By 2021, spending on mobile marketing is expected to account for almost ________ of all online marketing and almost ________ times as much spent on desktop advertising.
a) 65%; three
b) 70%; three
c) 75%; four
d) 80%; four
c) 75%; four
Encouraging users to click a Like button is an example of which step in the social marketing process?
a) community
b) amplification
c) brand strength
d) fan acquisition
b) amplification
Which of the following statements about Pinterest is not true?
a) Pinned photos and photo boards are available to all Pinterest users
b) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams
c) Pinterest users are all in the 18-34 age group
d) Men are Pinterest's fastest growing demographic
c) Pinterest users are all in the 18-34 age group
Which of the following is another term for amplification?
a) conversion rate
b) conversion ratio
c) impressions
d) reach
d) reach
All of the following are examples of dark social except:
a) Snapchat
b) tweets
c) e-mail
d) SMS texts
b) tweets
Which of the following is not true about mobile marketing?
a) Mobile marketing is the fastest growing form of online marketing
b) A substantial part of mobile marketing should be counted as social marketing.
c) People use most of their mobile minutes while they are on the go
d) In 2017, spending on mobile marketing will comprise over 70% of the amount spent on all types of online marketing
c) People use most of their mobile minutes while they are on the go
Which of the following is the most popular use for mobile devices?
a) shopping
b) performing tasks, such as finances
c) entertainment
d) socializing
c) entertainment
Ads that appear in a Facebook user's News Feed are called:
Page Post Ads.
All of the following are examples of dark social except:
tweets.
All of the following marketing tools on Facebook require payment except:
Brand Pages.
All of the following were popular types of online marketing before 2007 except:
mobile marketing.
Apple's iBeacon uses which of the following technologies?
BLE
As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:
Facebook Live.
(T/F) Both mobile and social advertising spending are expected to double from 2017 to 2021.
True
(T/F) Brand pages on Facebook typically attract more visitors than a brand's website.
True
By 2022, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?
$130 billion
Companies are not permitted to collect personal information from children under the age of ________ without parental consent.
13
(T/F) Eddystone is an open-source standard for beacon technology.
True
Encouraging users to click a Like button is an example of which step in the social marketing process?
amplification
(T/F) Facebook does not sell display ads.
False
Google uses which of the following to build a global database of wireless access points and their geographic locations?
Street View cars
(T/F) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.
True
In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?
40
In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?
$25 billion
(T/F) Influencer marketing is a method of generating customer engagement.
True
On average, users use about ________ apps a month on their smartphone.
20
People spend the most time doing which of the following when using a mobile device?
listening to music
(T/F) Pinterest's Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.
True
(T/F) Pinterest's users are predominantly women.
True
(T/F) Promoted Video is the source of over 60% of Twitter's ad revenue.
True
(T/F) SMS text messaging generates most of mobile marketing spending.
False
The number of people exposed to pins on Pinterest is a measure of which of the following?
fan acquisition
The ratio of impressions to fans is a measure of:
fan acquisition.
(T/F) TikTok is owned by Facebook.
False
(T/F) Traditional retail products and travel services are the source of much of the current growth in m-commerce.
True
Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?
Twitter Card
Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?
Amplify
Which of the following account for the vast majority of location-based mobile marketing?
Google and Facebook
Which of the following allows Facebook to track user behavior on other sites?
Like button
Which of the following are features of both Pinterest and Twitter?
hashtags
Which of the following dominates the local mobile search market?
Which of the following generates the most mobile ad spending?
search engine advertising
Which of the following involves using a variety of tools to encourage users to interact with content and brand?
engagement
Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?
amplification
Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?
Open Graph
Which of the following is a history of your actions on Facebook?
Timeline
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
Curalate
Which of the following is another term for amplification?
reach
Which of the following is a not a type of Rich Pin?
Instant Pin
Which of the following is most similar to Pinterest?
Which of the following is the first step in the social marketing process?
fan acquisition
Which of the following is the leading mobile retailer in the United States?
Amazon
Which of the following is the most popular use for mobile devices?
entertainment
Which of the following is not a major provider of mobile display advertising?
Webtrends
Which of the following is not a technology for enabling proximity marketing?
Lens Studio
Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?
They cannot contain links.
Which of the following is not true about mobile marketing?
People use most of their mobile minutes while they are on the go, outside of the home.
Which of the following is not true about social marketing?
More than 50% of Twitter's ad revenues are generated by desktop users.
Which of the following proximity marketing technologies did Macy's deploy in many of its retail stores in 2014?
iBeacon
Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?
dark social
Which of the following statements about BLE is not true?
Only Apple iPhones can use BLE.
Which of the following statements about Instagram is not true?
Instagram's most rapidly growing demographic group is comprised of people under the age of 35.
Which of the following statements about Pinterest is not true?
Pinterest is the only one of the major social networks that does not accept paid advertising.
Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?
Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?
Your Facebook News Feed includes all of the following except:
tweets.
Ads that appear in a Facebook user's News Feed are called:
Page Post Ads.
All of the following are examples of dark social except:
tweets.
All of the following marketing tools on Facebook require payment except:
Brand Pages.
All of the following were popular types of online marketing before 2007 except:
mobile marketing.
Apple's iBeacon uses which of the following technologies?
BLE
As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:
Facebook Live.
(T/F) Both mobile and social advertising spending are expected to double from 2017 to 2021.
True
(T/F) Brand pages on Facebook typically attract more visitors than a brand's website.
True
By 2022, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?
$130 billion
Companies are not permitted to collect personal information from children under the age of ________ without parental consent.
13
(T/F) Eddystone is an open-source standard for beacon technology.
True
Encouraging users to click a Like button is an example of which step in the social marketing process?
amplification
(T/F) Facebook does not sell display ads.
False
Google uses which of the following to build a global database of wireless access points and their geographic locations?
Street View cars
(T/F) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.
True
In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?
40
In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?
$25 billion
(T/F) Influencer marketing is a method of generating customer engagement.
True
On average, users use about ________ apps a month on their smartphone.
20
People spend the most time doing which of the following when using a mobile device?
listening to music
(T/F) Pinterest’s Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.
True
(T/F) Pinterest's users are predominantly women.
True
(T/F) Promoted Video is the source of over 60% of Twitter's ad revenue.
True
(T/F) SMS text messaging generates most of mobile marketing spending.
False
The number of people exposed to pins on Pinterest is a measure of which of the following?
fan acquisition
The ratio of impressions to fans is a measure of:
fan acquisition.
(T/F) TikTok is owned by Facebook.
False
(T/F) Traditional retail products and travel services are the source of much of the current growth in m-commerce.
True
Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?
Twitter Card
Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?
Amplify
Which of the following account for the vast majority of location-based mobile marketing?
Google and Facebook
Which of the following allows Facebook to track user behavior on other sites?
Like button
Which of the following are features of both Pinterest and Twitter?
hashtags
Which of the following dominates the local mobile search market?
Which of the following generates the most mobile ad spending?
search engine advertising
Which of the following involves using a variety of tools to encourage users to interact with content and brand?
engagement
Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?
amplification
Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?
Open Graph
Which of the following is a history of your actions on Facebook?
Timeline
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
Curalate
Which of the following is another term for amplification?
reach
Which of the following is a not a type of Rich Pin?
Instant Pin
Which of the following is most similar to Pinterest?
Which of the following is the first step in the social marketing process?
fan acquisition
Which of the following is the leading mobile retailer in the United States?
Amazon
Which of the following is the most popular use for mobile devices?
entertainment
Which of the following is not a major provider of mobile display advertising?
Webtrends
Which of the following is not a technology for enabling proximity marketing?
Lens Studio
Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?
They cannot contain links.
Which of the following is not true about mobile marketing?
People use most of their mobile minutes while they are on the go, outside of the home.
Which of the following is not true about social marketing?
More than 50% of Twitter's ad revenues are generated by desktop users.
Which of the following proximity marketing technologies did Macy's deploy in many of its retail stores in 2014?
iBeacon
Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?
dark social
Which of the following statements about BLE is not true?
Only Apple iPhones can use BLE.
Which of the following statements about Pinterest is not true?
Pinterest is the only one of the major social networks that does not accept paid advertising.
Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?
Your Facebook News Feed includes all of the following except:
tweets.
1) All of the following were popular types of online marketing before 2007 except:
A) e-mail.
B) corporate websites.
C) mobile marketing.
D) display ads.
C) mobile marketing.
2) Which of the following is not true about social marketing?
A) More than 50% of Twitter's ad revenues are generated by desktop users.
B) The top seven social networks account for over 90% of all visits.
C) Social marketing differs markedly from traditional online marketing.
D) In social marketing, business cannot tightly control their brand messaging.
A) More than 50% of Twitter's ad revenues are generated by desktop users.
3) The second most popular social network in terms of average minutes per visitor is:
A) Instagram.
B) Pinterest.
C) LinkedIn.
D) Tumblr.
D) Tumblr
4) By 2018, it is estimated that advertisers will be spending ________ on mobile marketing.
A) $70 million
B) $700 million
C) $7 billion
D) $70 billion
D) $70 billion
9) Which of the following is primarily known for blogs?
A) Facebook
B) Tumblr
C) Google
D) Instagram
B) Tumblr
10) Which of the following is the first step in the social marketing process?
A) community
B) amplification
C) fan
acquisition
D) engagement
C) fan
acquisition
11) Encouraging users to click a Like button is an example of which step in the social marketing process?
A) fan acquisition
B) brand strength
C) community
D) amplification
D) amplification
12) Facebook News Feeds include all of the following except:
A) status updates.
B) app activity.
C) Likes.
D) tweets.
D) tweets
13) Which of the following statements about Facebook Exchange is not true?
A) It competes with DoubleClick.
B) It allows advertisers to target ads.
C) It is a social search engine.
D) It involves cookies.
C) It is a social search engine.
14) Ads that appear in a Facebook user's News Feeds are called:
A) Marketplace Ads.
B) Promoted Ads.
C) Page Post Ads.
D) Brand Ads.
C) Page Post Ads.
15) How many hours a month does the average Facebook user spend on Facebook?
A) 8
B) 18
C) 28
D) 38
B) 18
16) Which of the following is a history of your actions on Facebook?
A) News Feed
B) Timeline
C) Ticker
D) Open Graph
B) Timeline
17) Which of the following statements is not true?
A) Over 90% of Facebook's monthly active users access Facebook via a mobile device at least some of the time.
B) The only way to access Facebook from a mobile device is to use a mobile app.
C) Mobile ads are displayed in users' News Feeds.
D) Facebook's mobile ad revenues are its fastest growing revenue stream.
B) The only way to access Facebook from a mobile device is to use a mobile app.
18) All of the following marketing tools on Facebook require payment except:
A) Brand Pages.
B) Right-Hand Sidebar Ads.
C) News Feed Page Post Ads.
D) Mobile Ads.
A) Brand Pages
19) The ratio of impressions to fans is a measure of:
A) engagement.
B) amplification.
C) community.
D) fan
acquisition.
D) fan
acquisition
20) Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?
A) Enhanced Profile Pages
B) Amplify
C) Lead Generation Cards
D) Promoted Accounts
B) Amplify
21) Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline?
A) Promoted Tweet
B) Promoted Trend
C) Promoted Account
D) Lead Generation Card
D) Lead Generation Card
22) Which of the following statements about Pinterest is not true?
A) Pinned photos and photo boards are available to all Pinterest users.
B) Pinterest users are overwhelmingly female.
C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.
D) Pinterest is the only one of the major social networks that does not accept paid advertising.
D) Pinterest is the only one of the major social networks that does not accept paid advertising.
23) Which of the following are features of both Pinterest and Twitter?
A) tweets
B) hashtags
C) pins
D) Image Hover widget
B) hashtags
24) All of the following are Pinterest marketing tools except:
A) Brand pages.
B) Rich Pins.
C) Promoted Pins.
D) Promoted Accounts.
D) Promoted Accounts
25) The number of people exposed to pins is a measure of which of the following?
A) engagement
B) community
C) brand strength
D) fan
acquisition
D) fan
acquisition
26) Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
A) TweetDeck
B) Curalate
C) Amplify
D) Webtrends
B) Curalate
27) Which of the following is another term for amplification?
A) impressions
B) reach
C) conversation rate
D) conversion ratio
B) reach
28) All of the following are examples of dark social except:
A) e-mail.
B) tweets.
C) SMS texts.
D) Snapchat.
B) tweets
29) Facebook's share price fell dramatically after its IPO because investors feared that:
A) Facebook's new marketing solutions would be difficult to monetize.
B) new social networks such as Instagram were cannibalizing Facebook's audience.
C) privacy concerns were driving users away.
D) Facebook would be unable to increase advertising revenues fast enough to justify its price.
D) Facebook would be unable to increase advertising revenues fast enough to justify its price.
