技術與策略階段

B

.

B. 蒐集與接觸階段

C

.

C. 互動與修改階段

D

.

D. 區隔與價值階段

正確答案: A

38.Which of the following statements is not true about the automobile, and automobile parts and accessories, online retail category?

A

.

A) Most of the revenue in this category is generated from the sales of automobiles.

B

.

B) Automobile manufacturers use the Internet to deliver branding advertising.

C

.

C) U.S. franchising law prohibits automobile manufacturers from selling cars directly to consumers.

D

.

D) Automobile retailing is dominated by dealership networks.

正確答案: A

39.In 2020, the number of online buyers in the United States was around 205 million.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

40.Personal consumption of retail goods and services accounts for over 80% of total gross domestic product (GDP).

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: B

41.All of the following are strategic factors that pertain specifically to a firm and its related businesses except:

A

.

A) core competencies.

B

.

B) synergies.

C

.

C) technology.

D

.

D) power of customers.

正確答案: D

42.Omni-channel merchants are also referred to as:

A

.

A) virtual merchants.

B

.

B) bricks-and-clicks companies.

C

.

C) catalog merchants.

D

.

D) manufacturer-direct firms.

正確答案: B

43.Which of the following is a subscription-based retailer using predictive marketing and big data?

A

.

A) Macy's

B

.

B) Stitch Fix

C

.

C) Dell

D

.

D) Lands' End

正確答案: B

44.Virtual merchants face potentially large costs for all of the following except:

A

.

A) building and maintaining a website.

B

.

B) building and maintaining physical stores.

C

.

C) building an order fulfillment infrastructure.

D

.

D) developing a brand name.

正確答案: B

45.All of the following are challenges faced by bricks-and-clicks firms except:

A

.

A) coordinating prices across channels.

B

.

B) handling returns of online purchases at retail outlets.

C

.

C) building a credible website.

D

.

D) building a brand name.

正確答案: D

46.In the United States, the service sector accounts for approximately ________ % of the United States GDP.

A

.

A) 70

B

.

B) 75

C

.

C) 80

D

.

D) 85

正確答案: C

47.________ provides notices called Consumer Alerts to inform readers when a review is likely to be fraudulent.

A

.

A) Yelp

B

.

B) TripAdvisor

C

.

C) Angie's List

D

.

D) TripExpert

正確答案: A

48.What is the largest sector of the online travel services market in terms of revenue?

A

.

A) hotel reservations

B

.

B) car reservations

C

.

C) cruise/tour reservations

D

.

D) airline reservations

正確答案: D

49.The social network LinkedIn has become major player in the online recruitment market.

是非題 (2 ) 2

A

.

O

B

.

X

正確答案: A

50.Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?

A) South Dakota v. Wayfair

18.主要是以顧客需求為基礎來整合企業生產的活動,包括需求預測、配送、   存貨管理、產品包裝等,以管控產品的生產過程。請問上述是指供應鏈管理發   展的哪一個時期?[單選] 回答錯誤

D. 運籌管理階段

正確答案: D

(T/F) A cell phone's GPS is accurate to within five feet of the actual location of the phone.

False

Ads that appear in a Facebook user's News Feed are called:

Page Post Ads.

All of the following are Pinterest marketing tools except:

Promoted Pins.

All of the following are examples of dark social except:

tweets.

All of the following marketing tools on Facebook require payment except:

Brand Pages.

All of the following were popular types of online marketing before 2007 except:

mobile marketing.

Apple's iBeacon uses which of the following technologies?

BLE

As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:

Facebook Live.

(T/F) Both mobile and social advertising spending are expected to double from 2017 to 2021.

True

(T/F) Brand pages on Facebook typically attract more visitors than a brand's website.

True

By 2022, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?

$130 billion

Companies are not permitted to collect personal information from children under the age of ________ without parental consent.

13

(T/F) Eddystone is an open-source standard for beacon technology.

True

Encouraging users to click a Like button is an example of which step in the social marketing process?

amplification

(T/F) Facebook does not sell display ads.

False

Google uses which of the following to build a global database of wireless access points and their geographic locations?

Street View cars

(T/F) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.

True

In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?

40

In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?

$25 billion

(T/F) In 2020, the amount spent on local (digital) marketing is expected to exceed the amount spent on mobile marketing.

True

(T/F) Influencer marketing is a method of generating customer engagement.

True

On average, users use about ________ apps a month on their smartphone.

20

People spend the most time doing which of the following when using a mobile device?

listening to music

(T/F) Pinterest's Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.

True

(T/F) Pinterest's users are predominantly women.

True

(T/F) Promoted Video is the source of over 60% of Twitter's ad revenue.

True

(T/F) Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues.

True

(T/F) SMS text messaging generates most of mobile marketing spending.

False

The number of people exposed to pins on Pinterest is a measure of which of the following?

fan acquisition

The ratio of impressions to fans is a measure of:

fan acquisition.

(T/F) TikTok is owned by Facebook.

False

(T/F) Traditional retail products and travel services are the source of much of the current growth in m-commerce.

True

Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?

Twitter Card

Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

Amplify

Which of the following account for the vast majority of location-based mobile marketing?

Google and Facebook

Which of the following allows Facebook to track user behavior on other sites?

Like button

Which of the following are features of both Pinterest and Twitter?

hashtags

Which of the following attracts a highly educated, professional and managerial audience?

LinkedIn

Which of the following dominates the local mobile search market?

Google

Which of the following generates the most mobile ad spending?

search engine advertising

Which of the following involves using a variety of tools to encourage users to interact with content and brand?

engagement

Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?

amplification

Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

Open Graph

Which of the following is a history of your actions on Facebook?

Timeline

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

Curalate

Which of the following is another term for amplification?

reach

Which of the following is a not a type of Rich Pin?

Instant Pin

Which of the following is most similar to Pinterest?

Instagram

Which of the following is the first step in the social marketing process?

fan acquisition

Which of the following is the leading mobile retailer in the United States?

Amazon

Which of the following is the most popular use for mobile devices?

entertainment

Which of the following is not a major provider of mobile display advertising?

Webtrends

Which of the following is not a technology for enabling proximity marketing?

Lens Studio

Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?

They cannot contain links.

Which of the following is not true about mobile marketing?

People use most of their mobile minutes while they are on the go, outside of the home.

Which of the following is not true about social marketing?

More than 50% of Twitter's ad revenues are generated by desktop users.

Which of the following proximity marketing technologies did Macy's deploy in many of its retail stores in 2014?

iBeacon

Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?

dark social

Which of the following statements about BLE is not true?

Only Apple iPhones can use BLE.

Which of the following statements about COPPA is not true?

COPPA is not applicable to Internet of Thing (IoT) devices.

Which of the following statements about Instagram is not true?

Instagram's most rapidly growing demographic group is comprised of people under the age of 35.

Which of the following statements about Pinterest is not true?

Pinterest is the only one of the major social networks that does not accept paid advertising.

Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?

Twitter

Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?

Facebook

Your Facebook News Feed includes all of the following except:

tweets.

which of the following is not one of the four basic principles shared by ethical schools of thought in western culture

privacy

what is the first step in analyzing an ethical dilemma

identify and describe the facts

which ethical principle tells you that it is wise to assume perfect information markets

the new york times test

which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm or the least potential cost

risk aversion

downloading music tracks owned by record companies without payinf for them is an example of a violation of

copyright law

liability is a feature of political system in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations

true

the principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions

false

which of the following basic ethical concepts plays an important role in defining privacy

due process

which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?

search engines

which of the following can be used to record all keyboard activity of a user

spyware

which of the following is a core Fair Information Practices (FIP) principle

choice/consent

which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data

notice/awareness

which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place

choice/consent

what is the FTC recommendation regarding choice as it relates to personally idnetifiable information (PII)

require firms to have consumers affirmatively opt-in before PII is collected

which of the following technologies allows you to send e-mail without a trace

anonymous remailers

which of the following operated the largest private personal database in the world

acxiom

in the united states, google is not required to remove results from its search engine if requested

true

most adult social network participants do not have any expectation of personal privacy when using social network

false

the opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information

true

the european data protection directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies

true

the adchoices program is an industry-sponsored initiative to encourage web sites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users

true

what is the major reason that the internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

the ablility to make perfect copie of digital works at little cost

which of the following protects original forms of expression in a tangible medium

copyright law

how long does copyright protection extend for corporate-owned works

95 years

which of the following situations would not qualify for the fair use exception to US copyright law

a student copies a photograph of his favorite band from a web site created by the bands record label and places it on the students personal web site

all of the following are factors that will be considered in determing whether use of copyrighted material is "fair use" except the

free availibility of the work on the web

all of the following statements about the digital millenium copyright act (DMCA) are true except

the DMCA makes internet service providers (ISPs) responsible and accountable for hosting web sites or providing services to infringes regardless of whether the ISP is aware of infringement

all of the following statements about patents are true except

it is more difficult to obtain a copyright than it is to obtain a patent

amazon has a patent on

one-click purchasing.

registering a domain name similar or identical to trademarks of others to export profits from legitimate holders is an example of

cybersquatting

regstiring a domain name similar or identical to trademarks of others to divert web traffic to their own sites is an example of

cyberpiracy

the display of a third party's web site within your own web site is called

framing

which of the following involves bypassing the target sites home page and going directly to a content page

deep linking

copyright protection protects against others copying the inderlying ideas in a work

false

which of the following is not one of the issues complicating the taxation of e-commerce sales

taxes raised are used for different governemrent purposes

section 230 of the communications decency act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and web sites) from being considered a publisher that might be liable for harmful content posted by others

true

online gambling is now legal throughout the united states

false

1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A) information density

B) interactivity

C) social technology

D) ubiquity

C) social technology

2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A) ubiquity

B) interactivity

C) information density

D) global reach

D) global reach

3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A) accountability

B) privacy

C) responsibility

D) liability

B) privacy

4) What is the first step in analyzing an ethical dilemma?

A) Define the conflict or dilemma and identify the higher-order values involved.

B) Identify the potential consequences of your opinions.

C) Identify the options you can reasonably take.

D) Identify and describe the facts.

D) Identify and describe the facts.

5) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A) the Golden Rule

B) Risk Aversion

C) the Collective Utilitarian principle

D) the Social Contract rule

C) the Collective Utilitarian principle

6) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A) the Golden Rule

B) Universalism

C) the Collective Utilitarian principle

D) the Social Contract rule

A) the Golden Rule

7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A) the Golden Rule

B) the Slippery Slope

C) the Social Contract rule

D) No Free Lunch

D) No Free Lunch

8) Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

A) Universalism

B) the Slippery Slope

C) the Social Contract rule

D) the Golden Rule

B) the Slippery Slope

9) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

A) the Golden Rule

B) Risk Aversion

C) the Slippery Slope

D) the Social Contract rule

D) the Social Contract rule

10) Which ethical principle tells you it's wise to assume perfect information markets?

A) the Golden Rule

B) the New York Times test

C) the Social Contract rule

D) the Collective Utilitarian principle

B) the New York Times test

11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A) the Slippery Slope

B) Risk Aversion

C) No Free Lunch

D) the Collective Utilitarian principle

B) Risk Aversion

12) A social consequence of the richness of Internet information is:

A) an increase in shallowness.

B) an increase in the ease of creating misleading information.

C) very persuasive messages might reduce the need for multiple independent sources of information.

D) an increase in vulnerability to hacking attacks.

C) very persuasive messages might reduce the need for multiple independent sources of information.

13) Downloading a music track owned by a record company without paying for it is an example of a violation of:

A) patent law.

B) copyright law.

C) trademark law.

D) privacy law.

B) copyright law.

14) Which of the following features of e-commerce technology can result in work and shopping invading family life?

A) interactivity

B) ubiquity

C) information density

D) global reach

B) ubiquity

20) Which of the following basic ethical concepts plays an important role in defining privacy?

A) responsibility

B) accountability

C) liability

D) due process

D) due process

21) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

A) USA PATRIOT Act

B) Homeland Security Act

C) Communications Assistance for Law Enforcement Act

D) USA Freedom Act

D) USA Freedom Act

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A) information density

B) interactivity

C) social technology

D) ubiquity

C

Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A) ubiquity

B) interactivity

C) information density

D) global reach

D

Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A) accountability

B) privacy

C) responsibility

D) liability

B

What is the first step in analyzing an ethical dilemma?

A) Define the conflict or dilemma and identify the higher-order values involved.

B) Identify the potential consequences of your opinions.

C) Identify the options you can reasonably take.

D) Identify and describe the facts.

D

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A) the Golden Rule

B) Risk Aversion

C) the Collective Utilitarian principle

D) the Social Contract rule

C

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A) the Golden Rule

B) Universalism

C) the Collective Utilitarian principle

D) the Social Contract rule

A

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A) the Golden Rule

B) the Slippery Slope

C) the Social Contract rule

D) No Free Lunch

D

Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

A) Universalism

B) the Slippery Slope

C) the Social Contract rule

D) the Golden Rule

B

Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

A) the Golden Rule

B) Risk Aversion

C) the Slippery Slope

D) the Social Contract rule

D

Which ethical principle tells you it's wise to assume perfect information markets?

A) the Golden Rule

B) the New York Times test

C) the Social Contract rule

D) the Collective Utilitarian principle

B

Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A) the Slippery Slope

B) Risk Aversion

C) No Free Lunch

D) the Collective Utilitarian principle

B

A social consequence of the richness of Internet information is:

A) an increase in shallowness.

B) an increase in the ease of creating misleading information.

C) very persuasive messages might reduce the need for multiple independent sources of information.

D) an increase in vulnerability to hacking attacks.