30) Which of the following allows Facebook to track user behavior on other sites and then sell the information to marketers?
A) Open Graph
B) Like button
C) hashtags
D) Whatsapp
B) Like button
31) Which of the following is not true about Facebook News Feed Page Post Ads?
A) They have a tiny tag indicating that they are sponsored.
B) They can be liked, shared, and commented on, just like any News Feed post.
C) They cannot contain links.
D) They have social context.
C) They cannot contain links.
32) Which of the following is a micro-blogging social network site that allows users to send and receive 140-character messages?
A) Facebook
B) Twitter
C) Pinterest
D) Instagram
B) Twitter
marketing capabilities of social marketing platforms such as Facebook, Twitter, and Pinterest.
34) Which of the following was the object of the FTC's highest penalty for a COPPA violation to date?
A) Disney's Playdom
B) W3 Innovation
C) Snapchat
D) Yelp
B) W3 Innovation
35) Which of the following is most similar to Pinterest?
A) LinkedIn
B) Instagram
C) YouTube
D) Tumblr
B) Instagram
36) Which social marketing proved the most effective for ExchangeHunterJumper.com?
A) Facebook
B) YouTube
C) Pinterest
D) Instagram
A) Facebook
38) Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?
A) social density
B) dark social
C) amplification
D) engagement
B) dark social
39) Which of the following is a real-time bidding system that allows advertisers to target their ads to specific users based on personal information provided by Facebook?
A) Amplify
B) FBX
C) DoubleClick
D) PTAT
B) FBX
40) Which of the following allows a user to buy products directly on its site and pay with Apple Pay?
A) Twitter
B) LinkedIn
C) Pinterest
D) Snapchat
C) Pinterest
41) Which of the following involves using a variety of tools to encourage users to interact with content and brand?
A) social density
B) engagement
C) amplification
D) dark social
B) engagement
42) Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?
A) social density
B) engagement
C) amplification
D) dark social
C) amplification
43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?
A) Whatsapp
B) Like button
C) Messenger
D) Open Graph
D) Open Graph
55) Which of the following is not true about mobile marketing?
A) Mobile marketing is the fastest growing form of online marketing.
B) In 2016, spending on mobile marketing will comprise over 60% of the amount spent on all types of online marketing.
C) A substantial part of mobile marketing should be counted as social marketing.
D) People use most of their mobile minutes while they are on the go.
D) People use most of their mobile minutes while they are on the go
56) Which of the following is the top app in terms of both audience size and share of time spent?
A) YouTube
B) iTunes
C) Twitter
D) Facebook
D) Facebook
57) How many retail-oriented apps are among the top 25 apps?
A) 1
B) 2
C) 3
D) 4
D) 4
58) Which of the following statements is not true?
A) Google is the leading display ad site on mobile devices.
B) In 2016, Google is expected to generate almost $15 billion in mobile ad revenues.
C) Mobile advertising is dominated by Google.
D) Google generates almost two-thirds of all mobile search ad spending.
A) Google is the leading display ad site on mobile devices.
59) Which of the following is the most popular use for mobile devices?
A) shopping
B) socializing
C) entertainment
D) performing tasks, such as finances
C) entertainment
60) According to a recent National Federation of Retailers survey, what percentage of tablet users plan to purchase anything with their tablets?
A) around 75%
B) around 50%
C) around 33%
D) around 35%
C) around 33%
61) Which of the following accounts for the most time people spend using a mobile device?
A) watching video
B) social networks
C) listening to music
D) reading news and magazines
C) listening to music
62) Around how many apps do users regularly use a month?
A) 17
B) 27
C) 37
D) 57
B) 27
63) In 2016, mobile marketing will be about ________% of all online marketing.
A) 25
B) 55
C) 65
D) 75
C) 65
64) Which of the following accounts for the most mobile ad spending?
A) display ads
B) search engine advertising
C) video ads
D) SMS text messages
B)search engine advertising
65) Which of the following is not a major provider of mobile display advertising?
A) MoPub
B) iAd
C) AdMob
D) Webtrends
D) Webtrends
66) ________ is the leading mobile retailer in the United States.
A) Walmart
B) Amazon
C) Google
D) QVC
B) Amazon
67) Which of the following technologies has Apple adopted in its hardware for Apple Pay?
A) GPS
B) NFC
C) BLE
D) QR codes
B) NFC
68) Which of the following statements about BLE is not true?
A) Only Apple iPhones can use BLE.
B) BLE uses less power than traditional Bluetooth or GPS.
C) BLE has a two-way, push-pull communication capability.
D) BLE is more accurate than targeting through Wi-Fi triangulation.
A) Only Apple iPhones can use BLE.
69) According to a recent National Federation of Retailers survey, consumers are more likely to use tablets rather than smartphones for all of the following except:
A) research products.
B) purchase products.
C) redeem coupons.
D) check for in-store availability.
C) redeem coupons.
76) Which of the following is currently a small part of the online marketing universe, but is expected to triple over the next five years?
A) local marketing
B) location-based mobile marketing
C) mobile marketing
D) social marketing on Facebook
B) location-based mobile marketing
77) Macy's deployed which of the following technologies in many of its retail stores in 2014?
A) QR codes
B) iBeacon
C) E9-1-1
D) Geo-search
B) iBeacon
78) Which of the following is the leading location-based marketer?
A) Twitter
B) Apple
C) Facebook
D) Google
D) Google
79) Apple's iBeacon uses which of the following technologies?
A) BLE
B) NFC
C) E9-1-1
D) QR codes
A) BLE
80) Which of the following is the leading location-based mobile ad format?
A) search ads
B) display ads
C) native/social ads
D) video ads
A) search ads
81) Google uses which of the following to build a global database of wireless access points and their geographic locations?
A) E9-1-1
B) Street View cars
C) iBeacons
D) BLE
B) Street View cars
1) All of the following were popular types of online marketing before 2007 except:
A) e-mail.
B) corporate websites.
C) mobile marketing.
D) display ads.
C
2) Which of the following is not true about social marketing?
A) More than 50% of Twitter's ad revenues are generated by desktop users.
B) Spending on social network advertising grew by a cumulative annual average growth rate of over 35% between 2015 and 2019.
C) Social marketing differs markedly from traditional online marketing.
D) In social marketing, businesses cannot tightly control their brand messaging.
A
3) By 2022, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?
A) $13 million
B) $130 million
C) $13 billion
D) $130 billion
D
4) In which year did spending on mobile marketing first exceed the amount spent on desktop/laptop marketing?
A) 2014
B) 2015
C) 2016
D) 2017
C
5) Both mobile and social advertising spending are expected to double from 2017 to 2021.
TRUE
6) In 2020, the amount spent on local (digital) marketing is expected to exceed the amount spent on mobile marketing.
FALSE
8) How much time a month does the average U.S. adult spend on Facebook?
A) about 7 hours
B) about 10 hours
C) about 17 hours
D) about 27 hours
C
9) Which of the following attracts a highly educated, professional and managerial audience?
A) Snapchat
B) TikTok
C) LinkedIn
D) Instagram
C
10) Which of the following is the first step in the social marketing process?
A) community
B) amplification
C) fan acquisition
D) engagement
C
11) Encouraging users to click a Like button is an example of which step in the social marketing process?
A) fan acquisition
B) brand strength
C) community
D) amplification
D
12) Your Facebook News Feed includes all of the following except:
A) status updates.
B) app activity.
C) Likes.
D) tweets.
D
13) Which of the following companies used information from the Facebook pixel (tracking beacon) on its website and mobile app to create a dynamic ad campaign with ads delivered in Facebook News Feeds?
A) Lays
B) Sephora
C) Lifewtr
D) Yankee Candle
B
14) Ads that appear in a Facebook user's News Feed are called:
A) Marketplace Ads.
B) Promoted Ads.
C) Page Post Ads.
D) Brand Ads.
C
15) In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?
A) 15
B) 20
C) 25
D) 40
D
16) Which of the following is a history of your actions on Facebook?
A) News Feed
B) Timeline
C) Ticker
D) Open Graph
B
17) Sprout Social helped the Chicago Bulls basketball team to improve its social media presence on all of the following except:
A) Facebook.
B) Instagram.
C) Twitter.
D) Pinterest.
D
18) All of the following marketing tools on Facebook require payment except:
A) Brand Pages.
B) Facebook Watch.
C) News Feed Page Post Ads.
D) Mobile Ads.
A
19) The ratio of impressions to fans is a measure of:
A) engagement.
B) amplification.
C) community.
D) fan acquisition.
D
20) Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?
A) Promoted Trends
B) Amplify
C) Twitter Cards
D) Promoted Accounts
B
21) Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?
A) Promoted Tweet
B) Promoted Trend
C) Promoted Account
D) Twitter Card
D
22) Which of the following statements about Pinterest is not true?
A) Pinned photos and photo boards are available to all Pinterest users.
B) Men are Pinterest's fastest growing demographic.
C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.
D) Pinterest is the only one of the major social networks that does not accept paid advertising.
D
23) Which of the following are features of both Pinterest and Twitter?
A) tweets
B) hashtags
C) pins
D) Image Hover widget
B
24) All of the following are Pinterest marketing tools except:
A) Brand pages.
B) Rich Pins.
C) Promoted Pins.
D) Promoted Accounts.
D
25) The number of people exposed to pins on Pinterest is a measure of which of the following?
A) engagement
B) community
C) brand strength
D) fan acquisition
D
26) Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
A) TweetDeck
B) Curalate
C) Amplify
D) Webtrends
B
27) Which of the following is another term for amplification?
A) impressions
B) reach
C) conversation rate
D) conversion ratio
B
28) All of the following are examples of dark social except:
A) e-mail.
B) tweets.
C) SMS texts.
D) instant messages.
B
29) As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:
A) Facebook brand page.
B) Facebook News Feed ads
C) Facebook Live.
D) Facebook's Lookalike Audience lead generation tool.
C
31) Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?
A) They have a tiny tag indicating that they are sponsored.
B) They can be liked, shared, and commented on, just like any news feed post.
C) They cannot contain links.
D) They have social context.
C
32) Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?
A) Facebook
B) Twitter
C) Pinterest
D) Instagram
B
34) Which of the following statements about COPPA is not true?
A) COPPA is not applicable to Internet of Thing (IoT) devices.
B) COPPA can only be enforced by the Federal Trade Commission.
C) COPPA provides that companies are not permitted to use personal information collected from children under 13 years of age without the verifiable prior consent of their parents.
D) The largest fine levied by the FTC under COPPA as of 2020 was against Google and YouTube.
A
35) Which of the following is most similar to Pinterest?
A) LinkedIn
B) Instagram
C) YouTube
D) Tumblr
B
36) Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?
A) Facebook
B) YouTube
C) Pinterest
D) Instagram
A
37) Which of the following refers to the number of interactions among members of a group and reflects the 'connectedness' of the group, even if these connections are forced on users?
A) engagement
B) information density
C) social density
D) amplification
C
38) Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?
A) social density
B) dark social
C) amplification
D) engagement
B
39) Which of the following is a not a type of Rich Pin?
A) Product Pin
B) Instant Pin
C) Article Pin
D) Recipe Pin
B
40) Which of the following statements about Instagram is not true?
A) Instagram is owned by Facebook.
B) Instagram's most rapidly growing demographic group is comprised of people under the age of 35.
C) Instagram is expected to generate around $16 billion in ad revenues in 2020.
D) Instagram has over 1 billion users worldwide.
B
41) Which of the following involves using a variety of tools to encourage users to interact with content and brand?
A) social density
B) engagement
C) amplification
D) dark social
B
42) Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?
A) social density
B) engagement
C) amplification
D) dark social
C
43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?
A) Graph Search
B) Like button
C) Messenger
D) Open Graph
D
44) Influencer marketing is a method of generating customer engagement.
TRUE
45) Pinterest's Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.
TRUE
46) Facebook does not sell display ads.
FALSE
47) Brand pages on Facebook typically attract more visitors than a brand's website.
TRUE
48) Promoted Video is the source of over 60% of Twitter's ad revenue.
TRUE
49) Pinterest's users are predominantly women.
TRUE
50) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.
TRUE
51) TikTok is owned by Facebook
FALSE
56) Which of the following is not true about mobile marketing?
A) There is significant overlap between local and mobile marketing.
B) By 2024, spending on mobile marketing is expected to be three times as much as spending on desktop marketing.
C) A substantial part of mobile marketing should be counted as social marketing.
D) People use most of their mobile minutes while they are on the go, outside of the home.
D
57) Which of the following is the top app in terms of percentage reach?
A) YouTube
B) Instagram
C) Twitter
D) Facebook
A
58) On average, users use about ________ apps a month on their smartphone.
A) 10
B) 15
C) 20
D) 50
C
59) Which of the following statements about Google is not true?
A) Google has seven of the top 15 apps in terms of percentage of reach.
B) The prices Google can charge for mobile ads are higher than what it can charge for desktop computer ads.
C) Facebook surpassed Google in mobile advertising revenue for the first time in 2018.
D) About 65 % of all mobile search ad revenue is generated by Google.
B
60) Which of the following is the most popular use for mobile devices?
A) shopping
B) socializing
C) entertainment
D) performing tasks, such as finances
C
61) Which of the following formats generates the second-highest amount of mobile ad spending revenue?
A) search engine advertising
B) display advertising
C) video advertising
D) mobile messaging
B
62) People spend the most time doing which of the following when using a mobile device?
A) watching videos
B) interacting on social networks
C) listening to music
D) reading news and magazines
C
63) While using apps, users spend over 90% of the time on just ________ of them.
A) 2
B) 3
C) 4
D) 5
D
64) Which of the following generates the most mobile ad spending?
A) display ads
B) search engine advertising
C) video ads
D) SMS text messages
B
65) Which of the following is not a major provider of mobile display advertising?
A) MoPub
B) Verizon Media
C) AdMob
D) Webtrends
D
66) Which of the following is the leading mobile retailer in the United States?
A) Walmart
B) Amazon
C) Google
D) QVC
B
67) Which of the following is not a technology for enabling proximity marketing?
A) Lens Studio
B) NFC
C) BLE
D) QR codes
A
68) Which of the following statements about BLE is not true?
A) Only Apple iPhones can use BLE.
B) BLE uses less power than traditional Bluetooth or GPS.
C) BLE has a two-way, push-pull communication capability.
D) BLE is more accurate than targeting through Wi-Fi triangulation.
A
69) Which of the following has been a leader in enabling augmented reality for mobile marketing?
A) Twitter
B) Google
C) Snapchat
D) Apple
C
70) Traditional retail products and travel services are the source of much of the current growth in m-commerce.
TRUE
71) Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues.
FALSE
72) SMS text messaging generates most of mobile marketing spending.
FALSE
76) In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?
A) $25 billion
B) $59 billion
C) $92 billion
D) $135 billion
A
77) Which of the following proximity marketing technologies did Macy's deploy in many of its retail stores in 2014?
A) QR codes
B) iBeacon
C) E9-1-1
D) Geo-search
B
78) Which of the following dominates the local mobile search market?
A) Twitter
B) Apple
C) Facebook
D) Google
D
79) Apple's iBeacon uses which of the following technologies?
A) BLE
B) NFC
C) E9-1-1
D) QR codes
A
80) Which of the following account for the vast majority of location-based mobile marketing?
A) Google and Twitter
B) Google and Facebook
C) Facebook and Twitter
D) Facebook and Instagram
B
81) Google uses which of the following to build a global database of wireless access points and their geographic locations?
A) E9-1-1
B) Street View cars
C) iBeacons
D) BLE
B
82) Eddystone is an open-source standard for beacon technology.
TRUE
83) A cell phone's GPS is accurate to within five feet of the actual location of the phone.
FALSE
1.8. 知識管理的程序為何?(單選) 回答錯誤
單選題 (2 分) 0分
A
.
(A) 知識的吸收→知識的累積→知識的創造→知識的擴散
B
.
(B) 知識的吸收→知識的創造→知識的累積→知識的擴散
C
.
(C) 知識的創造→知識的累積→知識的吸收→知識的擴散
D
.
(D) 知識的擴散→知識的累積→知識的吸收→知識的創造
正確答案: B
2.33) Companies are not permitted to collect personal information from children under the age of ________ without parental consent.
單選題 (2 分) 2分
A
.
A) 8
B
.
B) 13
C
.
C) 15
D
.
D) 18
正確答案: B
答案解釋:
3.59) Which of the following statements about Google is not true?
單選題 (2 分) 2分
A
.
A) Google has seven of the top 15 apps in terms of percentage of reach.
B
.
B) The prices Google can charge for mobile ads are higher than what it can charge for desktop computer ads.
C
.
C) Facebook surpassed Google in mobile advertising revenue for the first time in 2018.
D
.
D) About 65 % of all mobile search ad revenue is generated by Google.
正確答案: B
答案解釋:
4.9) Which of the following attracts a highly educated, professional and managerial audience?
單選題 (2 分) 2分
A
.
A) Snapchat
B
.
B) TikTok
C
.
C) LinkedIn
D
.
D) Instagram
正確答案: C
答案解釋:
5.21) Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?
單選題 (2 分) 2分
A
.
A) Promoted Tweet
B
.
B) Promoted Trend
C
.
C) Promoted Account
D
.
D) Twitter Card
正確答案: D
答案解釋:
6.34) Which of the following statements about COPPA is not true?
單選題 (2 分) 2分
A
.
A) COPPA is not applicable to Internet of Thing (IoT) devices.
B
.
B) COPPA can only be enforced by the Federal Trade Commission.
C
.
C) COPPA provides that companies are not permitted to use personal information collected from children under 13 years of age without the verifiable prior consent of their parents.
D
.
D) The largest fine levied by the FTC under COPPA as of 2020 was against Google and YouTube.
正確答案: A
答案解釋:
7.30) Which of the following allows Facebook to track user behavior on other sites?
單選題 (2 分) 2分
A
.
A) Open Graph
B
.
B) Like button
C
.
C) hashtags
D
.
D) Facebook Watch
正確答案: B
答案解釋:
8.65) Which of the following is not a major provider of mobile display advertising?
單選題 (2 分) 2分
A
.
A) MoPub
B
.
B) Verizon Media
C
.
C) AdMob
D
.
D) Webtrends
正確答案: D
答案解釋:
9.32) Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?
單選題 (2 分) 2分
A
.
A) Facebook
B
.
B) Twitter
C
.
C) Pinterest
D
.
D) Instagram
正確答案: B
答案解釋:
10.81) Google uses which of the following to build a global database of wireless access points and their geographic locations?
單選題 (2 分) 2分
A
.
A) E9-1-1
B
.
B) Street View cars
C
.
C) iBeacons
D
.
D) BLE
正確答案: B
答案解釋:
11.68) Which of the following statements about BLE is not true?
單選題 (2 分) 2分
A
.
A) Only Apple iPhones can use BLE.
B
.
B) BLE uses less power than traditional Bluetooth or GPS.
C
.
C) BLE has a two-way, push-pull communication capability.
D
.
D) BLE is more accurate than targeting through Wi-Fi triangulation.
正確答案: A
答案解釋:
12.25) The number of people exposed to pins on Pinterest is a measure of which of the following?
單選題 (2 分) 2分
A
.
A) engagement
B
.
B) community
C
.
C) brand strength
D
.
D) fan acquisition
正確答案: D
答案解釋:
13.10. 主要是由經驗獲得,較無法訴諸語言,需經由適當的方式來進行分享 (外顯化),並透過知識庫來儲存與分享,而這也是知識創造過程中最為關鍵的一步。這是指?(單選)
單選題 (2 分) 2分
A
.
(A) 創造觀念
B
.
(B) 分享內隱知識
C
.
(C) 確認觀念
D
.
(D) 跨層次的知識擴展
正確答案: B
答案解釋:
14.8) How much time a month does the average U.S. adult spend on Facebook?
單選題 (2 分) 2分
A
.
A) about 7 hours
B
.
B) about 10 hours
C
.
C) about 17 hours
D
.
D) about 27 hours
正確答案: C
答案解釋:
15.77) Which of the following proximity marketing technologies did Macy’s deploy in many of its retail stores in 2014?
單選題 (2 分) 2分
A
.
A) QR codes
B
.
B) iBeacon
C
.
C) E9-1-1
D
.
D) Geo-search
正確答案: B
答案解釋:
16.28) All of the following are examples of dark social except:
單選題 (2 分) 2分
A
.
A) e-mail.
B
.
B) tweets.
C
.
C) SMS texts.
D
.
D) instant messages.
正確答案: B
答案解釋:
17.18) All of the following marketing tools on Facebook require payment except:
單選題 (2 分) 2分
A
.
A) Brand Pages.
B
.
B) Facebook Watch.
C
.
C) News Feed Page Post Ads.
D
.
D) Mobile Ads.
正確答案: A
答案解釋:
18.76) In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?
單選題 (2 分) 2分
A
.
A) $25 billion
B
.
B) $59 billion
C
.
C) $92 billion
D
.
D) $135 billion
正確答案: A
答案解釋:
19.26) Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
單選題 (2 分) 2分
A
.
A) TweetDeck
B
.
B) Curalate
C
.
C) Amplify
D
.
D) Webtrends
正確答案: B
答案解釋:
20.4. 下列何者不是知識管理的本質?(單選)
單選題 (2 分) 2分
A
.
(A) 知識資訊化
B
.
(B) 知識數據化
C
.
(C) 知識分享化
D
.
(D) 知識價值化
正確答案: B
答案解釋:
21.7. 知識管理發展的沿革為下列何者?(單選)
單選題 (2 分) 2分
A
.
(A) 泰勒時期→豐田式生產→知識型企業
B
.
(B) 知識型企業→泰勒時期→豐田式生產
C
.
(C) 豐田式生產→泰勒時期→知識型企業
D
.
(D) 標準化生產→福特式生產→知識型企業
正確答案: A
答案解釋:
22.5. 知識的開發、整理、利用之過程,能發掘出新的知識以創造出更高的價值。這是屬於知識管理本質的哪一個?(單選)
單選題 (2 分) 2分
A
.
(A) 知識價值化
B
.
(B) 知識分享化
C
.
(C) 知識數據化
D
.
(D) 知識資訊化
正確答案: A
答案解釋:
23.24) All of the following are Pinterest marketing tools except: 回答錯誤
單選題 (2 分) 0分
A
.
A) Brand pages.
B
.
B) Rich Pins.
C
.
C) Promoted Pins.
D
.
D) Promoted Accounts.
正確答案: D
24.6. 以最低成本、最少人力來完成工作,主要的義涵為避免浪費。這是屬於下列哪一種生產方式?(單選)
單選題 (2 分) 2分
A
.
(A) 福特式生產
B
.
(B) 大量生產
C
.
(C) 豐田式生產
D
.
(D) 泰勒式生產
正確答案: C
答案解釋:
25.67) Which of the following is not a technology for enabling proximity marketing?
單選題 (2 分) 2分
A
.
A) Lens Studio
B
.
B) NFC
C
.
C) BLE
D
.
D) QR codes
正確答案: A
答案解釋:
26.23) Which of the following are features of both Pinterest and Twitter?
單選題 (2 分) 2分
A
.
A) tweets
B
.
B) hashtags
C
.
C) pins
D
.
D) Image Hover widget
正確答案: B
答案解釋:
27.42) Which of the following involves using the inherent strength of social networks to encourage visitors and fans to share their Likes and comments with friends?
單選題 (2 分) 2分
A
.
A) social density
B
.
B) engagement
C
.
C) amplification
D
.
D) dark social
正確答案: C
答案解釋:
28.58) On average, users use about ________ apps a month on their smartphone.
單選題 (2 分) 2分
A
.
A) 10
B
.
B) 15
C
.
C) 20
D
.
D) 50
正確答案: C
答案解釋:
29.22) Which of the following statements about Pinterest is not true?
單選題 (2 分) 2分
A
.
A) Pinned photos and photo boards are available to all Pinterest users.
B
.
B) Men are Pinterest's fastest growing demographic.
C
.
C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.
D
.
D) Pinterest is the only one of the major social networks that does not accept paid advertising.
正確答案: D
答案解釋:
30.36) Which social network has been the most effective marketing platform for ExchangeHunterJumper.com?
單選題 (2 分) 2分
A
.
A) Facebook
B
.
B) YouTube
C
.
C) Pinterest
D
.
D) Instagram
正確答案: A
答案解釋:
31.31) Which of the following is not true about Page Post Ads displayed in the Facebook News Feed?
單選題 (2 分) 2分
A
.
A) They have a tiny tag indicating that they are sponsored.
B
.
B) They can be liked, shared, and commented on, just like any news feed post.
C
.
C) They cannot contain links.
D
.
D) They have social context.
正確答案: C
答案解釋:
32.57) Which of the following is the top app in terms of percentage reach? 回答錯誤
單選題 (2 分) 0分
A
.
A) YouTube
B
.
B) Instagram
C
.
C) Twitter
D
.
D) Facebook
正確答案: A
33.11) Encouraging users to click a Like button is an example of which step in the social marketing process?
單選題 (2 分) 2分
A
.
A) fan acquisition
B
.
B) brand strength
C
.
C) community
D
.
D) amplification
正確答案: D
答案解釋:
34.43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?
單選題 (2 分) 2分
A
.
A) Graph Search
B
.