C

Downloading a music track owned by a record company without paying for it is an example of a violation of:

A) patent law.

B) copyright law.

C) trademark law.

D) privacy law.

B

Which of the following features of e-commerce technology can result in work and shopping invading family life?

A) interactivity

B) ubiquity

C) information density

D) global reach

B

Which of the following basic ethical concepts plays an important role in defining privacy?

A) responsibility

B) accountability

C) liability

D) due process

D

Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

A) USA PATRIOT Act

B) Homeland Security Act

C) Communications Assistance for Law Enforcement Act

D) USA Freedom Act

D

________ can be used to record all keyboard activity of a user.

A) Shopping carts

B) Trusted computing environments

C) Spyware

D) DRM

C

Which of the following statements about industry self-regulation regarding privacy is not true? OPA- online privacy alliance

A) OPA members are required to implement the OPA's privacy guidelines.

B) The primary focus of industry efforts has been the use of online "seals" that attest to the site's policies.

C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion.

D) The NAI's privacy policies have established the TRUSTe seal.

D

The Spokeo case involved a claim for damages based on which of the following?

A) Fair Credit Reporting Act

B) Digital Millennium Copyright Act

C) Anticybersquatting Consumer Protection Act

D) Defend Trade Secrets Act

A

Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

A) Freedom of Information Act

B) Gramm-Leach-Bliley Act

C) COPPA

D) HIPAA

B

Which of the following is a core Fair Information Practices (FIP) principle?

A) Choice/Consent

B) Access/Participation

C) Security

D) Enforcement

A

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

A) Notice/Awareness

B) Choice/Consent

C) Access/Participation

D) Security

A

Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

A) Notice/Awareness

B) Choice/Consent

C) Access/Participation

D) Security

B

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A) Require firms to have consumers affirmatively opt-in before PII is collected.

B) Require firms to allow consumers to opt-out before PII is collected.

C) Make collection of PII illegal.

D) Require robust notice only before PII is collected.

A

"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?

A) Privacy by Design

B) Simplified Choice

C) Greater Transparency

D) Scope

B

Which of the following technologies reduces the ability to merge different files and deanonymize consumer data?

A) anonymous surfing

B) anonymous remailers

C) differential privacy software

D) public key encryption

C

Which of the following is an example of a pay-for-privacy (PFP) approach?

A) AT&T's GigaPower service

B) Meeco.me's life management tool

C) Digi.me's app

D) The Hub of All Thing's open source project

A

According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A) used an anonymous web browsing service

B) encrypted their communications

C) cleared web browser history and cookies

D) posted comments online anonymously

C

Which of the following statements about the E.U. General Data Protection Regulation (GDPR) is not true?

A) The GDPR replaces the E.U.'s existing Data Protection Directive.

B) The GDPR applies to any firm operating in any E.U. country.

C) The GDPR eliminates the right to be forgotten.

D) The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.

C

As of 2020, the largest consumer privacy penalty issued by the Federal Trade Commission had been imposed on which of the following companies?

A) Google

B) Facebook

C) Uber

D) Apple

B

The California Consumer Privacy Act (CCPA) does all of the following except:

A) give residents the right to be informed about the kind of personal information that is collected about them.

B) gives residents the right to opt out of the sale of their information.

C) gives residents the right to access their information in a usable format so they can transfer it to another service.

D) gives residents the right to prevent government access to their personal information.

D

All of the following are required in order for information to be considered a trade secret except:

A) it must have commercial value to its owner.

B) the owner must have taken steps to protect it.

C) it must be unique.

D) it must be something that others do not know.

C

Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?

A) Field v. Google, Inc.

B) Alice Corporation Pty. Ltd. v. CLS Bank International

C) BMG Rights Management v. Cox Communications

D) Perfect 10, Inc. v. Amazon.com, Inc. et al.

C

________ is a tiered notice and response system aimed at reducing copyright infringement over P2P networks.

A) The CAS

B) FIP

C) Surfright

D) The Open Internet Order

A

What is the major reason the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

A) the ability to make perfect copies of digital works at little cost

B) the anonymous nature of the Internet

C) the support for instant peer-to-peer communication

D) the use of standards for file formats

A

_______ protects original forms of expression in a tangible medium.

A) Trade secret law

B) Copyright law

C) Patent law

D) Trademark law

B

How long does copyright protection extend for corporate-owned works?

A) 25 years

B) 50 years

C) 75 years

D) 95 years

D

Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

A) A professor clips a newspaper article just before class and distributes copies of it to his class.

B) A journalist quotes a paragraph from a book in a review of the book.

C) A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

D) Google posts thumbnail images of books in the Google Book Search Project.

C

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

A) nature of the work used.

B) amount of the work used.

C) market effect of the use.

D) free availability of the work on the Web

D

All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

A) up to ten years' imprisonment for a first offense.

B) fines up to $500,000 for a first offense.

C) fines up to $1 million for a repeat offense.

D) restitution to the injured parties for any losses due to infringement.

A

All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:

A) the DMCA makes it illegal to circumvent technological measures to protect works.

B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.

C) the DMCA requires search engines to block access to infringing sites.

D) the DMCA allows libraries to make digital copies of works for internal use only.

B

________ allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years.

A) Copyright law

B) Trade secret law

C) Patent law

D) Trademark law

C

All of the following statements about patents are true except:

A) it is more difficult to obtain a copyright than it is to obtain a patent.

B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.

C) computer programs can be patented.

D) to be patented, an invention must be nonobvious.

A

Which case was instrumental in paving the way for Internet business methods patents?

A) Brown Bag v. Symantec

B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.

C) Alice Corporation Pty. Ltd. v. CLS Bank International

D) Ticketmaster Corp. v. Tickets.com

B

Amazon has a patent on: one of the most contentious e-commerce patents?

A) download-based sales.

B) display of third-party advertisements in floating windows.

C) one-click purchasing.

D) hyperlinks.

C

Disputes over federal trademarks involve establishing:

A) underlying ideas.

B) intent.

C) piracy.

D) infringement.

D

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

A) cybersquatting.

B) cyberpiracy.

C) framing.

D) metatagging.

A

Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?

A) ICANN

B) FTC

C) WIPO

D) USPTO

C

Registering a domain name similar or identical to trademarks of others to divert web traffic to their own sites is an example of:

A) cybersquatting.

B) cyberpiracy.

C) framing.

D) metatagging.

B

Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:

A) cybersquatting.

B) typosquatting.

C) metatagging.

D) linking.

B

In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

A) State Street Bank & Trust v. Signature Financial Group, Inc.

B) Bilski et al. v. Kappos

C) Alice Corporation Pty. Ltd. v. CLS Bank International

D) Brown Bag Software v. Symantec Corp.

C

The display of a third-party's website or page within your own website is called:

A) cybersquatting.

B) metatagging.

C) framing.

D) deep linking.

C

Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all the following lawsuits except:

A) a lawsuit filed by the Authors Guild and five major publishing companies against Google

B) a lawsuit brought by Viacom against YouTube and Google

C) BMG Rights Management v. Cox Communications.

D) Mavrix Photographs, LLC v. LiveJournal, Inc.

A

Which of the following cases involved the issue of keywording?

A) Ticketmaster Corp. v. Tickets.com

B) Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc.

C) Government Employees Insurance Company v. Google, Inc.

D) E. & J. Gallo Winery v. Spider Webs Ltd.

C

Which of the following involves bypassing the target site's home page and going directly to a content page?

A) cybersquatting

B) metatagging

C) framing

D) deep linking

D

All of the following cases involved the doctrine of fair use except:

A) Spokeo v. Robins

B) Perfect 10, Inc. v. Amazon.com, Inc. et al.

C) Field v. Google, Inc.

D) Kelly v. Arriba Soft.

A

Which of the following involves the issue of social control?

A) information rights

B) governance

C) public safety and welfare

D) property rights

B

Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?

A) South Dakota v. Wayfair

B) Bilski et al. v. Kappos

C) Quill v. North Dakota

D) Alice Corporation v. CLS Bank International

A

Which of the following statements is not true?

A) Currently, the United States is in a mixed-mode policy environment with respect to the Internet where self-regulation co-exists with limited government regulation.

B) The Internet is technically very difficult to control, monitor, and regulate from a central location.

C) Early Internet advocates argued that the Internet was different from all previous technologies.

D) Controlling e-commerce also involves regulating the Internet.

B

Which of the following statements about net neutrality is not true?

A) The FCC now regulates ISP pricing.

B) The FCC ruled that Internet broadband service providers should be viewed as public utilities similar to telephone companies.

C) The FCC overruled state laws that made it difficult for cities to operate their own broadband networks.

D) ISPs can no longer discriminate against users on the basis of protocol or amount of usage

A

Which of the following is not an e-commerce public safety and welfare issue?

A) regulation of gambling

B) regulation of cigarette sales

C) regulation of pornography

D) regulation of taxation

D

Which of the following is used to track individuals as they move among thousands of websites?

A) first-party cookies

B) digital wallets

C) advertising networks

D) shopping carts

C

Which of the following uses software installed at the ISP level to track user clickstream behavior?

A) shopping carts

B) trusted computing environments

C) deep packet inspection

D) DRM

C

Which of the following statements about industry self-regulation regarding privacy is not true?

A) The AdChoices program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.

B) The Network Advertising Initiative offers consumers a global opt-out feature to prevent network advertising agencies from placing cookies on a user's computer.

C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion.

D) Online seal programs that attest to a company's privacy policies have had a significant impact on online privacy practices.

D

1) Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

TRUE

Page Ref: 492

Difficulty: Moderate

Ethical understanding and reasoning

2) The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

FALSE

Page Ref: 492

Difficulty: Moderate

Ethical understanding and reasoning

3) The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

TRUE

Page Ref: 494

Difficulty: Moderate

Ethical understanding and reasoning

4) In the United States, Google is required to remove results from its search engine if requested.

FALSE

Page Ref: 485-487

Difficulty: Moderate

Application of knowledge

5) Most adult social network participants do not have any expectation of personal privacy when using a social network.

FALSE

Page Ref: 498

Difficulty: Moderate

Application of knowledge

6) The opt-out model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

FALSE

Page Ref: 506

Difficulty: Moderate

Application of knowledge

7) The Children's Internet Protection Act (CIPA) prohibits Web sites from collecting information on children under the age of 13.

FALSE

Page Ref: 545-546

Difficulty: Moderate

Application of knowledge

8) The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.

TRUE

Page Ref: 514

Difficulty: Moderate

Application of knowledge

9) The AdChoices program is an industry-sponsored initiative to encourage Web sites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.

TRUE

Page Ref: 515

Difficulty: Moderate

Application of knowledge

10) Copyright protection protects against others copying the underlying ideas in a work.

FALSE

Page Ref: 519

Difficulty: Moderate

Application of knowledge

11) The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of copyright protection.

FALSE

Page Ref: 531

Difficulty: Moderate

Application of knowledge

12) Net neutrality refers to Internet backbone owners treating all Internet traffic equally.

TRUE

Page Ref: 542

Difficulty: Moderate

Application of knowledge

13) Section 230 of the Communications Decency Act (CDA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.

FALSE

Page Ref: 545

Difficulty: Moderate

Application of knowledge

14) Online gambling is now legal throughout the United States.

FALSE

Page Ref: 549

Difficulty: Easy

Application of knowledge

15) Google defended its Library Project on the grounds of fair use.

TRUE

Page Ref: 552

Difficulty: Moderate

Application of knowledge

16) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A) richness

B) interactivity

C) social technology

D) ubiquity

C

Page Ref: 489

Difficulty: Moderate

Application of knowledge

17) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A) richness

B) interactivity

C) information density

D) global reach

D

Page Ref: 489

Difficulty: Moderate

Application of knowledge

18) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A) accountability

B) privacy

C) due process

D) liability

B

Page Ref: 492

Difficulty: Moderate

Ethical understanding and reasoning

19) What is the first step in analyzing an ethical dilemma?

A) Define the conflict or dilemma and identify the higher-order values involved.

B) Identify the potential consequences of your opinions.

C) Identify the options you can reasonably take.

D) Identify and describe the facts.

D

Page Ref: 493

Difficulty: Moderate

Ethical understanding and reasoning

20) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A) the Golden Rule

B) Universalism

C) the Collective Utilitarian principle

D) the Social Contract rule

C

Page Ref: 494

Difficulty: Moderate

Ethical understanding and reasoning

21) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A) the Golden Rule

B) Universalism

C) the Collective Utilitarian principle

D) the Social Contract rule

A

Page Ref: 494

Difficulty: Moderate

Ethical understanding and reasoning

22) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A) the Golden Rule

B) the Slippery Slope

C) the Social Contract rule

D) No Free Lunch

D

Page Ref: 494

Difficulty: Moderate

Ethical understanding and reasoning

23) Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

A) Universalism

B) the Slippery Slope

C) the Social Contract rule

D) the Golden Rule

B

Page Ref: 494

Difficulty: Moderate

Ethical understanding and reasoning

24) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

A) the Golden Rule

B) Risk Aversion

C) the Slippery Slope

D) the Social Contract rule

D

Page Ref: 494

Difficulty: Moderate

Ethical understanding and reasoning

25) Which ethical principle tells you that it is wise to assume perfect information markets?

A) the Golden Rule

B) the New York Times test

C) the Social Contract rule

D) the Collective Utilitarian principle

B

Page Ref: 494

Difficulty: Moderate

Ethical understanding and reasoning

26) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A) the Slippery Slope

B) Risk Aversion

C) No Free Lunch

D) the Collective Utilitarian principle

B

Page Ref: 494

Difficulty: Moderate

Ethical understanding and reasoning

27) Which of the following basic ethical concepts plays an important role in defining privacy?