B) Like button
C
.
C) Messenger
D
.
D) Open Graph
正確答案: D
答案解釋:
35.69) Which of the following has been a leader in enabling augmented reality for mobile marketing?
單選題 (2 分) 2分
A
.
A) Twitter
B
.
B) Google
C
.
C) Snapchat
D
.
D) Apple
正確答案: C
答案解釋:
36.5) Both mobile and social advertising spending are expected to double from 2017 to 2021.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
37.46) Facebook does not sell display ads.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
38.45) Pinterest’s Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
39.50) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
40.47) Brand pages on Facebook typically attract more visitors than a brand's website.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
41.83) A cell phone's GPS is accurate to within five feet of the actual location of the phone.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
42.6) In 2020, the amount spent on local (digital) marketing is expected to exceed the amount spent on mobile marketing. 回答錯誤
是非題 (2 分) 0分
A
.
A
B
.
B
正確答案: B
43.82) Eddystone is an open-source standard for beacon technology.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
44.51) TikTok is owned by Facebook
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
45.48) Promoted Video is the source of over 60% of Twitter’s ad revenue.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
46.49) Pinterest's users are predominantly women.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
47.72) SMS text messaging generates most of mobile marketing spending.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
48.70) Traditional retail products and travel services are the source of much of the current growth in m-commerce.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
49.71) Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues. 回答錯誤
是非題 (2 分) 0分
A
.
A
B
.
B
正確答案: B
50.44) Influencer marketing is a method of generating customer engagement.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
1.38) Which of the following refers to those forms of social sharing that occur off the major social networks, through alternative communication tools?
單選題 (2 分) 2分
A
.
A) social density
B
.
B) dark social
C
.
C) amplification
D
.
D) engagement
正確答案: B
答案解釋:
2.79) Apple's iBeacon uses which of the following technologies?
單選題 (2 分) 2分
A
.
A) BLE
B
.
B) NFC
C
.
C) E9-1-1
D
.
D) QR codes
正確答案: A
答案解釋:
3.15) In 2020, about how many hours a month are online social network users in the United States expected to spend, on average, on all social networks combined?
單選題 (2 分) 2分
A
.
A) 15
B
.
B) 20
C
.
C) 25
D
.
D) 40
正確答案: D
答案解釋:
4.41) Which of the following involves using a variety of tools to encourage users to interact with content and brand?
單選題 (2 分) 2分
A
.
A) social density
B
.
B) engagement
C
.
C) amplification
D
.
D) dark social
正確答案: B
答案解釋:
5.40) Which of the following statements about Instagram is not true?
單選題 (2 分) 2分
A
.
A) Instagram is owned by Facebook.
B
.
B) Instagram’s most rapidly growing demographic group is comprised of people under the age of 35.
C
.
C) Instagram is expected to generate around $16 billion in ad revenues in 2020.
D
.
D) Instagram has over 1 billion users worldwide.
正確答案: B
答案解釋:
6.76) In 2020, how much are advertisers expected to spend on local-based (local) mobile marketing?
單選題 (2 分) 2分
A
.
A) $25 billion
B
.
B) $59 billion
C
.
C) $92 billion
D
.
D) $135 billion
正確答案: A
答案解釋:
7.68) Which of the following statements about BLE is not true?
單選題 (2 分) 2分
A
.
A) Only Apple iPhones can use BLE.
B
.
B) BLE uses less power than traditional Bluetooth or GPS.
C
.
C) BLE has a two-way, push-pull communication capability.
D
.
D) BLE is more accurate than targeting through Wi-Fi triangulation.
正確答案: A
答案解釋:
8.24) All of the following are Pinterest marketing tools except:
單選題 (2 分) 2分
A
.
A) Brand pages.
B
.
B) Rich Pins.
C
.
C) Promoted Pins.
D
.
D) Promoted Accounts.
正確答案: D
答案解釋:
9.12) Your Facebook News Feed includes all of the following except:
單選題 (2 分) 2分
A
.
A) status updates.
B
.
B) app activity.
C
.
C) Likes.
D
.
D) tweets.
正確答案: D
答案解釋:
10.67) Which of the following is not a technology for enabling proximity marketing?
單選題 (2 分) 2分
A
.
A) Lens Studio
B
.
B) NFC
C
.
C) BLE
D
.
D) QR codes
正確答案: A
答案解釋:
11.28) All of the following are examples of dark social except:
單選題 (2 分) 2分
A
.
A) e-mail.
B
.
B) tweets.
C
.
C) SMS texts.
D
.
D) instant messages.
正確答案: B
答案解釋:
12.37) Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users?
單選題 (2 分) 2分
A
.
A) engagement
B
.
B) information density
C
.
C) social density
D
.
D) amplification
正確答案: C
答案解釋:
13.9. 泛指企業將外在知識轉化為內在知識的能力,針對外在資訊,企業須思考如何透過學習、內化與應用過程,將其轉化為企業本身已經學得的內在知識。這是指?(單選)
單選題 (2 分) 2分
A
.
(A) 知識創造能力
B
.
(B) 知識累積能力
C
.
(C) 知識擴散能力
D
.
(D) 知識吸收能力
正確答案: D
答案解釋:
14.64) Which of the following generates the most mobile ad spending?
單選題 (2 分) 2分
A
.
A) display ads
B
.
B) search engine advertising
C
.
C) video ads
D
.
D) SMS text messages
正確答案: B
答案解釋:
15.1. 企業透過程式記錄下所有能夠觀察到的事情,從網路使用者進入網頁的網址、點選的項目、停留時間、消費的狀況等,並存放在數據庫中,做為後續分析的基本素材。這是指下列何者?(單選)
單選題 (2 分) 2分
A
.
(A) 數據
B
.
(B) 資訊
C
.
(C) 技術
D
.
(D) 知識
正確答案: A
答案解釋:
16.10) Which of the following is the first step in the social marketing process?
單選題 (2 分) 2分
A
.
A) community
B
.
B) amplification
C
.
C) fan acquisition
D
.
D) engagement
正確答案: C
答案解釋:
17.32) Which of the following is a micro-blogging social network site that allows users to send and receive 280-character messages, as well as news articles, photos, and videos?
單選題 (2 分) 2分
A
.
A) Facebook
B
.
B) Twitter
C
.
C) Pinterest
D
.
D) Instagram
正確答案: B
答案解釋:
18.30) Which of the following allows Facebook to track user behavior on other sites?
單選題 (2 分) 2分
A
.
A) Open Graph
B
.
B) Like button
C
.
C) hashtags
D
.
D) Facebook Watch
正確答案: B
答案解釋:
19.33) Companies are not permitted to collect personal information from children under the age of ________ without parental consent.
單選題 (2 分) 2分
A
.
A) 8
B
.
B) 13
C
.
C) 15
D
.
D) 18
正確答案: B
答案解釋:
20.34) Which of the following statements about COPPA is not true?
單選題 (2 分) 2分
A
.
A) COPPA is not applicable to Internet of Thing (IoT) devices.
B
.
B) COPPA can only be enforced by the Federal Trade Commission.
C
.
C) COPPA provides that companies are not permitted to use personal information collected from children under 13 years of age without the verifiable prior consent of their parents.
D
.
D) The largest fine levied by the FTC under COPPA as of 2020 was against Google and YouTube.
正確答案: A
答案解釋:
21.59) Which of the following statements about Google is not true?
單選題 (2 分) 2分
A
.
A) Google has seven of the top 15 apps in terms of percentage of reach.
B
.
B) The prices Google can charge for mobile ads are higher than what it can charge for desktop computer ads.
C
.
C) Facebook surpassed Google in mobile advertising revenue for the first time in 2018.
D
.
D) About 65 % of all mobile search ad revenue is generated by Google.
正確答案: B
答案解釋:
22.9) Which of the following attracts a highly educated, professional and managerial audience?
單選題 (2 分) 2分
A
.
A) Snapchat
B
.
B) TikTok
C
.
C) LinkedIn
D
.
D) Instagram
正確答案: C
答案解釋:
23.8. 知識管理的程序為何?(單選)
單選題 (2 分) 2分
A
.
(A) 知識的吸收→知識的累積→知識的創造→知識的擴散
B
.
(B) 知識的吸收→知識的創造→知識的累積→知識的擴散
C
.
(C) 知識的創造→知識的累積→知識的吸收→知識的擴散
D
.
(D) 知識的擴散→知識的累積→知識的吸收→知識的創造
正確答案: B
答案解釋:
24.29) As discussed in the chapter-opening case, Hubble used all of the following Facebook marketing tools except:
單選題 (2 分) 2分
A
.
A) Facebook brand page.
B
.
B) Facebook News Feed ads
C
.
C) Facebook Live.
D
.
D) Facebook’s Lookalike Audience lead generation tool.
正確答案: C
答案解釋:
25.81) Google uses which of the following to build a global database of wireless access points and their geographic locations?
單選題 (2 分) 2分
A
.
A) E9-1-1
B
.
B) Street View cars
C
.
C) iBeacons
D
.
D) BLE
正確答案: B
答案解釋:
26.7. 知識管理發展的沿革為下列何者?(單選)
單選題 (2 分) 2分
A
.
(A) 泰勒時期→豐田式生產→知識型企業
B
.
(B) 知識型企業→泰勒時期→豐田式生產
C
.
(C) 豐田式生產→泰勒時期→知識型企業
D
.
(D) 標準化生產→福特式生產→知識型企業
正確答案: A
答案解釋:
27.62) People spend the most time doing which of the following when using a mobile device?
單選題 (2 分) 2分
A
.
A) watching videos
B
.
B) interacting on social networks
C
.
C) listening to music
D
.
D) reading news and magazines
正確答案: C
答案解釋:
28.22) Which of the following statements about Pinterest is not true?
單選題 (2 分) 2分
A
.
A) Pinned photos and photo boards are available to all Pinterest users.
B
.
B) Men are Pinterest's fastest growing demographic.
C
.
C) Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams.
D
.
D) Pinterest is the only one of the major social networks that does not accept paid advertising.
正確答案: D
答案解釋:
29.20) Which of the following Twitter marketing tools provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?
單選題 (2 分) 2分
A
.
A) Promoted Trends
B
.
B) Amplify
C
.
C) Twitter Cards
D
.
D) Promoted Accounts
正確答案: B
答案解釋:
30.3. 意指資料整理、匯整分析後的資訊,找出適合使用的部分,並且加入提要以供索引使用。這是屬於資訊分析工具的哪一種?(單選)
單選題 (2 分) 2分
A
.
(A) 分類
B
.
(B) 文字化
C
.
(C) 計算
D
.
(D) 精縮
正確答案: D
答案解釋:
31.5. 知識的開發、整理、利用之過程,能發掘出新的知識以創造出更高的價值。這是屬於知識管理本質的哪一個?(單選)
單選題 (2 分) 2分
A
.
(A) 知識價值化
B
.
(B) 知識分享化
C
.
(C) 知識數據化
D
.
(D) 知識資訊化
正確答案: A
答案解釋:
32.63) While using apps, users spend over 90% of the time on just ________ of them.
單選題 (2 分) 2分
A
.
A) 2
B
.
B) 3
C
.
C) 4
D
.
D) 5
正確答案: D
答案解釋:
33.43) Which of the following is a Facebook feature that allows app developers to integrate their apps into the Facebook pages of users who sign up for the app?
單選題 (2 分) 2分
A
.
A) Graph Search
B
.
B) Like button
C
.
C) Messenger
D
.
D) Open Graph
正確答案: D
答案解釋:
34.19) The ratio of impressions to fans is a measure of:
單選題 (2 分) 2分
A
.
A) engagement.
B
.
B) amplification.
C
.
C) community.
D
.
D) fan acquisition.
正確答案: D
答案解釋:
35.65) Which of the following is not a major provider of mobile display advertising?
單選題 (2 分) 2分
A
.
A) MoPub
B
.
B) Verizon Media
C
.
C) AdMob
D
.
D) Webtrends
正確答案: D
答案解釋:
36.45) Pinterest’s Shopping Pins requires a merchant to have a product catalog uploaded to Pinterest.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
37.44) Influencer marketing is a method of generating customer engagement.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
38.47) Brand pages on Facebook typically attract more visitors than a brand's website.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
39.70) Traditional retail products and travel services are the source of much of the current growth in m-commerce.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
40.6) In 2020, the amount spent on local (digital) marketing is expected to exceed the amount spent on mobile marketing.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
41.49) Pinterest's users are predominantly women.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
42.72) SMS text messaging generates most of mobile marketing spending.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
43.83) A cell phone's GPS is accurate to within five feet of the actual location of the phone.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
44.71) Purchases made on tablet computers are the fastest growing and largest source of m-commerce revenues.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
45.50) In 2020, Millennials and Gen-Zers together represent about 85% of Snapchat's monthly active U.S. users.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
46.82) Eddystone is an open-source standard for beacon technology.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
47.51) TikTok is owned by Facebook
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
48.5) Both mobile and social advertising spending are expected to double from 2017 to 2021.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
49.46) Facebook does not sell display ads.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
50.48) Promoted Video is the source of over 60% of Twitter’s ad revenue.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
A) information density
B) interactivity
C) social technology
D) ubiquity
c
2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?
A) ubiquity
B) interactivity
C) information density
D) global reach
d
3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?
A) accountability
B) privacy
C) responsibility
D) liability
b
4) What is the first step in analyzing an ethical dilemma?
A) Define the conflict or dilemma and identify the higher-order values involved.
B) Identify the potential consequences of your opinions.
C) Identify the options you can reasonably take.
D) Identify and describe the facts.
d
5) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
A) the Golden Rule
B) Risk Aversion
C) the Collective Utilitarian principle
D) the Social Contract Rule
c
6) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
A) the Golden Rule
B) Universalism
C) the Collective Utilitarian principle
D) the Social Contract Rule
a
7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
A) the Golden Rule
B) the Slippery Slope
C) the Social Contract Rule
D) No Free Lunch
d
8) Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?
A) Universalism
B) the Slippery Slope
C) the Social Contract Rule
D) the Golden Rule
b
9) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?
A) the Golden Rule
B) Risk Aversion
C) the Slippery Slope
D) the Social Contract Rule
d
10) Which ethical principle tells you that it is wise to assume perfect information markets?
A) the Golden Rule
B) the New York Times test
C) the Social Contract Rule
D) the Collective Utilitarian principle
b
11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
A) the Slippery Slope
B) Risk Aversion
C) No Free Lunch
D) the Collective Utilitarian principle
b
12) A social consequence of the richness of Internet information is:
A) an increase in shallowness.
B) an increase in the ease of creating misleading information.
C) very persuasive messages might reduce the need for multiple independent sources of information.
D) an increase in vulnerability to hacking attacks.
c
13) Downloading a music track owned by a record company without paying for it is an example of a violation of:
A) patent law.
B) copyright law.
C) trademark law.
D) privacy law.
b
14) Which of the following features of e-commerce technology can result in work and shopping invading family life?
A) interactivity
B) ubiquity
C) information density
D) global reach
b
20) Which of the following basic ethical concepts plays an important role in defining privacy?
A) responsibility
B) accountability
C) liability
D) due process
d
21) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?
A) USA PATRIOT Act
B) Homeland Security Act
C) Communications Assistance for Law Enforcement Act
D) USA Freedom Act
d
22) Which of the following is used to track individuals as they move among thousands of websites?
A) first-party cookies
B) digital wallets
C) advertising networks
D) shopping carts
c
23) Which of the following uses software installed at the ISP level to track user clickstream behavior?
A) shopping carts
B) trusted computing environments
C) deep packet inspection
D) DRM
c
25) The Spokeo case involved a claim for damages based on which of the following?
A) Fair Credit Reporting Act
B) Digital Millennium Copyright Act
C) Anticybersquatting Consumer Protection Act
D) Defend Trade Secrets Act
a
26) Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
A) Freedom of Information Act
B) Gramm-Leach-Bliley Act
C) COPPA
D) HIPAA
b
27) Which of the following is a core Fair Information Practices (FIP) principle?
A) Choice/Consent
B) Access/Participation
C) Security
D) Enforcement
a
28) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
a
29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?
A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
b
30) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?
A) Require firms to have consumers affirmatively opt-in before PII is collected.
B) Require firms to allow consumers to opt-out before PII is collected.
C) Make collection of PII illegal.
D) Require robust notice only before PII is collected.
a
31) "Do Not Track" falls under which of the following principles in the FTC's current privacy framework?
A) Privacy by Design
B) Simplified Choice
C) Greater Transparency
D) Scope
b
32) Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?
A) anonymous surfing
B) anonymous remailers
C) differential privacy software
D) public key encryption
c
33) Which of the following is an example of a pay-for-privacy (PFP) approach?
A) AT&T's GigaPower service
B) Meeco.me's life management tool
C) Digi.me's app
D) The Hub of All Thing's open source project
a
34) All of the following are required for information to be considered a trade secret except:
A) it must have commercial value to its owner.
B) the owner must have taken steps to protect it.
C) it must be unique.
D) it must be something that others do not know.
c
35) According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?
A) used an anonymous web browsing service
B) encrypted their communications
C) cleared web browser history and cookies
D) posted comments online anonymously
c
36) Which of the following statements about the General Data Protection Regulation (GDPR) is not true?
A) The GDPR replaces the Data Protection Directive.
B) The GDPR applies to any firm operating in any E.U. country.
C) The GDPR eliminate the right to be forgotten.
D) The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.
c
37) Which of the following is not a privacy advocacy group?
A) EPIC
B) TIO
C) CDT
D) EFF
b
38) Which of the following was the first state law in the United States requiring owners of commercial websites or online services to post a privacy policy.
A) California Consumer Privacy Act
B) California Net Neutrality Act
C) California Electronic Communications Privacy Act
D) California Online Privacy Protection Act
d
50) Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?
A) Field v. Google, Inc.
B) Alice Corporation Pty. Ltd. v. CLS Bank International
C) BMG Rights Management v. Cox Communications
D) Perfect 10, Inc. v. Amazon.com, Inc. et al.
a
51) What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?
A) the ability to make perfect copies of digital works at little cost
B) the anonymous nature of the Internet
C) the support for instant peer-to-peer communication
D) the use of standards for file formats
a
52) Which of the following protects original forms of expression in a tangible medium?
A) trade secret law
B) copyright law
C) patent law
D) trademark law
b
53) Consider the following code snippet:
public class Coin
{
private String coinName;
private int coinValue;
public Coin()
{
}
. . .
}
Which statement reflects the action performed when the constructor to Coin is called?
a) The variable coinName will be initialized to "" and the variable coinValue will be initialized to 0.
b) The variable coinName will be initialized to "null" and the variable coinValue will be initialized to 0.
c) The variable coinName will not be initialized but the variable coinValue will be initialized to 0.
d) The variable coinName will be initialized to null and the variable coinValue will be initialized to 0.
2
54) If you do not provide a constructor in a class, which of the following is correct?
a) The compiler will generate a constructor with arguments for each class instance variable and will initialize all of the class instance variables.
b) The compiler will generate a constructor with no arguments.
c) The compiler will generate a constructor with arguments for each class instance variable.
d) The class code will not compile.
3
69) Consider the following code snippet:
public class Vehicle
{
private String model;
private double rpm;
. . .
}
Which of the following methods would correctly remove the values of the class instance variables?
a)
public void reset()
{
model = null;
rpm = 0;
}
b)
public void reset()
{
model.clear();
rpm = 0;
}
c)
public void reset(String aModel, double theRpm)
{
model = aModel;
rpm = theRpm;
}
d)
public void reset("",0)
{
}
4
59) You are creating a class named Employee. Which statement correctly declares a constructor for this class?
a) public Employee()
b) public void Employee()
c) void Employee()
d) new Employee()
不知道嗎?
本學習集中的詞語(51)
51) Which of the following statements about constructors is correct?
a) A class can have only one constructor.
b) A constructor should always return a value.
c) A class must have at least one constructor supplied by the programmer.
d) A constructor must have the same name as the class.
d) A constructor must have the same name as the class.
Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of (choose the most accurate answer)
typosquatting
Who, while under oath during Congressional testimony, falsely denied that the NSA was gathering information on millions of Americans online?
James Clapper
TRUE or FALSE. The .com, .edu, .org at the end of a website address is called the generic Top Line Domain Name.
TRUE
Downloading a music track owned by a record company without paying for it is an example of a violation of:
copyright law
The Right to be Forgotten relates to a court case against Google started in which country?
spain
Which of the following best captures the four key areas of Intellectual Property protection we reviewed in class and that are outlined in EC?
Patents; Copyrights; Trademarks; Trade Secrets.
In the context of E-Commerce, what does the EU's GDPR stand for?
General Data Protection Regulation
TRUE or FALSE. In the United States, Google is NOT required to remove results from its search engine if requested to do so by a citizen or a corporation based in the US.
TRUE
How long does copyright protection extend for corporate-owned works?
95 years
Which country recently announced that they will delay implementing a 3% revenue tax on "large" international companies operating in their country?
France
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?
patent law
Registering a domain name that infringes on an existing brand or corporate identity is an example of:
cybersquatting
Which of the following is NOT one of the four basic principles shared by ethical schools of thought in western culture?
privacy
Which of the following represents PII in the context of E-Commerce
Personally Identifiable Information
TRUE or FALSE. A brand logo can be protected by a Trademark.
TRUE
TRUE or FALSE. AdChoices is a consumer protection program run by the federal government in the United States.
False
TRUE or FALSE. Patents, Trademarks and Copyrights are critically important to our economy but only benefit businesses and inventors.
false
In the context of Clickstream Analysis, which of the following best describes Backward Path Analysis?
What led up to a page or an action on a website.
Which of the following best describes the recent US Supreme Court case dealing with the nature of sales tax for E-Commerce purchases and frequently referred to as the Tax Case of the Millennium?
South Dakota vs Wayfair
TRUE or FALSE. According to IP lawyers, "Opt-In" in the EU is nearly identical in meaning and legal requirements to "Opt-Out" in the United States.
false
Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?
USA Freedom Act
Which of the following protects original forms of expression in a tangible medium?
copyright law
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?
Require firms to have consumers affirmatively opt-in before PII is collected.
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:
free availability of the work on the Web.
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
the Golden Rule
Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
The TrustArc program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information, and to make it more likely that appropriate ads are shown to users.
False
Which of the following involves bypassing the target site's home page and going directly to a content page?
deep linking
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
True
Online gambling is now legal throughout the United States.
False
Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all the following lawsuits except:
a lawsuit filed by the Authors Guild and five major publishing companies against Google
All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:
up to ten years imprisonment for a first offense.
Which of the following features of e-commerce technology can result in work and shopping invading family life?
ubiquity
Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?
Choice/Consent
Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?
differential privacy software
A social consequence of the richness of Internet information is:
very persuasive messages might reduce the need for multiple independent sources of information.
Downloading a music track owned by a record company without paying for it is an example of a violation of:
copyright law.
"Do Not Track" falls under which of the following principles in the FTC's current privacy framework?
Simplified Choice
Which of the following cases involved the issue of keywording?
Government Employees Insurance Company v. Google, Inc.
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
The Collective Utilitarian principle
All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:
the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.
Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:
typosquatting.
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
True
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?
privacy
What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?
the ability to make perfect copies of digital works at little cost
Disputes over federal trademarks involve establishing:
infringement.
Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?
South Dakota v. Wayfair
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
Risk Aversion
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:
cybersquatting
Which of the following is not a privacy advocacy group?
TIO
Owners of gTLDs have the right to create and sell new domains with the gTLD suffix.
True
All of the following are required for information to be considered a trade secret except:
it must be unique
Which case was instrumental in paving the way for Internet business methods patents?
State Street Bank & Trust Co. v. Signature Financial Group, Inc.
The expansion of generic top-level domains recently authorized by ICANN is likely to be disruptive in terms of trademark protection.
Group of answer? True or False
True
Safe harbor provisions of the DMCA were at the heart of which of the following lawsuits?
-Government Employees Insurance Company v. Google, Inc.
-a lawsuit filed by the Authors Guild and five major publishing companies against Google
-Google, Inc. v. American Blind & Wallpaper Factory, Inc.
-a lawsuit brought by Viacom against YouTube and Google
a lawsuit filed by the Authors Guild and five major publishing companies against Google
Which case was instrumental in paving the way for Internet business methods patents?
-Bilski et al. v. Kappos
-State Street Bank & Trust Co. v. Signature Financial Group, Inc.
-Alice Corporation Pty. Ltd. v. CLS Bank International
-Ticketmaster Corp. v. Tickets.com
State Street Bank & Trust Co. v. Signature Financial Group, Inc.
A social consequence of the richness of Internet information is:
-very persuasive messages might reduce the need for multiple independent sources of information.
-an increase in shallowness.
-an increase in vulnerability to hacking attacks.
-an increase in the ease of creating misleading information.
very persuasive messages might reduce the need for multiple independent sources of information.
"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?
-Simplified Choice
-Scope
-Greater Transparency
-Privacy by Design
Simplified Choice
All of the following cases involved the doctrine of fair use except:
-Kelly v. Arriba Soft.
-Perfect 10, Inc. v. Amazon.com, Inc. et al.
-Field v. Google, Inc.
-Spokeo v. Robins
Spokeo v. Robins
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
-the Social Contract Rule
-the Golden Rule
-the Collective Utilitarian principle
-Universalism
the Golden Rule
Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.