A) responsibility

B) accountability

C) liability

D) due process

D

Page Ref: 495

Difficulty: Difficult

Ethical understanding and reasoning

28) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

A) the USA PATRIOT Act

B) the Homeland Security Act

C) the Communications Assistance for Law Enforcement Act

D) the E-Government Act

D

Page Ref: 503, 507

Difficulty: Moderate

Application of knowledge

29) Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?

A) cookies

B) digital wallets

C) search engines

D) shopping carts

C

Page Ref: 497

Difficulty: Moderate

Information technology

30) Which of the following can be used to record all keyboard activity of a user?

A) shopping carts

B) trusted computing environments

C) spyware

D) DRM

C

Page Ref: 497

Difficulty: Easy

Application of knowledge

31) Which of the following is not one of the issues complicating the taxation of e-commerce sales?

A) Taxes raised are used for different government purposes.

B) Sales taxes and policies vary by state and country.

C) Retailers legally only have to charge sales tax if they have operations located in the same state as a consumer.

D) Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.

A

Page Ref: 539

Difficulty: Difficult

Application of knowledge

32) Which of the following is a tiered notice and response system aimed at reducing copyright infringement over P2P networks?

A) the CAS

B) FIP

C) Surfright

D) the Open Internet Order

A

Page Ref: 524

Difficulty: Moderate

Application of knowledge

33) Which of the following statements about industry self-regulation regarding privacy is not true?

A) OPA members are required to implement the OPA's privacy guidelines.

B) The primary focus of industry efforts has been the use of online "seals" that attest to the site's policies.

C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion.

D) The NAI's privacy policies have established the TRUSTe seal.

D

Page Ref: 515

Difficulty: Difficult

Application of knowledge

34) The sharing of a user's stored cookie information between Web sites and without the user's knowledge is:

A) legal in the United States but illegal in Europe.

B) illegal in the United States but legal in Europe.

C) legal in both the United States and Europe.

D) illegal in both the United States and Europe.

A

Page Ref: 514

Difficulty: Difficult

Application of knowledge

35) Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

A) Freedom of Information Act

B) Gramm-Leach-Bliley Act

C) COPPA

D) HIPAA

B

Page Ref: 507

Difficulty: Difficult

Application of knowledge

36) A social consequence of the richness of Internet information is:

A) an increase in shallowness.

B) an increase in the ease of creating misleading information.

C) very persuasive messages might reduce the need for multiple independent sources of information.

D) an increase in vulnerability to hacking attacks.

C

Page Ref: 489

Difficulty: Difficult

Application of knowledge

37) Which of the following is a core Fair Information Practices (FIP) principle?

A) Choice/Consent

B) Access/Participation

C) Security

D) Enforcement

A

Page Ref: 509

Difficulty: Difficult

Application of knowledge

38) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

A) Notice/Awareness

B) Choice/Consent

C) Access/Participation

D) Security

A

Page Ref: 509

Difficulty: Moderate

Application of knowledge

39) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

A) Notice/Awareness

B) Choice/Consent

C) Access/Participation

D) Security

B

Page Ref: 509

Difficulty: Moderate

Application of knowledge

40) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A) Require firms to have consumers affirmatively opt-in before PII is collected.

B) Require firms to allow consumers to opt-out before PII is collected.

C) Make collection of PII illegal.

D) Require robust notice only before PII is collected.

A

Page Ref: 510

Difficulty: Difficult

Application of knowledge

41) "Do Not Track" falls under which of the following principles in the FTC's new privacy framework?

A) Privacy by Design

B) Simplified Choice

C) Greater Transparency

D) Scope

B

Page Ref: 511

Difficulty: Moderate

Application of knowledge

42) Which of the following technologies allows you to send e-mail without a trace?

A) anonymous surfing

B) P3P

C) anonymous remailers

D) public key encryption

C

Page Ref: 517

Difficulty: Moderate

Application of knowledge

43) Which pricing plan charges fees to e-commerce firms based on the amount of traffic they generate?

A) highway pricing

B) cap pricing

C) usage-based billing

D) congestion pricing

A

Page Ref: 543

Difficulty: Moderate

Application of knowledge

44) What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

A) the ability to make perfect copies of digital works at little cost

B) the anonymous nature of the Internet

C) the support for instant peer-to-peer communication

D) the use of standards for file formats

A

Page Ref: 518

Difficulty: Moderate

Application of knowledge

45) Which of the following protects original forms of expression in a tangible medium?

A) trade secret law

B) copyright law

C) patent law

D) trademark law

B

Page Ref: 519

Difficulty: Moderate

Application of knowledge

46) How long does copyright protection extend for corporate-owned works?

A) 25 years

B) 50 years

C) 75 years

D) 95 years

D

Page Ref: 519

Difficulty: Moderate

Application of knowledge

47) Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

A) A professor clips a newspaper article just before class and distributes copies of it to his class.

B) A journalist quotes a paragraph from a book in a review of the book.

C) A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.

D) Google posts thumbnail images of books in the Google Book Search Project.

C

Page Ref: 520-521

Difficulty: Difficult

Analytical thinking

48) All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

A) nature of the work used.

B) amount of the work used.

C) market effect of the use.

D) free availability of the work on the Web.

D

Page Ref: 521

Difficulty: Moderate

Application of knowledge

49) Downloading music tracks owned by record companies without paying for them is an example of a violation of:

A) patent law.

B) copyright law.

C) trademark law.

D) privacy law.

B

Page Ref: 491

Difficulty: Moderate

Application of knowledge

50) All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

A) up to ten years imprisonment for a first offense.

B) fines up to $500,000 for a first offense.

C) fines up to $1 million for a repeat offense.

D) restitution to the injured parties for any losses due to infringement.

A

Page Ref: 521-524

Difficulty: Moderate

Application of knowledge

51) All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:

A) the DMCA makes it illegal to circumvent technological measures to protect works.

B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.

C) the DMCA requires search engines to block access to infringing sites.

D) the DMCA allows libraries to make digital copies of works for internal use only.

B

Page Ref: 521-524

Difficulty: Moderate

Application of knowledge

52) Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

A) copyright law

B) trade secret law

C) patent law

D) trademark law

C

Page Ref: 524

Difficulty: Moderate

Application of knowledge

53) All of the following statements about patents are true except:

A) it is more difficult to obtain a copyright than it is to obtain a patent.

B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.

C) computer programs can be patented.

D) in order to be patented, an invention must be nonobvious.

A

Page Ref: 524-525

Difficulty: Moderate

Application of knowledge

54) Which case was instrumental in paving the way for Internet business methods patents?

A) Brown Bag v. Symantec

B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.

C) Alice Corporation Pty. Ltd. v. CLS Bank International

D) Ticketmaster Corp. v. Tickets.com

B

Page Ref: 529

Difficulty: Difficult

Application of knowledge

55) Amazon has a patent on:

A) download-based sales.

B) display of third-party advertisements in floating windows.

C) one-click purchasing.

D) hyperlinks.

C

Page Ref: 530

Difficulty: Moderate

Application of knowledge

56) Disputes over federal trademarks involve establishing:

A) underlying ideas.

B) intent.

C) piracy.

D) infringement.

D

Page Ref: 531

Difficulty: Moderate

Application of knowledge

57) Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

A) cybersquatting.

B) cyberpiracy.

C) framing.

D) metatagging.

A

Page Ref: 532

Difficulty: Easy

Application of knowledge

58) Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?

A) ICANN

B) FTC

C) WIPO

D) USPTO

C

Page Ref: 531

Difficulty: Moderate

Application of knowledge

59) Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:

A) cybersquatting.

B) cyberpiracy.

C) framing.

D) metatagging.

B

Page Ref: 532

Difficulty: Moderate

Application of knowledge

60) Registering the domain name Faceboik.com with the intent to divert Web traffic from people misspelling Facebook.com is an example of:

A) cybersquatting.

B) typosquatting.

C) metatagging.

D) linking.

B

Page Ref: 534

Difficulty: Easy

Application of knowledge

61) In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

A) State Street Bank & Trust v. Signature Financial Group, Inc.

B) Bilski et al. v. Kappos

C) Alice Corporation Pty. Ltd. v. CLS Bank International

D) Brown Bag Software v. Symantec Corp.

C

Page Ref: 529

Difficulty: Moderate

Application of knowledge

62) The display of a third-party's Web site or page within your own Web site is called:

A) cybersquatting.

B) metatagging.

C) framing.

D) deep linking.

C

Page Ref: 536

Difficulty: Moderate

Application of knowledge

63) The President's Council of Advisors on Science and Technology has called for all of the following except:

A) a consumer privacy bill of rights.

B) a data breach law requiring firms to report losses of consumer data.

C) amendment of the Electronic Communications Privacy Act to strengthen protections against government surveillance.

D) a blanket prohibition on commercial data brokers.

D

Page Ref: 504

Difficulty: Difficult

Application of knowledge

64) Comcast's proposed merger with which of the following would make it the high-speed Internet provider for close to 40% of American homes?

A) Cablevision

B) AT&T

C) Verizon

D) Time Warner Cable

D

Page Ref: 544

Difficulty: Moderate

Application of knowledge

65) According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A) used an anonymous Web browsing service

B) encrypted their communications

C) cleared Web browser history and cookies

D) posted comments online anonymously

C

Page Ref: 500

Difficulty: Difficult

Application of knowledge

66) The ________ of Internet and Web technology can result in work and shopping invading family life.

ubiquity

Page Ref: 489

Difficulty: Moderate

Application of knowledge

67) The four major dimensions of e-commerce ethical, social, and political issues are public safety and welfare; property rights; information rights; and ________.

governance

Page Ref: 490-491

Difficulty: Moderate

Application of knowledge

68) ________ is another name for net neutrality.

Open Internet

Page Ref: 542

Difficulty: Moderate

Application of knowledge

69) Demographic and behavioral information that does not include any personal identifiers is referred to as ________ information.

anonymous

Page Ref: 496

Difficulty: Easy

Application of knowledge

70) ________ involves the creation of digital images that characterize online individual and group behavior.

Profiling

Page Ref: 500

Difficulty: Moderate

Application of knowledge

71) Megaupload is an example of a(n) ________, an online file storage service dedicated to sharing copyrighted material illegally.

cyberlocker

Page Ref: 524

Difficulty: Moderate

Application of knowledge

72) ________ is the largest private personal database in the world.

Acxiom

Page Ref: 504

Difficulty: Moderate

Application of knowledge

73) A(n) ________ is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation, but does not involve government regulation or enforcement.

safe harbor

Page Ref: 514

Difficulty: Moderate

Application of knowledge

74) ________ involves bypassing the target site's home page and going directly to a content page.

Deep linking

Page Ref: 535

Difficulty: Moderate

Application of knowledge

75) ________ copyright infringement lawsuits are concerned with the distinction between an idea and its expression.

Look and feel

Page Ref: 520

Difficulty: Moderate

Application of knowledge

76) The doctrine of ________ permits teachers and writers to use copyrighted materials without permission under certain circumstances.

fair use

Page Ref: 521

Difficulty: Difficult

Application of knowledge

77) In trademark law, ________ is defined as any behavior that would weaken the connection between the trademark and the product.

dilution

Page Ref: 531

Difficulty: Moderate

Application of knowledge

78) Single words, pictures, shapes, packaging, and colors used to identify and distinguish goods are protected under ________ law.

trademark

Page Ref: 531

Difficulty: Moderate

Application of knowledge

79) Under the ________ Act, American intelligence authorities are permitted to tap into whatever Internet traffic they believe is relevant to the campaign against terrorism, in some circumstances without judicial review.

USA Patriot, Patriot

Page Ref: 538

Difficulty: Difficult

Application of knowledge

80) The issue of ________ pits those who wish that all Internet traffic is given equal backbone access against telephone and cable companies that would like to charge differentiated prices based on bandwidth and fees paid.

net neutrality, Open Internet

Page Ref: 542

Difficulty: Moderate

Application of knowledge

81) Discuss in depth one ethical, social, or political issue that is presently in the news surrounding the Internet and e-commerce.

A student might answer this issue by focusing on any one of a number of ethical, social, or political issues currently surrounding the Internet and e-commerce. Possible topics include privacy issues, intellectual property rights issues (copyright, patents, or trademarks), taxation, Internet governance issues, online pornography, gambling, or the sale of cigarettes and drugs.

Page Ref: 484-554

Difficulty: Moderate

Analytical thinking; Information technology; Written and oral communication

82) Define privacy, information privacy, and informed consent and discuss the ways in which the practices of e-commerce companies, particularly the use of advertising networks, threaten people's privacy.

Privacy is the moral right of individuals to be left alone, free from surveillance or interference from other individuals including the state. Information privacy includes both the right to prohibit certain information from being collected by either governments or businesses and the right to control the use of whatever information is collected about you. The core concept is the control of your own personal information.

Informed consent means that an individual has knowledge of all of the material facts needed to make a rational decision and consent has been given to collect information. In the United States, business firms and government agencies can gather transaction data from the marketplace and use it for other marketing purposes without the informed consent of the individual. In Europe, on the other hand, this is illegal. European businesses can only use transaction data to support the current transaction if they have asked for and received the informed consent of the individual.

Advertising networks are a threat to people's privacy because they collect information about how you use the Web including the sites you visit, the keywords you use in searches and other queries, your online purchases, the click-through ads you respond to, information you submit to social networking sites, and other information. These advertising networks, with the permission of the Web sites you visit but not your permission, place cookies on your computer that are used to track your movements as you surf the Web. In addition to this information, they may also compile a profile that contains information that the company infers about you based upon the sites you visit. All of this data is entered into a database and analyzed to create a profile that might include your interests, habits, associations, and inferred personality traits.