True or False
True
The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.
True or False
False
Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?
-Notice/Awareness
-Choice/Consent
-Access/Participation
-Security
Choice/Consent
All of the following are required in order for information to be considered a trade secret except:
-the owner must have taken steps to protect it.
-it must be something that others do not know.
-it must be unique.
-it must have commercial value to its owner.
it must be unique.
According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?
-posted comments online anonymously
-used an anonymous web browsing service
-encrypted their communications
-cleared web browser history and cookies
cleared web browser history and cookies
In the United States, Google is not required to remove results from its search engine if requested.
True or False
True
In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?
-State Street Bank & Trust v. Signature Financial Group, Inc.
-BMG Rights Management v. Cox Communications
-Bilski et al. v. Kappos
-Alice Corporation Pty. Ltd. v. CLS Bank International
Alice Corporation Pty. Ltd. v. CLS Bank International
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?
-Require robust notice only before PII is collected.
-Require firms to have consumers affirmatively opt-in before PII is collected.
-Require firms to allow consumers to opt-out before PII is collected.
-Make collection of PII illegal.
Require firms to have consumers affirmatively opt-in before PII is collected.
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
True or False
True
Which of the following involves bypassing the target site's home page and going directly to a content page?
-cybersquatting
-framing
-deep linking
-metatagging
deep linking
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?
-copyright law
-patent law
-trade secret law
-trademark law
patent law
The Day of Action in July 2017 was a protest to proposed changes in regulations pertaining to which of the following?
-Net neutrality
-fantasy sports
-Internet sales taxes
-the online sale of prescription drugs
Net neutrality
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
-Risk Aversion
-the Slippery Slope
-the Collective Utilitarian principle
-No Free Lunch
Risk Aversion
Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?
-the Social Contract Rule
-the Golden Rule
-the Slippery Slope
-Universalism
the Slippery Slope
The TrustArc program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information, and to make it more likely that appropriate ads are shown to users.
True or False
False
Which of the following statements about the E.U. General Data Protection Regulation (GDPR) is not true?
-The GDPR replaces the E.U.'s existing Data Protection Directive.
-The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.
-The GDPR applies to any firm operating in any E.U. country.
-The GDPR eliminate the right to be forgotten.
The GDPR eliminate the right to be forgotten.
Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?
-digital wallets
-cookies
-shopping carts
-search engines
search engines
Which of the following is not a major e-commerce public safety and welfare issue?
-regulation of pornography
-regulation of gambling
-regulation of cigarette sales
-regulation of taxation
regulation of taxation
Which of the following statements about industry self-regulation regarding privacy is not true?
-Critics argue that the most effective form of industry self-regulation to safeguard privacy are online seal programs that attest to a company's privacy policies.
-The NAI offers consumers a global opt-out feature to prevent network advertising agencies from placing cookies on a user's computer.
-The AdChoices program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.
-Industry efforts have not so far succeeded in reducing American fears of privacy invasion.
Critics argue that the most effective form of industry self-regulation to safeguard privacy are online seal programs that attest to a company's privacy policies.
Which of the following is not true about the evolution of Facebook's privacy policies over the ten-year period from 2005 to 2015?
-Facebook's privacy policies improved from 2005 to 2009.
-Facebook's privacy policies have steadily declined since 2009.
-The amount of information gathered and monitored by Facebook increased.
-Facebook's privacy policy became easier to understand.
Facebook's privacy policy became easier to understand.
Most adult social network participants do not have any expectation of personal privacy when using a social network.
True or False
False
Which of the following protects original forms of expression in a tangible medium?
-trade secret law
-copyright law
-patent law
-trademark law
copyright law
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?
-the Golden Rule
-the Social Contract Rule
-the Slippery Slope
-Risk Aversion
the Social Contract Rule
Which of the following basic ethical concepts plays an important role in defining privacy?
-due process
-accountability
-liability
-responsibility
due process
Google defended its Library Project on the grounds of fair use.
True or False
True
Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
-A journalist quotes a paragraph from a book in a review of the book.
-A professor clips a newspaper article just before class and distributes copies of it to his class.
-Google posts thumbnail images of books in the Google Book Search Project.
-A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:
-free availability of the work on the Web.
-nature of the work used.
-amount of the work used.
-market effect of the use.
free availability of the work on the Web.
All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:
-the DMCA makes it illegal to circumvent technological measures to protect works.
-the DMCA requires search engines to block access to infringing sites.
-the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.
-the DMCA allows libraries to make digital copies of works for internal use only.
the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.
Google owns which of the following, whose data it can use to create what some refer to as super profiles?
-TransUnion Corporation
-DoubleClick
-Experian
-Acxiom
DoubleClick
Which of the following cases has chipped away at DMCA safe harbor protection?
-Perfect 10, Inc. v. Amazon.com, Inc. et al.
-Alice Corporation Pty. Ltd. v. CLS Bank International
-Field v. Google, Inc.
-BMG Rights Management v. Cox Communications
Field v. Google, Inc.
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:
-framing.
-cybersquatting.
-cyberpiracy.
-metatagging.
cybersquatting
The Federal Communications Commission's privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017.
True or False
True
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?
-information density
-interactivity
-ubiquity
-global reach
global reach
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
True or False
False
Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?
-ICANN
-WIPO
-USPTO
-FTC
WIPO
Which ethical principle tells you that it is wise to assume perfect information markets?
-the New York Times test
-the Social Contract Rule
-the Collective Utilitarian principle
-the Golden Rule
the New York Times test
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
-social technology
-ubiquity
-information density
-interactivity
social technology
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
True or False
True
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
-Notice/Awareness
-Security
-Access/Participation
-Choice/Consent
Notice/Awareness
Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.
True or False
True
Which of the following is not a privacy advocacy group?
-EPIC
-TIO
-EFF
-CDT
TIO
Which of the following cases involved the issue of keywording?
-E. & J. Gallo Winery v. Spider Webs Ltd.
-Ticketmaster Corp. v. Tickets.com
-Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc.
-Government Employees Insurance Company v. Google, Inc.
Government Employees Insurance Company v. Google, Inc.
Which of the following technologies allows you to send e-mail without a trace?
-anonymous surfing
-P3P
-anonymous remailers
-public key encryption
anonymous remailers
Which of the following features of e-commerce technology can result in work and shopping invading family life?
-interactivity
-global reach
-ubiquity
-information density
ubiquity
Which of the following can be used to record all keyboard activity of a user?
-DRM
-trusted computing environments
-shopping carts
-spyware
spyware
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
True or False
True
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
-Freedom of Information Act
-COPPA
-Gramm-Leach-Bliley Act
-HIPAA
Gramm-Leach-Bliley Act
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?
-responsibility
-liability
-accountability
-privacy
privacy
Disputes over federal trademarks involve establishing:
-underlying ideas.
-infringement.
-piracy.
-intent.
infringement
All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:
-fines up to $1 million for a repeat offense.
-restitution to the injured parties for any losses due to infringement.
-fines up to $500,000 for a first offense.
-up to ten years imprisonment for a first offense.
up to ten years imprisonment for a first offense.
Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:
-cybersquatting.
-metatagging.
-linking.
-typosquatting.
typosquatting
Online gambling is now legal throughout the United States.
True or False
False
What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?
-the use of standards for file formats
-the ability to make perfect copies of digital works at little cost
-the anonymous nature of the Internet
-the support for instant peer-to-peer communication
the ability to make perfect copies of digital works at little cost
The Spokeo case involved a claim for damages based on which of the following?
-Anticybersquatting Consumer Protection Act
-Fair Credit Reporting Act
-Digital Millennium Copyright Act
-Defend Trade Secrets Act
Fair Credit Reporting Act
All of the following statements about patents are true except:
-it is more difficult to obtain a copyright than it is to obtain a patent.
-computer programs can be patented.
-in order to be patented, an invention must be nonobvious.
-the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.
it is more difficult to obtain a copyright than it is to obtain a patent.
Copyright protection protects against others copying the underlying ideas in a work.
True or False
False
Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?
-USA PATRIOT Act
-Communications Assistance for Law Enforcement Act
-Homeland Security Act
-USA Freedom Act
USA Freedom Act
Downloading a music track owned by a record company without paying for it is an example of a violation of:
-copyright law.
-privacy law.
-trademark law.
-patent law.
copyright law.
Which of the following is considered one of the most contentious e-commerce patents?
-patent on one-click purchasing
-patent on streaming video media transmission
-Google's PageRank patent
-patent on buyer-driven name your price tools
patent on one-click purchasing
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
-the Golden Rule
-the Slippery Slope
-No Free Lunch
-the Social Contract Rule
No Free Lunch
What is the first step in analyzing an ethical dilemma?
-Identify the options you can reasonably take.
-Identify and describe the facts.
-Identify the potential consequences of your opinions.
-Define the conflict or dilemma and identify the higher-order values involved.
Identify and describe the facts.
Which of the following is a core Fair Information Practices (FIP) principle?
-Security
-Enforcement
-Choice/Consent
-Access/Participation
Choice/Consent
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
-Risk Aversion
-the Golden Rule
-the Social Contract Rule
-the Collective Utilitarian principle
the Collective Utilitarian principle
Which of the following is not one of the issues complicating the taxation of e-commerce sales?
-Taxes raised are used for different government purposes.
-Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.
-Sales taxes and policies vary by state and country.
-Retailers are only legally required to charge sales tax if they have operations located in the same state as a consumer.
Taxes raised are used for different government purposes.
The display of a third-party's website or page within your own website is called:
-metatagging.
-cybersquatting.
-framing.
-deep linking.
framing
1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
A) information density
B) interactivity
C) social technology
D) ubiquity
C
2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?
A) ubiquity
B) interactivity
C) information density
D) global reach
D
3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?
A) accountability
B) privacy
C) responsibility
D) liability
B
4) What is the first step in analyzing an ethical dilemma?
A) Define the conflict or dilemma and identify the higher-order values involved.
B) Identify the potential consequences of your opinions.
C) Identify the options you can reasonably take.
D) Identify and describe the facts.
D
5) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
A) The Golden Rule
B) Risk Aversion Principle
C) Collective Utilitarian Principle
D) The Social Contract Rule
C
6) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
A) The Golden Rule
B) Universalism
C) Collective Utilitarian principle
D) The Social Contract Rule
A
7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
A) The Golden Rule
B) Slippery Slope
C) The Social Contract Rule
D) No Free Lunch
D
8) Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?
A) Universalism
B) Slippery Slope
C) The Social Contract Rule
D) The Golden Rule
B
9) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?
A) The Golden Rule
B) Risk Aversion
C) Slippery Slope
D) The Social Contract Rule
D
10) Which ethical principle tells you that it is wise to assume perfect information markets?
A) The Golden Rule
B) The New York Times Test
C) The Social Contract Rule
D) The Collective Utilitarian Principle
B
11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
A) Slippery Slope
B) Risk Aversion
C) No Free Lunch
D) The Collective Utilitarian Principle
B
12) A social consequence of the richness of Internet information is:
A) an increase in shallowness.
B) an increase in the ease of creating misleading information.
C) very persuasive messages might reduce the need for multiple independent sources of information.
D) an increase in vulnerability to hacking attacks.
C
13) Downloading a music track owned by a record company without paying for it is an example of a violation of:
A) patent law.
B) copyright law.
C) trademark law.
D) privacy law.
B
14) Which of the following features of e-commerce technology can result in work and shopping invading family life?
A) interactivity
B) ubiquity
C) information density
D) global reach
B
15) Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
TRUE
16) The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
FALSE
17) The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
TRUE
20) Which of the following basic ethical concepts plays an important role in defining privacy?
A) responsibility
B) accountability
C) liability
D) due process
D
21) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?
A) USA PATRIOT Act
B) Homeland Security Act
C) Cyber Security Enhancement Act
D) USA Freedom Act
D
22) Which of the following is used to track individuals as they move among thousands of websites?
A) first-party cookies
B) digital wallets
C) advertising networks
D) shopping carts
C
23) Which of the following uses software installed at the ISP level to track user clickstream behavior?
A) shopping carts
B) trusted computing environments
C) deep packet inspection
D) DRM
C
24) Which of the following statements about industry self-regulation regarding privacy is not true?
A) The AdChoices program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.
B) The Network Advertising Initiative offers consumers a global opt-out feature to prevent network advertising agencies from placing cookies on a user's computer.
C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion.
D) Online seal programs that attest to a company's privacy policies have had a significant impact on online privacy practices.
D
25) The Spokeo case involved a claim for damages based on which of the following?
A) Fair Credit Reporting Act
B) Digital Millennium Copyright Act
C) Anticybersquatting Consumer Protection Act
D) Defend Trade Secrets Act
A
26) Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
A) Freedom of Information Act
B) Gramm-Leach-Bliley Act
C) COPPA
D) HIPAA
B
27) Which of the following is a core Fair Information Practices (FIP) principle?
A) Choice/Consent
B) Access/Participation
C) Security
D) Enforcement
A
28) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
A
29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?
A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
B
30) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?
A) Require firms to have consumers affirmatively opt-in before PII is collected.
B) Require firms to allow consumers to opt-out before PII is collected.
C) Make collection of PII illegal.
D) Require robust notice only before PII is collected.
A
31) 'Do Not Track' falls under which of the following principles in the FTC's current privacy framework?
A) Privacy by Design
B) Simplified Choice
C) Greater Transparency
D) Scope
B
32) Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?
A) anonymous surfing
B) anonymous remailers
C) differential privacy software
D) public key encryption
C
33) Which of the following is an example of a pay-for-privacy (PFP) approach?
A) AT&T's GigaPower service
B) Meeco.me's life management tool
C) Digi.me's app
D) The Hub of All Thing's open source project
A
34) According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?
A) used an anonymous web browsing service
B) encrypted their communications
C) cleared web browser history and cookies
D) posted comments online anonymously
C
35) Which of the following statements about the General Data Protection Regulation (GDPR) is not true?
A) The GDPR replaces the Data Protection Directive.
B) The GDPR applies to any firm operating in any E.U. country.
C) The GDPR eliminate the right to be forgotten.
D) The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.
C
36) As of 2020, the largest consumer privacy penalty issued by the Federal Trade Commission had been imposed on which of the following companies?
A) Google
B) Facebook
C) Uber
D) Apple
B
37) The California Consumer Privacy Act (CCPA) does all of the following except:
A) give residents the right to be informed about the kind of personal information that is collected about them.
B) gives residents the right to opt out of the sale of their information.
C) gives residents the right to access their information in a usable format so they can transfer it to another service.
D) gives residents the right to prevent government access to their personal information.
D
38) In the United States, Google is not required to remove results from its search engine if requested.
TRUE
39) The main objective of the European Union's General Data Protection Regulation (GDPR) is to strengthen the rights of citizens to their own personal information and to strengthen oversight of firms to ensure that they implement these individual rights.
TRUE
40) The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
TRUE
41) The Federal Communications Commission's privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017.
TRUE
42) The Illinois Biometric Information Privacy Act requires firms to have user consent to collect facial information.
TRUE
47) All of the following are required for information to be considered a trade secret except:
A) it must have commercial value to its owner.
B) the owner must have taken steps to protect it.
C) it must be unique.
D) it must be something that others do not know.
C
48) Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?
A) Field v. Google, Inc.
B) Alice Corporation Pty. Ltd. v. CLS Bank International
C) BMG Rights Management v. Cox Communications
D) Perfect 10, Inc. v. Amazon.com, Inc. et al.
C
49) What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?
A) the ability to make perfect copies of digital works at little cost
B) the anonymous nature of the Internet
C) the support for instant peer-to-peer communication
D) the use of standards for file formats
A
50) Which of the following protects original forms of expression in a tangible medium?
A) trade secret law
B) copyright law
C) patent law
D) trademark law
B
51) How long does copyright protection extend for corporate-owned works?
A) 25 years
B) 50 years
C) 75 years
D) 95 years
D
52) Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
A) A professor clips a newspaper article just before class and distributes copies of it to his class.
B) A journalist quotes a paragraph from a book in a review of the book.
C) A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
D) Google posts thumbnail images of books in the Google Book Search Project.
C
53) All of the following are factors that will be considered in determining whether use of copyrighted material is 'fair use' except the:
A) nature of the work used.
B) amount of the work used.
C) market effect of the use.
D) free availability of the work on the Web.
D
54) All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:
A) up to ten years imprisonment for a first offense.
B) fines up to $500,000 for a first offense.
C) fines up to $1 million for a repeat offense.
D) restitution to the injured parties for any losses due to infringement.
A
55) All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:
A) the DMCA makes it illegal to circumvent technological measures to protect works.
B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.
C) the DMCA requires search engines to block access to infringing sites.
D) the DMCA allows libraries to make digital copies of works for internal use only.
B
56) Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?
A) copyright law
B) trade secret law
C) patent law
D) trademark law
C
57) All of the following statements about patents are true except:
A) it is more difficult to obtain a copyright than it is to obtain a patent.
B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.
C) computer programs can be patented.
D) in order to be patented, an invention must be nonobvious.
A
58) Which case was instrumental in paving the way for Internet business methods patents?
A) Bilski et al. v. Kappos
B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) Ticketmaster Corp. v. Tickets.com
B
59) Which of the following is considered one of the most contentious e-commerce patents?
A) Acacia Technologies' patent on streaming video media transmission
B) Priceline's patent on buyer-driven name your price tools
C) Amazon's patent on one-click purchasing
D) Google's PageRank patent
C
60) Disputes over federal trademarks involve establishing:
A) underlying ideas.
B) intent.
C) piracy.
D) infringement.
D
61) Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:
A) cybersquatting.
B) cyberpiracy.
C) framing.
D) metatagging.
A
62) Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?
A) ICANN
B) FTC
C) WIPO
D) USPTO
C
64) Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:
A) keywording.
B) typosquatting.
C) metatagging.
D) deep linking.
B
65) In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?
A) State Street Bank & Trust v. Signature Financial Group, Inc.
B) Bilski et al. v. Kappos
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) BMG Rights Management v. Cox Communications
C
66) The display of a third-party's website or page within your own website is called:
A) cybersquatting.
B) metatagging.
C) framing.
D) deep linking.
C
67) Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all the following lawsuits except:
A) a lawsuit filed by the Authors Guild and five major publishing companies against Google
B) a lawsuit brought by Viacom against YouTube and Google
C) BMG Rights Management v. Cox Communications.
D) Mavrix Photographs, LLC v. LiveJournal, Inc.
A
68) Which of the following cases involved the issue of keywording?
A) Ticketmaster Corp. v. Tickets.com
B) Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc.
C) Government Employees Insurance Company v. Google, Inc.
D) E. & J. Gallo Winery v. Spider Webs Ltd.
C
69) Which of the following involves bypassing the target site's home page and going directly to a content page?
A) cybersquatting
B) metatagging
C) framing
D) deep linking
D
70) All of the following cases involved the doctrine of fair use except:
A) Spokeo v. Robins
B) Perfect 10, Inc. v. Amazon.com, Inc. et al.
C) Field v. Google, Inc.
D) Kelly v. Arriba Soft.
A
71) Copyright protection protects against others copying the underlying ideas in a work.
FALSE
72) Owners of gTLDs have the right to create and sell new domains with the gTLD suffix.
TRUE
73) Google defended its Library Project on the grounds of fair use.
TRUE
76) Which of the following involves the issue of social control?
A) information rights
B) governance
C) public safety and welfare
D) property rights
B
77) Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?
A) South Dakota v. Wayfair
B) Bilski et al. v. Kappos
C) Quill v. North Dakota
D) Alice Corporation v. CLS Bank International
A
78) Which of the following statements is not true?
A) Currently, the United States is in a mixed-mode policy environment with respect to the Internet where self-regulation co-exists with limited government regulation.
B) The Internet is technically very difficult to control, monitor, and regulate from a central location.
C) Early Internet advocates argued that the Internet was different from all previous technologies.
D) Controlling e-commerce also involves regulating the Internet.
B
79) Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.
TRUE
81) Which of the following is not an e-commerce public safety and welfare issue?
A) regulation of gambling
B) regulation of cigarette sales
C) regulation of pornography
D) regulation of taxation
D
82) The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.
FALSE
83) Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.
TRUE
84) Online gambling is now legal throughout the United States.
FALSE
1.23) Which of the following uses software installed at the ISP level to track user clickstream behavior?
單選題 (2 分) 2分
A
.
A) shopping carts
B
.
B) trusted computing environments
C
.
C) deep packet inspection
D
.
D) DRM
正確答案: C
答案解釋:
2.64) Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:
單選題 (2 分) 2分
A
.
A) keywording.
B
.
B) typosquatting.
C
.
C) metatagging.
D
.
D) deep linking.
正確答案: B
答案解釋:
3.9) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?
單選題 (2 分) 2分
A
.
A) The Golden Rule
B
.
B) Risk Aversion
C
.
C) Slippery Slope
D
.
D) The Social Contract Rule
正確答案: D
答案解釋:
4.37) The California Consumer Privacy Act (CCPA) does all of the following except:
單選題 (2 分) 2分
A
.
A) give residents the right to be informed about the kind of personal information that is collected about them.
B
.
B) gives residents the right to opt out of the sale of their information.
C
.
C) gives residents the right to access their information in a usable format so they can transfer it to another service.
D
.
D) gives residents the right to prevent government access to their personal information.
正確答案: D
答案解釋:
5.63) Registering a domain name similar or identical to a trademark of a legitimate site to divert web traffic to the infringing site is an example of:
單選題 (2 分) 2分
A
.
A) keywording.
B
.
B) cyberpiracy.
C
.
C) framing.
D
.
D) metatagging.
正確答案: B
答案解釋:
6.67) Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all the following lawsuits except:
單選題 (2 分) 2分
A
.
A) a lawsuit filed by the Authors Guild and five major publishing companies against Google
B
.
B) a lawsuit brought by Viacom against YouTube and Google
C
.
C) BMG Rights Management v. Cox Communications.
D
.
D) Mavrix Photographs, LLC v. LiveJournal, Inc.
正確答案: A
答案解釋:
7.61) Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: 回答錯誤
單選題 (2 分) 0分
A
.
A) cybersquatting.
B
.
B) cyberpiracy.
C
.
C) framing.
D
.
D) metatagging.
正確答案: A
8.11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
單選題 (2 分) 2分
A
.
A) Slippery Slope
B
.
B) Risk Aversion
C
.
C) No Free Lunch
D
.
D) The Collective Utilitarian Principle
正確答案: B
答案解釋:
9.36) As of 2020, the largest consumer privacy penalty issued by the Federal Trade Commission had been imposed on which of the following companies?
單選題 (2 分) 2分
A
.
A) Google
B
.
B) Facebook
C
.
C) Uber
D
.
D) Apple
正確答案: B
答案解釋:
10.78) Which of the following statements is not true? 回答錯誤
單選題 (2 分) 0分
A
.
A) Currently, the United States is in a mixed-mode policy environment with respect to the Internet where self-regulation co-exists with limited government regulation.
B
.
B) The Internet is technically very difficult to control, monitor, and regulate from a central location.
C
.
C) Early Internet advocates argued that the Internet was different from all previous technologies.
D
.
D) Controlling e-commerce also involves regulating the Internet.
正確答案: B
11.7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
單選題 (2 分) 2分
A
.
A) The Golden Rule
B
.
B) Slippery Slope
C
.
C) The Social Contract Rule
D
.
D) No Free Lunch
正確答案: D
答案解釋:
12.69) Which of the following involves bypassing the target site's home page and going directly to a content page?
單選題 (2 分) 2分
A
.
A) cybersquatting
B
.
B) metatagging
C
.
C) framing
D
.
D) deep linking
正確答案: D
答案解釋:
13.56) Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?
單選題 (2 分) 2分
A
.
A) copyright law
B
.
B) trade secret law
C
.
C) patent law
D
.
D) trademark law
正確答案: C
答案解釋:
14.65) In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?
單選題 (2 分) 2分
A
.
A) State Street Bank & Trust v. Signature Financial Group, Inc.
B
.
B) Bilski et al. v. Kappos
C
.
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D
.
D) BMG Rights Management v. Cox Communications
正確答案: C
答案解釋:
15.28) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
單選題 (2 分) 2分
A
.
A) Notice/Awareness
B
.
B) Choice/Consent
C
.
C) Access/Participation
D
.
D) Security
正確答案: A
答案解釋:
16.31) "Do Not Track" falls under which of the following principles in the FTC's current privacy framework?
單選題 (2 分) 2分
A
.
A) Privacy by Design
B
.
B) Simplified Choice
C
.
C) Greater Transparency
D
.
D) Scope
正確答案: B
答案解釋:
17.5. WiMAX 為下列何者的應用範疇之一?(單選)
單選題 (2 分) 2分
A
.
(A) 3GS
B
.
(B) 2G
C
.
(C) 4G
D
.
(D) 3G
正確答案: C
答案解釋:
18.29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?
單選題 (2 分) 2分
A
.
A) Notice/Awareness
B
.
B) Choice/Consent
C
.
C) Access/Participation
D
.
D) Security
正確答案: B
答案解釋:
19.1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
單選題 (2 分) 2分
A
.
A) information density
B
.
B) interactivity
C
.
C) social technology
D
.