From a privacy protection perspective, the advertising network raises issues about who will see and use the information held by private companies, whether the user profiles will be linked to actual personally identifying information (such as name, social security number, and bank and credit accounts), the absence of consumer control over the use of the information, the lack of consumer choice, the absence of consumer notice, and the lack of review and amendment procedures. The pervasive and largely unregulated collection of personal information online has raised significant fears and opposition among consumers. Contrary to what the online advertising industry has often said, namely, that the public really does not care about its online privacy, there is a long history of opinion polls that document the public's fear of losing control over their personal information when visiting e-commerce sites.

Page Ref: 495-502

Difficulty: Moderate

Analytical thinking; Information technology; Written and oral communication

83) Describe and evaluate the different methods that are being used to protect online privacy. Which of these methods do you think is or could be the most effective?

The different methods being used to protect online privacy include legal protections, industry self-regulation, privacy advocacy groups, privacy protection products, and technology solutions.

In the United States, the Federal Trade Commission has taken the lead in researching online privacy and recommending legislation to Congress. The FTC has issued the Fair Information Practice (FIP) Principles, which forms the basis for its recommendations for online privacy. Two core principles are Notice/Awareness and Choice/Consent. The Notice/Awareness principle recommends that sites disclose their information practices before collecting data. The Choice/Consent principle recommends that there be a choice system in place that allows consumers to choose how their information will be used for secondary purposes other than supporting transactions. Although the FIP principles are guidelines, not laws, they have stimulated private firms to develop their own guidelines and are being used as the basis of new legislation, such as the Children's Online Privacy Protection Act (COPPA), which requires Web sites to obtain parental permission before collecting information on children under 13 years of age. Recently, the FTC has developed a new framework to address consumer privacy. The main principles are privacy by design, simplified choice, and greater transparency, applied to all commercial entities that collect or use consumer data, not just those that collect PII. It has also called for a "Do Not Track" mechanism for online behavioral advertising. As with FIP, these principles remain guidelines. The emphasis in recent FTC privacy reports is not on restricting the collection of information (as in previous eras of privacy regulation), but instead on giving consumers rights with respect to the information collected about them in large databases and its use by various businesses and agencies. Although several bills have been introduced in Congress to implement them, none have been passed as of yet.

Historically, the online industry in the United States has opposed online privacy legislation, arguing that industry can do a better job of protecting privacy than government. However, facing fines, congressional investigations, and public embarrassment over their privacy invading behaviors, with the potential loss of some business and credibility, the major players in the e-commerce industry in the United States are beginning to change some of their policies regarding the treatment of consumer data. Large Internet firms that rely on personal information (Google, Facebook, Microsoft, and many others), along with privacy advocates, are calling on Washington to develop comprehensive consumer privacy protection legislation that would clarify for consumers and business firms the meaning of privacy in the current online commercial environment.

The online industry formed the Online Privacy Alliance (OPA) to encourage self-regulation. In addition, the Network Advertising Initiative, a consortium of major Internet advertising companies, was formed to develop policies for the industry. The NAI policies are designed to offer consumers opt-out programs and to provide consumers with redress for abuses. Other forms of self-regulation include various "seals" of approval that sites can display when in compliance with certain privacy policies. However, these seal programs have had a limited impact on Web privacy practices and critics argue that the programs are not particularly effective in safeguarding privacy. In general, industry efforts at self-regulation in online privacy have not succeeded in reducing American fears of privacy invasion during online transactions or in reducing the level of privacy invasion.

In addition a number of firms have sprung up to sell products that they claim will help people protect their privacy, from protecting their online reputation to selling their personal information to the highest bidder. Consumer privacy groups have also formed to monitor developments, and there are some technological solutions that help, although primarily in the arena of security. Technological tools include spyware blockers, pop-up blockers, methods to secure e-mail, anonymous remailers, anonymous surfing, and cookie managers.

[Student evaluations of which methods are the most effective will vary.]

Page Ref: 509-517

Difficulty: Moderate

Analytical thinking; Information technology; Written and oral communication

84) Describe the purpose of intellectual property law and outline the main types of intellectual property protection.

The purpose of intellectual property law is to balance two competing interests: the public and the private. The public interest is served by the creation of inventions, works of art, music, literature, and other types of intellectual expression. The private interest is served by rewarding creators of intellectual property by a time-limited monopoly that grants exclusive use to the creator.

There are three main types of intellectual property protection: copyright, patent, and trademark law. Copyright law protects original forms of expression such as books, periodicals, and other forms of written expression, art, drawings, photographs, music, movies, performances, and computer programs. Patents grant the owner a 20-year exclusive monopoly on the ideas behind an invention. There are four types of inventions for which patents are granted under patent law: machines, manmade products, compositions of matter, and processing methods. Trademark law is used to protect trademarks — marks used to identify and distinguish goods and indicate their source.

Page Ref: 518-519

Difficulty: Moderate

Analytical thinking; Written and oral communication

85) Explain why the taxation of e-commerce raises governance and jurisdiction issues.

The taxation of e-commerce illustrates the complexity of the governance and jurisdictional issues in the global economy. Most of the issues surround the sales tax imposed by various states or countries on products sold to residents of their state or country. Governments the world over rely on sales taxes to fund various types of government initiatives and programs including the building of roads, schools, and sewers or other utilities to support business development.

In the United States, between the fifty states and the multiple counties and municipalities, there are thousands of different tax rates and policies. For example, in some states food is not taxed at all and there are a myriad of different exceptions and inclusions depending on the locality. However, with the rise of e-commerce and virtual storefronts, the question is raised as to what locale a virtual storefront is considered to be located in. The development of MOTO (mail order/telephone) retail in the 1970s began the discussion on the taxing of remote sales. State and local tax authorities wanted MOTO retailers to collect taxes based upon the address of the recipients, but the Supreme Court has ruled that states cannot force MOTO retailers to collect taxes unless the business has a physical presence in the state. Legislation to the contrary has never been able to garner sufficient support in Congress due to pressure from the catalog merchants, leaving intact an effective tax subsidy for MOTO merchants.

The explosive growth of e-commerce, the latest type of "remote sales," has once again raised the issue of how — and if — to tax remote sales. Since its inception, e-commerce has benefited from a tax subsidy of up to 13% for goods shipped to high sales tax areas. Local retail merchants have complained bitterly about the e-commerce tax subsidy. E-commerce merchants have argued that this form of commerce needs to be nurtured and encouraged, and that in any event, the crazy quilt of sales and use tax regimes would be difficult to administer for Internet merchants. Online giants like Amazon claim they should not have to pay taxes in states where they have no operations because they do not benefit from local schools, police, fire, and other governmental services. State and local governments meanwhile see billions of tax dollars slipping from their reach. As Amazon's business model has changed with its building of large distribution centers close to urban areas to enable next-day delivery, so has its opposition to paying sales taxes softened.

Page Ref: 539

Difficulty: Difficult

Analytical thinking; Written and oral communication

86) Describe the five-step process that can be used to analyze an ethical dilemma. What other guidelines are there to help in understanding a complicated ethical or moral situation?

The five-step process is:

1. Identify and describe the facts. Find out who did what to whom, and where, when, and how. It helps to get the opposing parties involved in an ethical dilemma to agree on the facts.

2. Define the conflict or dilemma and identify the higher-order values involved. Ethical, social, and political issues always reference higher values. Otherwise, there would be no debate. The parties to a dispute all claim to be pursuing higher values (e.g., freedom, privacy, protection of property, and the free enterprise system).

3. Identify the stakeholders. Every ethical, social, and political issue has stakeholders: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions. Find out the identity of these groups and what they want. This will be useful later when designing a solution.

4. Identify the options that you can reasonably take. You may find that none of the options satisfies all the interests involved, but that some options do a better job than others. Sometimes, arriving at a "good" or ethical solution may not always be a balancing of consequences to stakeholders.

5. Identify the potential consequences of your options. Some options may be ethically correct, but disastrous from other points of view. Other options may work in this one instance, but not in other similar instances. Always ask yourself, "What if I choose this option consistently over time?"

Other things to consider when appraising a dilemma include basic ethical concepts such as responsibility, accountability, and liability and how these play into the situation. Additionally, you can judge the situation against candidate ethical principles, such as the Golden Rule, the Slippery Slope theory, Universalism, the Collective Utilitarian principle, Risk Aversion theory, the No Free Lunch theory, the New York Times test (Perfect Information rule), and the Social Contract rule. Actions that do not easily pass these guidelines deserve some very close attention and a great deal of caution because the appearance of unethical behavior may do as much harm to you and your company as the actual behavior.

Page Ref: 493-495

Difficulty: Moderate

Analytical thinking; Written and oral communication; Ethical understanding and reasoning

All of the following are advantages of online retail except:

faster delivery of goods.

All of the following are challenges faced by bricks-and-clicks firms except:

building a brand name.

All of the following are challenges for catalog merchants except:

building sophisticated order entry and fulfillment systems.

All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:

high-cost structures.

All of the following are strategic factors that pertain specifically to a firm and its related businesses except:

power of customers.

All of the following are terms used to describe on-demand service companies except:

omni-channel commerce.

All of the following have introduced social commerce functionality, such as buy buttons, shoppable ads, and marketplaces, except:

Tumblr.

All of the following services require extensive personalization except:

financial services.

All of the following statements about Amazon are true except:

Amazon purchased Jet.com, one of its discount competitors, to give it a more robust network for delivering goods.

All of the following statements about the MOTO sector are true except:

the MOTO sector is also referred to as the specialty store sector.

All of the following statements about the online insurance industry are true except:

the Internet has lowered search costs, increased price comparison, and decreased prices to consumers for forms of insurance.

All of the following statements about the online real estate services market are true except:

the Internet and e-commerce have created a revolution in the real estate value chain.

All of the following were parts of the vision during the early days of e-commerce except the belief that:

new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.

Apart from Amazon, the top online retail firms in terms of online sales are all primarily ________ firms.

omni-channel.

Approximately ________% of the United States labor force is involved in providing services.

80

(T/F) Big data plays an important role in predictive marketing.

True

Booking Holdings owns all of the following except:

Expedia.

(T/F) Consumers are primarily price-driven when shopping on the Internet.

False

(T/F) Contrary to predictions of analysts made during the early days of e-commerce, the Internet has led to both disintermediation and hypermediation on a widespread basis.

False

Craigslist is most involved in which of the following online services market(s)?

real estate services and career services.

Current liabilities are debts of the firm that will be due within:

one year.

For a quick check of a firm's short-term financial health, examine its:

working capital.

Gross margin is defined as gross profit:

divided by net sales revenues.

(T/F) In 2020, almost 75% of the adult U.S. population was expected to use online banking.

True

In 2020, it was estimated that about what percentage of Internet users over the age of 14 would make a purchase at an online retail store?

80%

(T/F) In 2020, the number of online buyers in the United States was around 205 million.

True

In ________, all of a customer's financial (and even nonfinancial) data are pulled together into a single, personalized website.

account aggregation

In the United States, the service sector accounts for approximately ________% of the United States GDP.

80

Omni-channel merchants are also referred to as:

bricks-and-clicks companies.

(T/F) On-demand service companies collect a fee from both sellers and buyers who use the platform.

True

(T/F) Online retail constitutes about 20% of the total retail market today.

False

(T/F) Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.

True

Operating margin is defined as:

operating income or loss divided by net sales revenues.

(T/F) Personal consumption of retail goods and services accounts for over 80% of total gross domestic product (GDP).

False

(T/F) Service industries (i.e., finance & travel) typically are very knowledge- and information-intense.

True

(T/F) The Covid-19 pandemic has severely impacted the online travel industry.

True

The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line?

term life insurance.

(T/F) The existence of substitute products is a key industry strategic factor.

True

The lower the ________ compared to revenue, the higher the gross profit.

cost of sales.

(T/F) The online mortgage industry has transformed the process of obtaining a mortgage.

False

The online retail sector of the retail industry is most similar to the ________ sector.

mail order/telephone order (MOTO).

(T/F) The social network LinkedIn has become major player in the online recruitment market.

True

(T/F) The term fintech applies only to tech companies that are seeking use technology to unbundle traditional institutional financial services industries and instead deliver targeted solutions.

False

The term supply-push refers to:

making products prior to orders being received based on estimated demand.

Virtual merchants face potentially large costs for all of the following except:

building and maintaining physical stores.

What is another name for pro forma earnings?

earnings before income taxes, depreciation, and amortization (EBITDA).

What is the largest sector of the online travel services market in terms of revenue?

airline reservations.

Which of the following best explains why the service sector is a natural avenue for e-commerce?

Much of the value in services is based on the collection, storage, and exchange of information.

Which of the following enabled MOTO firms to make an easier transition to e-commerce?

The fact that they already had efficient customer order fulfillment processes.

Which of the following has the highest share of online retail sales?

virtual merchants.

Which of the following has the second-highest share of online retail sales?

omni-channel merchants.

Which of the following is a subscription-based retailer using predictive marketing and big data?

Stitch Fix

Which of the following is an on-demand service company focused on lodging?

Airbnb

Which of the following is not a digitally native vertical brand (D2C)?

Wayfair

Which of the following is not a key industry strategic factor?

synergies

Which of the following is not a major trend in online retail for 2020-2021?

The COVID-19 pandemic is expected to create a decrease in e-commerce retail purchases.

Which of the following is not a major trend in the online recruitment services industry?

disintermediation.

Which of the following is not an example of a transaction broker?

an accountant.

Which of the following is not an example of a virtual merchant?

Dell

Which of the following is not categorized as an operating expense?

the cost of products being sold.

Which of the following is not considered a current asset?

long-term investments.

Which of the following is not one of the central challenges facing the online retail industry?

lack of physical store presence.

Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration?

online supply-push.

Which of the following is not one of the seven major segments of the retail industry?

electronics and computers

Which of the following is not true about on-demand service firms?

On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.

Which of the following measures the percentage of sales revenue a firm can retain after all expenses are deducted from gross revenues?

net margin.

Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?

channel conflict.

Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date?

balance sheet.

Which of the following statements about online banking is not true?

More people use a tablet for mobile banking than a mobile phone.

Which of the following statements is not true about the automobile, and automobile parts and accessories, online retail category?

Most of the revenue in this category is generated from the sales of automobiles.

Which of the following statements is not true?

The online travel services sector is one of the few in which extensive disintermediation has occurred.

Within the major service industry groups, companies can be categorized generally into those that provide transaction brokering and those that involve which of the following?

providing hands-on services.

________ provides notices called Consumer Alerts to inform readers when a review is likely to be fraudulent.

Yelp

Which of the following is not a major trend in online retail for 2018-2019?

The number of online buyers begins to plateau.

All of the following statements about the MOTO sector are true except:

the MOTO sector is also referred to as the specialty store sector.

All of the following were parts of the vision during the early days of e-commerce except the belief that:

new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.

In 2018, approximately what percentage of Internet users over the age of 14 made a purchase at an online retail store?

almost 80%

Which of the following categories generates the highest percentage of online retail revenue?

computers and electronics

Which of the following is not one of the central challenges facing the online retail industry?

lack of physical store presence

Which of the following is not a digitally native vertical brand?

Wayfair

All of the following are strategic factors that pertain specifically to a firm and its related businesses except:

power of customers.

Which of the following is not categorized as an operating expense?

the cost of products being sold

Operating margin is defined as:

operating income or loss divided by net sales revenues

Current liabilities are debts of the firm that will be due within:

one year.

For a quick check of a firm's short-term financial health, examine its:

working capital.

Which of the following is not an example of a virtual merchant?

Dell

All of the following statements about Amazon are true except:

in 2016, Amazon purchased Jet.com, one of its discount competitors.

The term supply-push refers to:

making products prior to orders being received based on estimated demand.

Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?

channel conflict

Which of the following has the second-highest share of online retail sales?

omni-channel merchants

Service industry groups are categorized generally into two groups, those that provide transaction brokering and those that involve:

providing hands-on services.

All of the following services require extensive personalization except:

financial services.

The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line?

term life insurance

All of the following statements about the online insurance industry are true except:

the Internet has lowered search costs, increased price comparison, and decreased prices to consumers for all forms of insurance.

Craigslist is most involved in which of the following online services market(s)?

real estate services and career services

What is the largest sector of the online travel services market in terms of revenue?

airline reservations

Which of the following statements is not true?

The online travel services sector is one of the few in which extensive disintermediation has occurred.

Bookings Holdings owns all of the following except:

Orbitz.

Which of these job recruitment sites is not a job listing aggregator?

CareerBuilder

Which of the following is not a major trend in the online recruitment services industry?

disintermediation

Which of the following is not true about on-demand service firms?

On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.

Which of the following is an on-demand service company focused on lodging?

Airbnb

All of the following are terms used to describe on-demand service companies except:

omni-channel commerce.

1) Which of the following is not a major trend in online retail for 2016-2017?

A) Online retail remains the fastest growing retail channel.

B) The average annual purchase of online buyers continues to increase.

C) Online retailers place an increased emphasis on providing an improved "shopping experience."

D) The number of online buyers begins to plateau.

D

2) The MOTO sector of the retail industry is most like the ________ sector.

A) specialty stores

B) general merchandise

C) online retail sales

D) consumer durables

C

3) Which of the following is not one of the seven major segments of the retail industry?

A) electronics and computers

B) specialty stores

C) gasoline and fuel

D) food and beverage

A

4) All of the following statements about the MOTO sector are true except:

A) compared to general merchandisers, the transition to e-commerce has been easier for MOTO firms.

B) the MOTO sector is also referred to as the specialty store sector.

C) MOTO was the last technological revolution that preceded e-commerce.

D) distribution of catalogs is one of MOTO retailers' biggest expenses.

B

5) All of the following were factors that precipitated the growth of MOTO except:

A) the national toll-free call system.

B) the growth of the cellular phone industry.

C) falling long distance telecommunications prices.

D) the growth of the credit card industry.

B

6) All of the following were parts of the vision during the early days of e-commerce except the belief that:

A) new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.

B) online consumers were rational and cost-driven.

C) entry costs to the online retail market would be much less than those needed to establish a physical storefront.

D) the cost of acquiring customers would be much lower.

A

7) All of the following have launched trials of Buy buttons except:

A) Facebook.

B) Pinterest.

C) Instagram.

D) Tumblr.

D

8) In 2016, approximately what percentage of Internet users over the age of 14 made a purchase at an online retail store?

A) 37%

B) 57%

C) 77%

D) 97%

C

9) Which of the following categories generates the highest percentage of online retail revenue?

A) computers and electronics

B) apparel and accessories

C) books/music/video

D) automobile and automobile parts and accessories

B

10) All of the following are advantages of online retail except:

A) lower supply chain costs.

B) lower cost of distribution.

C) ability to change prices.

D) faster delivery of goods.

D

11) Which of the following is not one of the central challenges facing the online retail industry?

A) lack of physical store presence

B) consumer concerns about the privacy of personal information

C) inconvenience in returning goods

D) delivery delays

A

12) Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration?

A) online catalog

B) online order, in-store pickup

C) online supply-push

D) online promotions for offline purchases

C

13) Which of the following statements is not true about the automobile and automobile parts and accessories online retail category?

A) Most of the revenue in this category is generated from the sales of automobiles.

B) Automobile manufacturers use the Internet to deliver branding advertising.

C) U.S. franchising law prohibits automobile manufacturers from selling cars directly to consumers.

D) Automobile retailing is dominated by dealership networks.

A

14) Approximately ________ retailers generate 90% of all retail e-commerce sales.

A) 10

B) 100

C) 1,000

D) 10,000

C

15) Which of the following had the highest online sales revenue in 2015?

A) Macy's

B) Walmart

C) Sears

D) Target

B

28) Which of the following is not a key industry strategic factor?

A) synergies

B) barriers to entry

C) industry value chain

D) existence of substitute products

A

29) All of the following are strategic factors that pertain specifically to a firm and its related businesses except:

A) core competencies.

B) synergies.

C) technology.

D) power of customers.

D

30) The lower the ________ compared to revenue, the higher the gross profit.

A) assets

B) cost of sales

C) gross margin

D) operating expenses

B

31) Gross margin is defined as gross profit:

A) minus total operating expenses.

B) divided by net sales revenues.

C) divided by cost of sales.

D) minus net income.

B

32) Which of the following is not categorized as an operating expense?

A) the cost of products being sold

B) marketing costs

C) administrative overhead

D) amortization of goodwill

A

33) Operating margin is defined as:

A) operating income or loss divided by net sales revenues.

B) operating income or loss divided by total operating expenses.

C) net sales revenues divided by net income or loss.

D) net assets divided by net liabilities.

A

34) What is another name for pro forma earnings?

A) net margin

B) operating income

C) earnings before income taxes, depreciation, and amortization (EBITDA)

D) generally accepted accounting principles (GAAP) earnings

C

35) Which of the following would not be considered a current asset?

A) long-term investments

B) cash

C) accounts receivable

D) marketable securities

A

36) Current liabilities are debts of the firm that will be due within:

A) three months.

B) six months.

C) one year.

D) two years.

C

37) For a quick check of a firm's short-term financial health, examine its:

A) working capital.

B) gross margin.

C) long-term debt.

D) cost of sales.

A

38) ________ measures the percentage of sales revenue a firm retains after all expenses are deducted from gross revenues.

A) Gross profit

B) Net margin

C) Operating margin

D) Working capital

B

39) Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date?

A) working capital

B) operating margin

C) balance sheet

D) gross margin

C

42) Which of the following is not an example of a virtual merchant?

A) Overstock

B) Wayfair

C) Rue La La

D) Dell

D

43) Omni-channel merchants are also referred to as:

A) virtual merchants.

B) bricks-and-clicks companies.

C) catalog merchants.

D) manufacturer-direct firms.

B

44) Which of the following is a subscription-based retailer using predictive marketing and Big Data?

A) Macy's

B) Birchbox

C) Dell

D) Lands' End

B

45) Virtual merchants face potentially large costs for all of the following except:

A) building and maintaining a website.

B) building and maintaining physical stores.

C) building an order fulfillment infrastructure.

D) developing a brand name.

B

46) All of the following statements about Amazon are true except:

A) Amazon failed to show a profit in 2015.

B) Amazon Web Services is now a major part of Amazon's business.

C) eBay can be considered a competitor of Amazon.

D) Amazon continues to generate revenue primarily by selling products.

A

47) All of the following are challenges faced by bricks-and-clicks firms except:

A) coordinating prices across channels.

B) handling returns of online purchases at retail outlets.

C) building a credible website.

D) building a brand name.

D

48) All of the following are challenges for catalog merchants except:

A) high costs of printing and mailing.

B) building a credible website.

C) the need to bring staff in or manage new technology.

D) building sophisticated order entry and fulfillment systems.

D

49) The term supply-push refers to:

A) making products prior to orders being received based on estimated demand.

B) waiting for orders to be received before building a product.

C) channel conflict.

D) multi-channel manufacturers who sell directly online to consumers.

A

50) All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:

A) moving to a demand-pull model.

B) high cost structures.

C) developing a fast-response online order and fulfillment system.

D) channel conflict.

B

51) Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?

A) disintermediation

B) localization

C) channel conflict

D) hypermediation

C

52) Which of the following has the highest share of online retail sales?

A) omni-channel merchants

B) virtual merchants

C) catalog merchants

D) manufacturer-direct

B

53) Which of the following has the second-highest share of online retail sales?

A) omni-channel merchants

B) virtual merchants

C) catalog merchants

D) manufacturer-direct

A

57) In the United States, the service sector accounts for approximately ________% of the United States GDP.

A) 70

B) 75

C) 80

D) 85

C

58) Service industry groups are categorized generally into two groups, those that provide transaction brokering and those that involve:

A) retailing goods.

B) personalization.

C) information brokering.

D) hands-on services.

D

59) Approximately ________% of the United States labor force is involved in providing services.

A) 50

B) 60

C) 70

D) 80

D

60) Which of the following is not an example of a transaction broker?

A) a stockbroker

B) a real estate agent

C) an accountant

D) an employment agency

C

61) All of the following services require extensive personalization except:

A) financial services.

B) legal services.

C) medical services.

D) accounting services.

A

62) Which of the following best explains why the service sector is a natural avenue for e-commerce?

A) The service sector is less geographically reliant and more globally oriented.

B) The service sector has historically been more technology-reliant.

C) Much of the value in services is based on the collection, storage, and exchange of information.

D) It is not; services are difficult to translate to e-commerce because they rely on face-to-face communication and barter.

C

63) Which of the following statements about online banking is not true?

A) Top mobile banking activities include checking balances and bank statements and viewing recent transactions.

B) Online and mobile banking transactions provide significant costs savings for banks.

C) Millennials are adopting mobile banking at a much higher rate than those who are older.

D) More people use a tablet for mobile banking than a mobile phone.

D

64) In ________, all of a customer's financial (and even nonfinancial) data are pulled together at a single personalized website.

A) account aggregation

B) a financial portal

C) integrated financial services

D) EBPP systems

A

65) The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line?

A) term life insurance

B) automobile insurance

C) health insurance

D) property and casualty insurance

A

66) All of the following statements about the online insurance industry are true except:

A) the Internet has dramatically changed the insurance industry's value chain.

B) websites of almost all the major firms provide the ability to obtain an online quote.

C) Internet usage has led to a decline in term life insurance prices industry-wide.

D) the industry has been very successful in attracting visitors searching for information

A

67) All of the following statements about the online real estate services market are true except:

A) most people use the Internet to search for a home, but still use the services of a real estate agent to complete the purchase.

B) real estate differs from other types of online financial services because it is impossible to complete a property transaction online.

C) the primary service offered by real estate sites is a listing of houses available.

D) the Internet and e-commerce have created significant disintermediation in the real estate marketplace.

D

68) Craigslist is a player in which of the following online services markets?

A) real estate services and career services

B) insurance services and brokerage services

C) travel services

D) online accounting services

A

73) Which of the following has introduced a tool known as Consumer Alerts to inform readers when a review is likely to be fraudulent?

A) Yelp

B) TripAdvisor

C) Angie's List

D) TripExpert

A

74) What is the largest sector of the online travel services market in terms of revenue?

A) hotel reservations

B) car reservations

C) cruise/tour reservations

D) airline reservations

D

75) Which of the following statements is not true?

A) Price competition among online travel services is difficult as comparison shopping for better prices is easy.

B) Online travel services are one of the few sectors in which extensive disintermediation has occurred.

C) The ability of travel products and services to be commoditized is a significant factor in the explosive growth of the online travel services industry.

D) The online travel services industry has gone through a period of consolidation

B

76) Expedia owns all of the following except:

A) Travelocity.

B) Orbitz.

C) TripAdvisor.

D) CheapTickets.

C

78) Which of these job recruitment sites is not a job listing aggregator?

A) Indeed

B) SimplyHired

C) Glassdoor

D) CareerBuilder

B

79) Which of the following is not a major trend in the online recruitment services industry?

A) disintermediation

B) Millennials and GenX primarily use mobile devices to search for jobs.

C) social recruiting

D) hiring by algorithm

A

82) Which of the following is not true about on-demand service firms?

A) The growth of on-demand service firms is supported by the use of online reputation systems based on peer review.

B) It is not likely that on-demand service firms will totally escape government regulation.

C) On-demand service firms facilitate access to resources.

D) On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce

D

83) ________ is an on-demand service company focused on lodging.

A) Uber

B) Lyft

C) Airbnb

D) Task Rabbit

C

84) All of the following are terms used to describe on-demand service companies except:

A) mesh economy.

B) collaborative commerce.

C) we-commerce.

D) omni-channel commerce.

D

The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.

Fasle

In the United States, Google is not required to remove results from its search engine if requested.

True

The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

False

The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

True

Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.

True

Which of the following statements about industry self-regulation regarding privacy is not true?

The NAI's privacy policies have established the TRUSTe seal.

Megaupload's founder, Kim Dotcom, was arrested in connection with which of the following?

copyright infringement

Which of the following is not one of the issues complicating the taxation of e-commerce sales?

Taxes raised are used for different government purposes.

________ is a tiered notice and response system aimed at reducing copyright infringement over P2P networks.

The CAS

Which of the following tools can companies use to trace user statements and views on newsgroups, chat groups, and other public forums?

search engines

All of the following statements about patents are true except:

it is more difficult to obtain a copyright than it is to obtain a patent.

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

No Free Lunch

Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:

typosquatting.

Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

choice/consent

Which of the following is not a major e-commerce public safety and welfare issue?

regulation of taxation

Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?

WIPO

________ is not a privacy advocacy group.

Reputation.com

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

the golden rule

________ operates the largest private personal database in the world.

Acxiom

Which case was instrumental in paving the way for Internet business methods patents?

State Street Bank & Trust Co. v. Signature Financial Group, Inc.

Copyright protection protects against others copying the underlying ideas in a work.

False

Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

the Social Contract rule

Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

global reach

Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

the slippery slope

According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

cleared web browser history and cookies

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

social technology

What is the first step in analyzing an ethical dilemma?

Identify and describe the facts.

The Spokeo case involved a claim for damages based on which of the following?

Fair Credit Reporting Act

A social consequence of the richness of Internet information is:

very persuasive messages might reduce the need for multiple independent sources of information.

In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

Alice Corporation Pty. Ltd. v. CLS Bank International

________ protects original forms of expression in a tangible medium.

Copyright law

Which of the following statements about net neutrality is not true?

The FCC now regulates ISP pricing.

Registering a domain name similar or identical to trademarks of others to divert web traffic to their own sites is an example of:

cyberpiracy.

Liability is a feature of political systems in which a body of law is in place allowing individuals to recover damages done to them by other actors, systems, or organizations.

True

The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

True

Online gambling is now legal throughout the United States.

False

Most adult social network participants do not have any expectation of personal privacy when using a social network.

False

________ allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years.

Patent law

Amazon has a patent on:

one-click purchasing.

How long does copyright protection extend for corporate-owned works?

95 years

Which of the following is a core Fair Information Practices (FIP) principle?

Choice/Consent

Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

Gramm-Leach-Bliley Act

Which ethical principle tells you it's wise to assume perfect information markets?

the New York Times test

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

cybersquatting.

Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

USA Freedom Act

________ allow(s) you to send e-mail without a trace.

Anonymous remailers

The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of trademark protection.

True

Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.

True

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

Notice/awareness

All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

up to ten years' imprisonment for a first offense.

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

the Collective Utilitarian principle

Which of the following involves bypassing the target site's home page and going directly to a content page?

deep linking

Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

Downloading a music track owned by a record company without paying for it is an example of a violation of:

copyright law

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

Require firms to have consumers affirmatively opt-in before PII is collected.

Which of the following is not true about the evolution of Facebook's privacy policies between 2005 and 2015?

Facebook's privacy policy became easier to understand.

The Federal Communications Commission's new privacy rules apply to both broadband ISPs and websites.

False

What is the major reason the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

the ability to make perfect copies of digital works at little cost

Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

Risk Aversion

The display of a third-party's website or page within your own website is called:

framing

Which of the following cases involved the issue of keywording?

A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

Which of the following statements about the patent battle between Apple and Samsung is not true?

The courts have decided that Apple does not have a valid patent on the iPhone's user interface.

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

free availability of the work on the Web.

Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

privacy

Which of the following statements about the E.U. General Data Protection Regulation (GDPR) is not true?

The GDPR eliminates the right to be forgotten.

Disputes over federal trademarks involve establishing:

infringement

1) All of the following were popular types of online marketing before 2007 except:

A) e-mail.

B) corporate websites.

C) mobile marketing.

D) display ads.

C

2) Which of the following is not true about social marketing?

A) More than 50% of Twitter's ad revenues are generated by desktop users.

B) Spending on social network advertising grew by a cumulative annual average growth rate of over 35% between 2015 and 2019.

C) Social marketing differs markedly from traditional online marketing.

D) In social marketing, businesses cannot tightly control their brand messaging.

A

3) By 2022, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?

A) $13 million

B) $130 million

C) $13 billion

D) $130 billion

D

4) In which year did spending on mobile marketing first exceed the amount spent on desktop/laptop marketing?

A) 2014

B) 2015

C) 2016

D) 2017

C

5) Both mobile and social advertising spending are expected to double from 2017 to 2021.

TRUE

6) In 2020, the amount spent on local (digital) marketing is expected to exceed the amount spent on mobile marketing.

FALSE

8) How much time a month does the average U.S. adult spend on Facebook?

A) about 7 hours

B) about 10 hours

C) about 17 hours

D) about 27 hours

C

9) Which of the following attracts a highly educated, professional and managerial audience?

A) Snapchat

B) TikTok

C) LinkedIn

D) Instagram

C

10) Which of the following is the first step in the social marketing process?

A) community

B) amplification

C) fan acquisition

D) engagement

C

11) Encouraging users to click a Like button is an example of which step in the social marketing process?

A) fan acquisition

B) brand strength

C) community

D) amplification

D

12) Your Facebook News Feed includes all of the following except:

A) status updates.

B) app activity.

C) Likes.

D) tweets.

D

13) Which of the following companies used information from the Facebook pixel (tracking beacon) on its website and mobile app to create a dynamic ad campaign with ads delivered in Facebook News Feeds?

A) Lays

B) Sephora

C) Lifewtr

D) Yankee Candle

B

14) Ads that appear in a Facebook user's News Feed are called:

A) Marketplace Ads.

B) Promoted Ads.

C) Page Post Ads.

D) Brand Ads.

C

15) In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?

A) 15

B) 20

C) 25

D) 40

D

16) Which of the following is a history of your actions on Facebook?

A) News Feed

B) Timeline

C) Ticker

D) Open Graph

B

17) Sprout Social helped the Chicago Bulls basketball team to improve its social media presence on all of the following except:

A) Facebook.

B) Instagram.

C) Twitter.

D) Pinterest.

D

18) All of the following marketing tools on Facebook require payment except:

A) Brand Pages.

B) Facebook Watch.

C) News Feed Page Post Ads.

D) Mobile Ads.

A

19) The ratio of impressions to fans is a measure of:

A) engagement.

B) amplification.

C) community.

D) fan acquisition.

D

20) Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?

A) Promoted Trends

B) Amplify

C) Twitter Cards

D) Promoted Accounts

B

21) Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?

A) Promoted Tweet

B) Promoted Trend

C) Promoted Account

D) Twitter Card

D

22) Which of the following statements about Pinterest is not true?

A) Pinned photos and photo boards are available to all Pinterest users.

B) Men are Pinterest's fastest growing demographic.

C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.

D) Pinterest is the only one of the major social networks that does not accept paid advertising.

D

23) Which of the following are features of both Pinterest and Twitter?

A) tweets

B) hashtags

C) pins

D) Image Hover widget

B

24) All of the following are Pinterest marketing tools except:

A) Brand pages.

B) Rich Pins.

C) Promoted Pins.

D) Promoted Accounts.

D

25) The number of people exposed to pins on Pinterest is a measure of which of the following?

A) engagement

B) community

C) brand strength

D) fan acquisition

D

26) Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?

A) TweetDeck

B) Curalate

C) Amplify

D) Webtrends

B

27) Which of the following is another term for amplification?

A) impressions

B) reach

C) conversation rate

D) conversion ratio

B

28) All of the following are examples of dark social except:

A) e-mail.

B) tweets.

C) SMS texts.

D) instant messages.

B

29) As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:

A) Facebook brand page.

B) Facebook News Feed ads

C) Facebook Live.

D) Facebook's Lookalike Audience lead generation tool.

C

30) Which of the following allows Facebook to track user behavior on other sites?

A) Open Graph

B) Like button

C) hashtags

D) Facebook Watch

B

31) Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?

A) They have a tiny tag indicating that they are sponsored.

B) They can be liked, shared, and commented on, just like any news feed post.

C) They cannot contain links.

D) They have social context.

C

32) Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?

A) Facebook

B) Twitter

C) Pinterest

D) Instagram

B

33) Companies are not permitted to collect personal information from children under the age of ________ without parental consent.

A) 8

B) 13

C) 15

D) 18

B

34) Which of the following statements about COPPA is not true?

A) COPPA is not applicable to Internet of Thing (IoT) devices.

B) COPPA can only be enforced by the Federal Trade Commission.

C) COPPA provides that companies are not permitted to use personal information collected from children under 13 years of age without the verifiable prior consent of their parents.

D) The largest fine levied by the FTC under COPPA as of 2020 was against Google and YouTube.

A

35) Which of the following is most similar to Pinterest?

A) LinkedIn

B) Instagram

C) YouTube

D) Tumblr

B

36) Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?

A) Facebook

B) YouTube

C) Pinterest

D) Instagram

A

37) Which of the following refers to the number of interactions among members of a group and reflects the 'connectedness' of the group, even if these connections are forced on users?

A) engagement

B) information density

C) social density

D) amplification

C

38) Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?

A) social density

B) dark social

C) amplification

D) engagement

B

39) Which of the following is a not a type of Rich Pin?

A) Product Pin

B) Instant Pin

C) Article Pin

D) Recipe Pin

B

40) Which of the following statements about Instagram is not true?

A) Instagram is owned by Facebook.

B) Instagram's most rapidly growing demographic group is comprised of people under the age of 35.

C) Instagram is expected to generate around $16 billion in ad revenues in 2020.

D) Instagram has over 1 billion users worldwide.

B

41) Which of the following involves using a variety of tools to encourage users to interact with content and brand?

A) social density

B) engagement

C) amplification

D) dark social

B

42) Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?

A) social density

B) engagement

C) amplification

D) dark social

C

43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?

A) Graph Search

B) Like button

C) Messenger

D) Open Graph

D

44) Influencer marketing is a method of generating customer engagement.

TRUE

45) Pinterest's Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.

TRUE

46) Facebook does not sell display ads.

FALSE

47) Brand pages on Facebook typically attract more visitors than a brand's website.

TRUE

48) Promoted Video is the source of over 60% of Twitter's ad revenue.

TRUE

49) Pinterest's users are predominantly women.

TRUE

50) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.

TRUE

51) TikTok is owned by Facebook

FALSE

56) Which of the following is not true about mobile marketing?

A) There is significant overlap between local and mobile marketing.

B) By 2024, spending on mobile marketing is expected to be three times as much as spending on desktop marketing.

C) A substantial part of mobile marketing should be counted as social marketing.

D) People use most of their mobile minutes while they are on the go, outside of the home.

D

57) Which of the following is the top app in terms of percentage reach?

A) YouTube

B) Instagram

C) Twitter

D) Facebook

A

58) On average, users use about ________ apps a month on their smartphone.

A) 10

B) 15

C) 20

D) 50

C

59) Which of the following statements about Google is not true?

A) Google has seven of the top 15 apps in terms of percentage of reach.

B) The prices Google can charge for mobile ads are higher than what it can charge for desktop computer ads.

C) Facebook surpassed Google in mobile advertising revenue for the first time in 2018.

D) About 65 % of all mobile search ad revenue is generated by Google.

B

60) Which of the following is the most popular use for mobile devices?

A) shopping

B) socializing

C) entertainment

D) performing tasks, such as finances

C

61) Which of the following formats generates the second-highest amount of mobile ad spending revenue?

A) search engine advertising

B) display advertising

C) video advertising

D) mobile messaging

B

62) People spend the most time doing which of the following when using a mobile device?

A) watching videos

B) interacting on social networks

C) listening to music

D) reading news and magazines

C

63) While using apps, users spend over 90% of the time on just ________ of them.

A) 2

B) 3

C) 4

D) 5

D

64) Which of the following generates the most mobile ad spending?

A) display ads

B) search engine advertising

C) video ads

D) SMS text messages

B

65) Which of the following is not a major provider of mobile display advertising?

A) MoPub

B) Verizon Media

C) AdMob

D) Webtrends

D

66) Which of the following is the leading mobile retailer in the United States?

A) Walmart

B) Amazon

C) Google

D) QVC

B

67) Which of the following is not a technology for enabling proximity marketing?

A) Lens Studio

B) NFC

C) BLE

D) QR codes

A

68) Which of the following statements about BLE is not true?

A) Only Apple iPhones can use BLE.

B) BLE uses less power than traditional Bluetooth or GPS.

C) BLE has a two-way, push-pull communication capability.

D) BLE is more accurate than targeting through Wi-Fi triangulation.

A

69) Which of the following has been a leader in enabling augmented reality for mobile marketing?

A) Twitter

B) Google

C) Snapchat

D) Apple

C

70) Traditional retail products and travel services are the source of much of the current growth in m-commerce.

TRUE

71) Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues.

FALSE

72) SMS text messaging generates most of mobile marketing spending.

FALSE

76) In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?

A) $25 billion

B) $59 billion

C) $92 billion

D) $135 billion

A

77) Which of the following proximity marketing technologies did Macy's deploy in many of its retail stores in 2014?

A) QR codes

B) iBeacon

C) E9-1-1

D) Geo-search

B

78) Which of the following dominates the local mobile search market?

A) Twitter

B) Apple

C) Facebook

D) Google

D

79) Apple's iBeacon uses which of the following technologies?

A) BLE

B) NFC

C) E9-1-1

D) QR codes

A

80) Which of the following account for the vast majority of location-based mobile marketing?

A) Google and Twitter

B) Google and Facebook

C) Facebook and Twitter

D) Facebook and Instagram

B

81) Google uses which of the following to build a global database of wireless access points and their geographic locations?

A) E9-1-1

B) Street View cars

C) iBeacons

D) BLE

B

82) Eddystone is an open-source standard for beacon technology.

TRUE

83) A cell phone's GPS is accurate to within five feet of the actual location of the phone.

FALSE

The expansion of generic top-level domains recently authorized by ICANN is likely to be disruptive in terms of trademark protection.

Group of answer? True or False

True

Safe harbor provisions of the DMCA were at the heart of which of the following lawsuits?

-Government Employees Insurance Company v. Google, Inc.

-a lawsuit filed by the Authors Guild and five major publishing companies against Google

-Google, Inc. v. American Blind & Wallpaper Factory, Inc.

-a lawsuit brought by Viacom against YouTube and Google

a lawsuit filed by the Authors Guild and five major publishing companies against Google

Which case was instrumental in paving the way for Internet business methods patents?

-Bilski et al. v. Kappos

-State Street Bank & Trust Co. v. Signature Financial Group, Inc.

-Alice Corporation Pty. Ltd. v. CLS Bank International

-Ticketmaster Corp. v. Tickets.com

State Street Bank & Trust Co. v. Signature Financial Group, Inc.

A social consequence of the richness of Internet information is:

-very persuasive messages might reduce the need for multiple independent sources of information.

-an increase in shallowness.

-an increase in vulnerability to hacking attacks.

-an increase in the ease of creating misleading information.

very persuasive messages might reduce the need for multiple independent sources of information.

"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?

-Simplified Choice

-Scope

-Greater Transparency

-Privacy by Design

Simplified Choice

All of the following cases involved the doctrine of fair use except:

-Kelly v. Arriba Soft.

-Perfect 10, Inc. v. Amazon.com, Inc. et al.

-Field v. Google, Inc.

-Spokeo v. Robins

Spokeo v. Robins

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

-the Social Contract Rule

-the Golden Rule

-the Collective Utilitarian principle

-Universalism

the Golden Rule

Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.

True or False

True

The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.

True or False

False

Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

-Notice/Awareness

-Choice/Consent

-Access/Participation

-Security

Choice/Consent

All of the following are required in order for information to be considered a trade secret except:

-the owner must have taken steps to protect it.

-it must be something that others do not know.

-it must be unique.

-it must have commercial value to its owner.

it must be unique.

According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

-posted comments online anonymously

-used an anonymous web browsing service

-encrypted their communications

-cleared web browser history and cookies

cleared web browser history and cookies

In the United States, Google is not required to remove results from its search engine if requested.

True or False

True

In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

-State Street Bank & Trust v. Signature Financial Group, Inc.

-BMG Rights Management v. Cox Communications

-Bilski et al. v. Kappos

-Alice Corporation Pty. Ltd. v. CLS Bank International

Alice Corporation Pty. Ltd. v. CLS Bank International

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

-Require robust notice only before PII is collected.

-Require firms to have consumers affirmatively opt-in before PII is collected.

-Require firms to allow consumers to opt-out before PII is collected.

-Make collection of PII illegal.

Require firms to have consumers affirmatively opt-in before PII is collected.

Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.

True or False

True

Which of the following involves bypassing the target site's home page and going directly to a content page?

-cybersquatting

-framing

-deep linking

-metatagging

deep linking

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

-copyright law

-patent law

-trade secret law

-trademark law

patent law

The Day of Action in July 2017 was a protest to proposed changes in regulations pertaining to which of the following?

-Net neutrality

-fantasy sports

-Internet sales taxes

-the online sale of prescription drugs

Net neutrality

Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

-Risk Aversion

-the Slippery Slope

-the Collective Utilitarian principle

-No Free Lunch

Risk Aversion

Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?

-the Social Contract Rule

-the Golden Rule

-the Slippery Slope

-Universalism

the Slippery Slope

The TrustArc program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information, and to make it more likely that appropriate ads are shown to users.

True or False

False

Which of the following statements about the E.U. General Data Protection Regulation (GDPR) is not true?

-The GDPR replaces the E.U.'s existing Data Protection Directive.

-The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.

-The GDPR applies to any firm operating in any E.U. country.

-The GDPR eliminate the right to be forgotten.

The GDPR eliminate the right to be forgotten.

Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?

-digital wallets

-cookies

-shopping carts

-search engines

search engines

Registering a domain name similar or identical to trademarks of others to divert web traffic to their own sites is an example of:

-metatagging.

-framing.

-cyberpiracy.

-cybersquatting.

cyberpiracy

Which of the following is not a major e-commerce public safety and welfare issue?

-regulation of pornography

-regulation of gambling

-regulation of cigarette sales

-regulation of taxation

regulation of taxation

Which of the following statements about industry self-regulation regarding privacy is not true?

-Critics argue that the most effective form of industry self-regulation to safeguard privacy are online seal programs that attest to a company's privacy policies.

-The NAI offers consumers a global opt-out feature to prevent network advertising agencies from placing cookies on a user's computer.

-The AdChoices program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.

-Industry efforts have not so far succeeded in reducing American fears of privacy invasion.

Critics argue that the most effective form of industry self-regulation to safeguard privacy are online seal programs that attest to a company's privacy policies.

Which of the following is not true about the evolution of Facebook's privacy policies over the ten-year period from 2005 to 2015?

-Facebook's privacy policies improved from 2005 to 2009.

-Facebook's privacy policies have steadily declined since 2009.

-The amount of information gathered and monitored by Facebook increased.

-Facebook's privacy policy became easier to understand.

Facebook's privacy policy became easier to understand.

Most adult social network participants do not have any expectation of personal privacy when using a social network.

True or False

False

Which of the following protects original forms of expression in a tangible medium?

-trade secret law

-copyright law

-patent law

-trademark law

copyright law

Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

-the Golden Rule

-the Social Contract Rule

-the Slippery Slope

-Risk Aversion

the Social Contract Rule

Which of the following basic ethical concepts plays an important role in defining privacy?

-due process

-accountability

-liability

-responsibility

due process

Google defended its Library Project on the grounds of fair use.

True or False

True

Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

-A journalist quotes a paragraph from a book in a review of the book.

-A professor clips a newspaper article just before class and distributes copies of it to his class.

-Google posts thumbnail images of books in the Google Book Search Project.

-A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

-free availability of the work on the Web.

-nature of the work used.

-amount of the work used.

-market effect of the use.

free availability of the work on the Web.

All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:

-the DMCA makes it illegal to circumvent technological measures to protect works.

-the DMCA requires search engines to block access to infringing sites.

-the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.

-the DMCA allows libraries to make digital copies of works for internal use only.

the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.

Google owns which of the following, whose data it can use to create what some refer to as super profiles?

-TransUnion Corporation

-DoubleClick

-Experian

-Acxiom

DoubleClick

Which of the following cases has chipped away at DMCA safe harbor protection?

-Perfect 10, Inc. v. Amazon.com, Inc. et al.

-Alice Corporation Pty. Ltd. v. CLS Bank International

-Field v. Google, Inc.

-BMG Rights Management v. Cox Communications

Field v. Google, Inc.

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

-framing.

-cybersquatting.

-cyberpiracy.

-metatagging.

cybersquatting

The Federal Communications Commission's privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017.

True or False

True

Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

-information density

-interactivity

-ubiquity

-global reach

global reach

The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.

True or False

False

Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?

-ICANN

-WIPO

-USPTO

-FTC

WIPO

Which ethical principle tells you that it is wise to assume perfect information markets?

-the New York Times test

-the Social Contract Rule

-the Collective Utilitarian principle

-the Golden Rule

the New York Times test

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

-social technology

-ubiquity

-information density

-interactivity

social technology

The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

True or False

True

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

-Notice/Awareness

-Security

-Access/Participation

-Choice/Consent

Notice/Awareness

Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.

True or False

True

Which of the following is not a privacy advocacy group?

-EPIC

-TIO

-EFF

-CDT

TIO

Which of the following cases involved the issue of keywording?

-E. & J. Gallo Winery v. Spider Webs Ltd.

-Ticketmaster Corp. v. Tickets.com

-Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc.

-Government Employees Insurance Company v. Google, Inc.

Government Employees Insurance Company v. Google, Inc.

Which of the following technologies allows you to send e-mail without a trace?

-anonymous surfing

-P3P

-anonymous remailers

-public key encryption

anonymous remailers

Which of the following features of e-commerce technology can result in work and shopping invading family life?

-interactivity

-global reach

-ubiquity

-information density

ubiquity

Which of the following can be used to record all keyboard activity of a user?

-DRM

-trusted computing environments

-shopping carts

-spyware

spyware

The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

True or False

True

Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

-Freedom of Information Act

-COPPA

-Gramm-Leach-Bliley Act

-HIPAA

Gramm-Leach-Bliley Act

Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

-responsibility

-liability

-accountability

-privacy

privacy

Disputes over federal trademarks involve establishing:

-underlying ideas.

-infringement.

-piracy.

-intent.

infringement

All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

-fines up to $1 million for a repeat offense.

-restitution to the injured parties for any losses due to infringement.

-fines up to $500,000 for a first offense.

-up to ten years imprisonment for a first offense.

up to ten years imprisonment for a first offense.

Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:

-cybersquatting.

-metatagging.

-linking.

-typosquatting.

typosquatting

Online gambling is now legal throughout the United States.

True or False

False

What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

-the use of standards for file formats

-the ability to make perfect copies of digital works at little cost

-the anonymous nature of the Internet

-the support for instant peer-to-peer communication

the ability to make perfect copies of digital works at little cost

The Spokeo case involved a claim for damages based on which of the following?

-Anticybersquatting Consumer Protection Act

-Fair Credit Reporting Act

-Digital Millennium Copyright Act

-Defend Trade Secrets Act

Fair Credit Reporting Act

All of the following statements about patents are true except:

-it is more difficult to obtain a copyright than it is to obtain a patent.

-computer programs can be patented.

-in order to be patented, an invention must be nonobvious.

-the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.

it is more difficult to obtain a copyright than it is to obtain a patent.

Copyright protection protects against others copying the underlying ideas in a work.

True or False

False

Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

-USA PATRIOT Act

-Communications Assistance for Law Enforcement Act

-Homeland Security Act

-USA Freedom Act

USA Freedom Act

Downloading a music track owned by a record company without paying for it is an example of a violation of:

-copyright law.

-privacy law.

-trademark law.

-patent law.

copyright law.

Which of the following is considered one of the most contentious e-commerce patents?

-patent on one-click purchasing

-patent on streaming video media transmission

-Google's PageRank patent

-patent on buyer-driven name your price tools

patent on one-click purchasing

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

-the Golden Rule

-the Slippery Slope

-No Free Lunch

-the Social Contract Rule

No Free Lunch

What is the first step in analyzing an ethical dilemma?

-Identify the options you can reasonably take.

-Identify and describe the facts.

-Identify the potential consequences of your opinions.

-Define the conflict or dilemma and identify the higher-order values involved.

Identify and describe the facts.

Which of the following is a core Fair Information Practices (FIP) principle?

-Security

-Enforcement

-Choice/Consent

-Access/Participation

Choice/Consent

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

-Risk Aversion

-the Golden Rule

-the Social Contract Rule

-the Collective Utilitarian principle

the Collective Utilitarian principle

Which of the following is not one of the issues complicating the taxation of e-commerce sales?

-Taxes raised are used for different government purposes.

-Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.

-Sales taxes and policies vary by state and country.

-Retailers are only legally required to charge sales tax if they have operations located in the same state as a consumer.

Taxes raised are used for different government purposes.

The display of a third-party's website or page within your own website is called:

-metatagging.

-cybersquatting.

-framing.

-deep linking.

framing

一、選擇題

第六章

( BCD )1.在電子商務領域中,智慧財產權主要包括下列哪些?(複選)

A)隱私權(B)著作權(C)專利權(D)商標權

( BCD )2.智慧財產權的保護目標,主要在保護下列哪些權利?(複選)

A)隱私權(B)著作權(C)專利權(D)商標權

( ABC )3.下列哪些是常見的網路犯罪?(複選)

A)網路販賣盜版光碟(B)網路販賣贓物

C)入侵他人網站(D)散發電腦病毒

( A )4.智慧財產權法想要保護的是下列何者?(單選)

A)人類腦力辛勤創作的結晶(C)商業利益

B)商業機密(D)一般人知的權利

( D )5.任何能用來識別、找出或聯絡個人的資料,稱為?(單選)

A)會員資訊(B)使用資訊

C)匿名資訊(D)個人可識別資訊

( ACD )6.有關網路禮儀,下列哪些正確?(複選)

A)電腦禮儀的基本原則是「尊重」

B)雖是未經證實的消息,也要先讓大家知道

C)轉載別人的文章時,最好註明出處

D)最好取得原作者的同意後再進行轉載

( D )7.擅自拷貝網站會員個人資料檔的行為可能觸犯下列哪一項法律?(單選)

A)商標法(B)隱私權法

C)消費者保護法(D)電腦處理個人資料保護法

( B )8.下列何者不受著作權法的保護?(單選)

A)三歲小孩的畫作(B)中華民國憲法

C)學校的試題(D)學校的網頁

( A )9.在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)

A)駭客(B)網路專家

C)釣客(D)網路作家

( C )10.網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關係?(單選)

A)可否應當事人的要求,停用該當事人的會員資料

B)網站是否標示個人資料的使用目的

C)網站是否提供線上購物的服務

D)網站未經本人同意,是否會將個人資料轉讓給第三者

第七章

( A )1. 下列何者非企業電子化的主要應用範圍?(單選)

A)六個標準差 B SCM CCRMD ERP

( A )2.一年一度的同學會又到了,為了以防萬一,柔柔立刻打開家中的桌上型電腦,上EZTABLE網站將餐廳訂好。請悶這個動作是屬於下列哪一個概念的範疇?(單選)

A)電子商務(B)產業電子化(C)企業電子化(D)行動商務

( A )3.義房屋在業務員專屬的行動通訊設備裝上可以主動提醒和個人秘書的設定功能,而口要在無線網路的建結下,業務員便可以隨時隨地連上公司的系統,節省報表往返,提高銷售成交的機率。請問這套系統較符合下列何種概念?(單選)

A)企業資源規劃 B)顧客關係管理(C)供應鏈管理(D)知識管理

( D )4.小駱是個很認真的保險業務員,每當拜訪舊顧客時,總會拿出顧客從前留下的資料加以研讀,藉此提供最符合顧客需求的保險建議。請問這是屬於下列何種概念?(單選)

A)企業資源規劃(B) 知識管理(C)商業智慧(D) 顧客關係管理

( D )5.中華汽車為了提高公司的競爭力而導入系統建立個人知識平台並與工作管理系統進行結合,經由工作社群網路來建立不同的知識社群,進而發展出團隊的作業模式與規範。請問這套系統是?(單選)

A)企業資源規劃(B)顧客關係管理(C)商業智慧(D)知識管理

( C )6.超市主管常常會以線上分析處理工具來分析消費者的消費習慣,最後再透過決策支援系統訂出最佳化的銷售策略。這是屬於下列哪一個概念的應用?(單選)

A)企業資源規劃(B)知識管理(C)商業智慧(D 顧客關係管理

( B )7.2009年以來,便利商店紛紛提供電子化票券的服務,涵蓋遊樂園,交通,展覽等,將訂票的流程簡化,並利用促銷的方法吸引消費者接受與採用,像在ibon購票,憑票根就有買咖啡的優惠。請問上述是屬於企業電子化的哪一個策略?(單選)

A)目標市場的選擇(B)創新產業的形成

C)聯盟夥伴的成立(D)企業需求的了解

( C )8.漢神百貨與Yahoo!奇摩拍賣合作以進軍網路商城市場,這是屬於企業電子化的哪一個策略?(單選)

A)目標市場的選擇(B)創新產業的形成

C)聯盟夥伴的成立(D)企業需求的了解

( A )9.統一超商導入銷售時點系統(POS),藉此系統來即時記錄顧客購買的產品,時間、年齡等資訊,以改善傳統人工記錄的不便,並提供管理者在制定決策時的參考。請問上述是屬於企業電子化帶來的何種效益?(單選)

A)流程技術的改革(B)顧客關係的發展

C)知識創新的提升(D)銷售管道的創立

( D )10. PChome Online商店街推出後,強打免上架費、免月租與手續費打折等優惠,讓許多網拍業者達成開店的夢想,這是屬於企業電子化帶來的何種效益?(單選)

A)流程技術的改革(B)顧客關係的發展(C)知識創新的提升(D)銷售管道的創立

第八章

( C )1.下列敘述何者錯誤?(單選)

A)供應鏈是指從製造產品的原料、原物料、半成品,到製成品送至消費者手中的過程,包括供應商、製造商、配銷商、物流商等不同的企業,以處理產品由原物料到運送至消費者手中所需解決的金流,物流等問題

B)供應鏈導源於流通,原指軍方的後勤補給活動,隨著商業的蓮勃發展,逐漸推廣應用到商業活動上,其泛指能夠滿足消費者需求的產品流通過程,包括上,下游相關廠商都可納入供應鏈的範疇中

C)供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果

D)供應鏈管理具有協同整合、非核心業務外包、減少長鞭效應和即時、最佳化四種特性

( D )2.供應鍵管理的工具包括下列何者?(單選)

A)電子資料交換(B)企業資源規劃

C)供應鏈管理工具(D)以上皆是

( A )3.供應鏈管理是透過下列何者的協助,讓供應鏈成員間能有效整合,減少供應鏈體至。源的浪費與重複,並藉由緊密的結合來提升供應鏈的績效與服務水準,以增加各企業的競爭力?(單選)

A    資訊科技(B)物流管理

C)運籌管理(D)行銷管理

( B )4. ZARA在全球有數個趨勢記錄與預測的機構,以掌握衣服流行的趨勢變化,其將資料上傳至總部後,設計中心,生產中心,工廠等可從該資料庫中存取其所需的資訊,以縮短生產的製程時間。請問這是屬於供應鏈管理的何種特色?(單選)

A)減少長鞭效應(B)協同整合

C)非核心業務外包(D)洞察消費需求

( B )5.以下何者為供應鏈管理的發展流程?(單選)

A)物流管理階段運籌管理階段單一企業階段供應鏈管理階段

B)單一企業階段物流管理階段運籌管理階段供應鏈管理階段

C)供應鏈管理階段單一企業階段物流管理階段運籌管理階段

D)運籌管理階段單一企業管理階段物流管理階段供應鏈管理階段

( C )6.供應商數目多,以增加競爭與分散風險,是下列哪一種管理的特色?(單選)

A)行銷管理(B)供應鏈管理

C)運籌管理(D)財務管理

( A )7.以下何者為推式基礎的供應鏈流程?(單選)

(A)零售商依據以往顧客訂單來預測需求→製造商依據以往零售商訂單來預測需求

→顧客下單→零售商下單→出貨

B)顧客下單製造商生產零售商下單出貨

C)顧客下單零售商下單製造商生產出貨

D)製造商生產零售商生產顧客下單出貨

( B )8.博客來網路書店面對需求量不高的冷門書籍,大多是採接單後才向書商訂書,藉此降任本身的庫存成本。請問博客來網路書店是屬於何種供應鏈?(單選)

A)推式基礎的供應鏈(B)拉式基礎的供應鏈

C)推式+拉式基礎的供應鏈(D)垂直式基礎的供應鏈

( D )9.造成長鞭效應現象的原因有?(單選)

A)安全存量的設立(B)批次訂購的行為

C)價格變動的預期(D)以上皆是

( D )10.供應鏈成員的充分合作,將整體供應鏈整合成單一虛擬企業,共同制定供應鏈生產的策略、數量和其他的內容,以解決長鞭效應所造成需求變動的問題。這是屬於解決長鞭效應的哪種面向?(單選)

A)企業溝通面(B)資訊分享面

C)顧客需求面(D)供應鏈整合面

第九章

( B )1.顧客關係管理是透過下列何種循環來執行?(單選)

A)策略、蒐集、互動、區隔

B)蒐集、區隔、策略、互動

C)互動、策略、蒐集、區隔

D)區隔、蒐集、策略、互動

( C )2.下列何者為顧客關係管理主要的行銷模式?(單選)

A)營業額,獲利數字為衡量績效指標

B)顧客是可以取代的

C)儘可能將每一件商品賣給每一位顧客,以取得顧客對企業的終身價值及最大效益

D)以部門為行銷分界點,致使行銷、業務、客服部門接收到不同的資訊

( D )3.以下何者可稱為忠誠顧客?(單選)

A)使用後非常滿意者(B)再次購買者

C)不但自己購買還推薦給他人(D)以上皆是

( C )4.下列哪一個屬於資料蒐集技術?(單選)

A)線上分析處理(B)決策支援系統(C)電話客服中心(D)以上皆是

( D )5.只要麥當勞提出「晚餐找個伴,第二套半價」的促銷方案時,阿光就會想要找人去消費,請問阿光是屬於PeppersRogers顧客分類的哪一類?(單選)

A)最具價值的顧客(B)不具開發價值的顧客

C)會推薦他人的顧客(D)最具成長潛力カ的顧客

( D )6.下列何者非人工智慧的等級?(單選)

A)自動控制(B)推論應用

C)主動學習(D)推薦他人

( D )7.「泛指機器能自行學習,利用分析各資料料的特微來學習,不需要透過人類的設定就能完成」,請問這是指人工智慧的哪個等級?(單選)

A)自動控制(B)推論應用

C)主動學習(D)深度學習

( B )8.「能將數據進行分類,像是企業可依據客戶價值不同進行分類:最具價值的顧客,最具成長潛力的顧客,不具開發價值的顧客等」,請問這是指人工智慧發展的哪個步驟?(單選)

A)數據的蒐集階段(B)數據的分類階段

C)模型的建立階段(D)預測的執行階段

第十章

( A )1.企業透過程式記錄下所有能夠觀察到的事情,從網路使用者進入網頁的網址、

點選的項目、停留時間、消費的狀況等,並存放在數據庫中,做為後續分析的基本素材。這是指下列何者?(單選)

A)數據(B)資訊(D)知識(C)技術

( C )2.先設定某些分析的模式,再利用統計、分析、匯整等動作以區分出有意義的資訊。這是屬於資訊分析工具的哪一種?(單選)

A)分類(B)文字化(C)計算(D)精縮

( D )3.意指資料整理、匯整分析後的資訊,找出適合使用的部分,並且加入提要以供索引使用。這是屬於資訊分析工具的哪一種?(單選)

A)分類(B)文字化(C)計算(D)精縮

( B )4.下列何者不是知識管理的本質?(單選)

A)知識資訊化(B)知識數據化(C)知識分享化(D)知識價值化

( A )5.知識的開發、整理、利用之過程,能發掘出新的知識以創造出更高的價值。

這是屬於知識管理本質的哪一個?(單選)

A)知識價值化(B)知識分享化(C)知識數據化(D)知識資訊化

( C )6.以最低成本、最少人力來完成工作,主要的義涵為避免浪費。這是屬於下列哪一種生產方式?(單選)

A)福特式生產(B)大量生產(C)豐田式生產(D)泰勒式生產

( A )7.知識管理發展的沿革為下列何者?(單選)

A)泰勒時期豐田式生產知識型企業

B)知識型企業泰勒時期一豐田式生產

C)豐田式生產泰勒時期知識型企業

D)標準化生產福特式生產知識型企業

( B )8.知識管理的程序為何?(單)

A)知識的吸收知識的累積知識的創造知識的擴散

B)知識的吸收知識的創造知識的累積知識的擴散

C)知識的創造知識的累積知識的吸收知識的擴散

D)知識的擴散知識的累積知識的吸收知識的創造

( D )9.泛指企業將外在知識轉化為內在知識的能力,針對外在資訊,企業須思考如何透過學習,內化與應用過程,將其轉化為企業本身已經學得的內在知識。這是指?(單選)

A)知識創造能力(B)知識累積能力(C)知識擴散能力(D)知識吸收能力

( B )10.主要是由經驗獲得,較無法訴諸者語言,需經由適當的方式來進行分享(外顯化),並透過知識庫來儲存與分享,而這也是知識創造過程中最為關鍵的一步。這是指?(單選)

A    創造觀念(B)分享內隱知識(C)確認觀念(D)跨層次的知識擴展

二、 問答題

1   智慧財產的範疇?

著作權、專利權、商標權、網域名稱權。

2   說明什麼是長鞭效應?

顧客需求變動時可能產生預測不當,而鈔成過多存貨或缺貨的問題。

無法反應需求、產生訂單變異、存在心理預期

3  

3.1 什麼叫做企業資源規劃 (ERP)

將企業製造、財務、行銷及其他相關功能達成平衡的應用軟體,

整合性、完體性與自動化規劃企業資源的方式,以顧客導向為出發點

3.2 對內、對外有什麼效處?

對內整合組織內部資源,對外則結合主要的顧客與合作廠商。

4   商業智慧 (BI)跟企業資源規劃 (ERP)有什麼不同?

ERP 系統主要為管理和整合重要業務流程(如製造、庫存管理、財務、供應鍊等)的流程管理軟體。

BI 進一步處理這些數據,組織並分析與公司相關的所有資訊,以產出可執行的建議。

5  

5.1 什麼是供應鏈管理 (CSM)

透過資訊科技的協助,讓供應鏈成員間能有效整合,減少供應鏈體系資源的浪費與重複,並藉由緊密的結合來提升供應鏈的績效與服務水準,以增加各企業的競爭力。

5.2 請畫出SCOR流程類型模型

 

6  

6.1 什麼叫做顧客關係管理 (CRM)的精神?

協助企業在有限的資源下,利用適當的分析工具找出最有價值的顧客,進而提出行銷活動來促進其產生購買的行為。

6.2 忠誠顧客分成哪三種層次?

使用後非常滿意者、會再次購買者、不但自己購買還會推薦他人使用者