D) ubiquity
正確答案: C
答案解釋:
20.2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?
單選題 (2 分) 2分
A
.
A) ubiquity
B
.
B) interactivity
C
.
C) information density
D
.
D) global reach
正確答案: D
答案解釋:
21.70) All of the following cases involved the doctrine of fair use except:
單選題 (2 分) 2分
A
.
A) Spokeo v. Robins
B
.
B) Perfect 10, Inc. v. Amazon.com, Inc. et al.
C
.
C) Field v. Google, Inc.
D
.
D) Kelly v. Arriba Soft.
正確答案: A
答案解釋:
22.6) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
單選題 (2 分) 2分
A
.
A) The Golden Rule
B
.
B) Universalism
C
.
C) Collective Utilitarian principle
D
.
D) The Social Contract Rule
正確答案: A
答案解釋:
23.51) How long does copyright protection extend for corporate-owned works?
單選題 (2 分) 2分
A
.
A) 25 years
B
.
B) 50 years
C
.
C) 75 years
D
.
D) 95 years
正確答案: D
答案解釋:
24.30) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?
單選題 (2 分) 2分
A
.
A) Require firms to have consumers affirmatively opt-in before PII is collected.
B
.
B) Require firms to allow consumers to opt-out before PII is collected.
C
.
C) Make collection of PII illegal.
D
.
D) Require robust notice only before PII is collected.
正確答案: A
答案解釋:
25.32) Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data?
單選題 (2 分) 2分
A
.
A) anonymous surfing
B
.
B) anonymous remailers
C
.
C) differential privacy software
D
.
D) public key encryption
正確答案: C
答案解釋:
26.62) Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?
單選題 (2 分) 2分
A
.
A) ICANN
B
.
B) FTC
C
.
C) WIPO
D
.
D) USPTO
正確答案: C
答案解釋:
27.3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?
單選題 (2 分) 2分
A
.
A) accountability
B
.
B) privacy
C
.
C) responsibility
D
.
D) liability
正確答案: B
答案解釋:
28.54) All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:
單選題 (2 分) 2分
A
.
A) up to ten years imprisonment for a first offense.
B
.
B) fines up to $500,000 for a first offense.
C
.
C) fines up to $1 million for a repeat offense.
D
.
D) restitution to the injured parties for any losses due to infringement.
正確答案: A
答案解釋:
29.77) Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?
單選題 (2 分) 2分
A
.
A) South Dakota v. Wayfair
B
.
B) Bilski et al. v. Kappos
C
.
C) Quill v. North Dakota
D
.
D) Alice Corporation v. CLS Bank International
正確答案: A
答案解釋:
30.76) Which of the following involves the issue of social control?
單選題 (2 分) 2分
A
.
A) information rights
B
.
B) governance
C
.
C) public safety and welfare
D
.
D) property rights
正確答案: B
答案解釋:
31.52) Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
單選題 (2 分) 2分
A
.
A) A professor clips a newspaper article just before class and distributes copies of it to his class.
B
.
B) A journalist quotes a paragraph from a book in a review of the book.
C
.
C) A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
D
.
D) Google posts thumbnail images of books in the Google Book Search Project.
正確答案: C
答案解釋:
32.55) All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:
單選題 (2 分) 2分
A
.
A) the DMCA makes it illegal to circumvent technological measures to protect works.
B
.
B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.
C
.
C) the DMCA requires search engines to block access to infringing sites.
D
.
D) the DMCA allows libraries to make digital copies of works for internal use only.
正確答案: B
答案解釋:
33.48) Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?
單選題 (2 分) 2分
A
.
A) Field v. Google, Inc.
B
.
B) Alice Corporation Pty. Ltd. v. CLS Bank International
C
.
C) BMG Rights Management v. Cox Communications
D
.
D) Perfect 10, Inc. v. Amazon.com, Inc. et al.
正確答案: C
答案解釋:
34.3. 行動商務的效益包含下列何者?(單選)
單選題 (2 分) 2分
A
.
(A) 傳輸無線化
B
.
(B) 連線快速化
C
.
(C) 追蹤便捷化
D
.
(D) 以上皆是
正確答案: D
答案解釋:
35.47) All of the following are required for information to be considered a trade secret except:
單選題 (2 分) 2分
A
.
A) it must have commercial value to its owner.
B
.
B) the owner must have taken steps to protect it.
C
.
C) it must be unique.
D
.
D) it must be something that others do not know.
正確答案: C
答案解釋:
36.16) The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
37.39) The main objective of the European Union’s General Data Protection Regulation (GDPR) is to strengthen the rights of citizens to their own personal information and to strengthen oversight of firms to ensure that they implement these individual rights.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
38.84) Online gambling is now legal throughout the United States.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
39.73) Google defended its Library Project on the grounds of fair use.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
40.71) Copyright protection protects against others copying the underlying ideas in a work.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
41.82) The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
42.41) The Federal Communications Commission's privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
43.42) The Illinois Biometric Information Privacy Act requires firms to have user consent to collect facial information.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
44.38) In the United States, Google is not required to remove results from its search engine if requested.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
45.15) Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
46.79) Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
47.17) The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
48.72) Owners of gTLDs have the right to create and sell new domains with the gTLD suffix.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
49.83) Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
50.40) The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
All of the following are advantages of online retail except:
faster delivery of goods.
All of the following are challenges faced by bricks-and-clicks firms except:
building a brand name.
All of the following are challenges for catalog merchants except:
building sophisticated order entry and fulfillment systems.
All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:
high-cost structures.
All of the following are strategic factors that pertain specifically to a firm and its related businesses except:
power of customers.
All of the following are terms used to describe on-demand service companies except:
omni-channel commerce.
All of the following have introduced social commerce functionality, such as buy buttons, shoppable ads, and marketplaces, except:
Tumblr.
All of the following services require extensive personalization except:
financial services.
All of the following statements about Amazon are true except:
Amazon purchased Jet.com, one of its discount competitors, to give it a more robust network for delivering goods.
All of the following statements about the MOTO sector are true except:
the MOTO sector is also referred to as the specialty store sector.
All of the following statements about the online insurance industry are true except:
the Internet has lowered search costs, increased price comparison, and decreased prices to consumers for forms of insurance.
All of the following statements about the online real estate services market are true except:
the Internet and e-commerce have created a revolution in the real estate value chain.
All of the following were parts of the vision during the early days of e-commerce except the belief that:
new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.
Apart from Amazon, the top online retail firms in terms of online sales are all primarily ________ firms.
omni-channel.
Approximately ________% of the United States labor force is involved in providing services.
80
(T/F) Big data plays an important role in predictive marketing.
True
Booking Holdings owns all of the following except:
Expedia.
(T/F) Consumers are primarily price-driven when shopping on the Internet.
False
(T/F) Contrary to predictions of analysts made during the early days of e-commerce, the Internet has led to both disintermediation and hypermediation on a widespread basis.
False
Craigslist is most involved in which of the following online services market(s)?
real estate services and career services.
Current liabilities are debts of the firm that will be due within:
one year.
For a quick check of a firm's short-term financial health, examine its:
working capital.
Gross margin is defined as gross profit:
divided by net sales revenues.
(T/F) In 2020, almost 75% of the adult U.S. population was expected to use online banking.
True
In 2020, it was estimated that about what percentage of Internet users over the age of 14 would make a purchase at an online retail store?
80%
(T/F) In 2020, the number of online buyers in the United States was around 205 million.
True
In ________, all of a customer's financial (and even nonfinancial) data are pulled together into a single, personalized website.
account aggregation
In the United States, the service sector accounts for approximately ________% of the United States GDP.
80
Omni-channel merchants are also referred to as:
bricks-and-clicks companies.
(T/F) On-demand service companies collect a fee from both sellers and buyers who use the platform.
True
(T/F) Online retail constitutes about 20% of the total retail market today.
False
(T/F) Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.
True
Operating margin is defined as:
operating income or loss divided by net sales revenues.
(T/F) Personal consumption of retail goods and services accounts for over 80% of total gross domestic product (GDP).
False
(T/F) Service industries (i.e., finance & travel) typically are very knowledge- and information-intense.
True
(T/F) The Covid-19 pandemic has severely impacted the online travel industry.
True
The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line?
term life insurance.
(T/F) The existence of substitute products is a key industry strategic factor.
True
The lower the ________ compared to revenue, the higher the gross profit.
cost of sales.
(T/F) The online mortgage industry has transformed the process of obtaining a mortgage.
False
The online retail sector of the retail industry is most similar to the ________ sector.
mail order/telephone order (MOTO).
(T/F) The social network LinkedIn has become major player in the online recruitment market.
True
(T/F) The term fintech applies only to tech companies that are seeking use technology to unbundle traditional institutional financial services industries and instead deliver targeted solutions.
False
The term supply-push refers to:
making products prior to orders being received based on estimated demand.
Virtual merchants face potentially large costs for all of the following except:
building and maintaining physical stores.
What is another name for pro forma earnings?
earnings before income taxes, depreciation, and amortization (EBITDA).
What is the largest sector of the online travel services market in terms of revenue?
airline reservations.
Which of the following best explains why the service sector is a natural avenue for e-commerce?
Much of the value in services is based on the collection, storage, and exchange of information.
Which of the following enabled MOTO firms to make an easier transition to e-commerce?
The fact that they already had efficient customer order fulfillment processes.
Which of the following has the highest share of online retail sales?
virtual merchants.
Which of the following has the second-highest share of online retail sales?
omni-channel merchants.
Which of the following is a subscription-based retailer using predictive marketing and big data?
Stitch Fix
Which of the following is an on-demand service company focused on lodging?
Airbnb
Which of the following is not a digitally native vertical brand (D2C)?
Wayfair
Which of the following is not a key industry strategic factor?
synergies
Which of the following is not a major trend in online retail for 2020-2021?
The COVID-19 pandemic is expected to create a decrease in e-commerce retail purchases.
Which of the following is not a major trend in the online recruitment services industry?
disintermediation.
Which of the following is not an example of a transaction broker?
an accountant.
Which of the following is not an example of a virtual merchant?
Dell
Which of the following is not categorized as an operating expense?
the cost of products being sold.
Which of the following is not considered a current asset?
long-term investments.
Which of the following is not one of the central challenges facing the online retail industry?
lack of physical store presence.
Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration?
online supply-push.
Which of the following is not one of the seven major segments of the retail industry?
electronics and computers
Which of the following is not true about on-demand service firms?
On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.
Which of the following measures the percentage of sales revenue a firm can retain after all expenses are deducted from gross revenues?
net margin.
Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?
channel conflict.
Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date?
balance sheet.
Which of the following statements about online banking is not true?
More people use a tablet for mobile banking than a mobile phone.
Which of the following statements is not true about the automobile, and automobile parts and accessories, online retail category?
Most of the revenue in this category is generated from the sales of automobiles.
Which of the following statements is not true?
The online travel services sector is one of the few in which extensive disintermediation has occurred.
Within the major service industry groups, companies can be categorized generally into those that provide transaction brokering and those that involve which of the following?
providing hands-on services.
________ provides notices called Consumer Alerts to inform readers when a review is likely to be fraudulent.
Yelp
1) Which of the following is not a major trend in online retail for 2016-2017?
A) Online retail remains the fastest growing retail channel.
B) The average annual purchase of online buyers continues to increase.
C) Online retailers place an increased emphasis on providing an improved "shopping experience."
D) The number of online buyers begins to plateau.
D
2) The MOTO sector of the retail industry is most like the ________ sector.
A) specialty stores
B) general merchandise
C) online retail sales
D) consumer durables
C
3) Which of the following is not one of the seven major segments of the retail industry?
A) electronics and computers
B) specialty stores
C) gasoline and fuel
D) food and beverage
A
4) All of the following statements about the MOTO sector are true except:
A) compared to general merchandisers, the transition to e-commerce has been easier for MOTO firms.
B) the MOTO sector is also referred to as the specialty store sector.
C) MOTO was the last technological revolution that preceded e-commerce.
D) distribution of catalogs is one of MOTO retailers' biggest expenses.
B
5) All of the following were factors that precipitated the growth of MOTO except:
A) the national toll-free call system.
B) the growth of the cellular phone industry.
C) falling long distance telecommunications prices.
D) the growth of the credit card industry.
B
6) All of the following were parts of the vision during the early days of e-commerce except the belief that:
A) new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.
B) online consumers were rational and cost-driven.
C) entry costs to the online retail market would be much less than those needed to establish a physical storefront.
D) the cost of acquiring customers would be much lower.
A
7) All of the following have launched trials of Buy buttons except:
A) Facebook.
B) Pinterest.
C) Instagram.
D) Tumblr.
D
8) In 2016, approximately what percentage of Internet users over the age of 14 made a purchase at an online retail store?
A) 37%
B) 57%
C) 77%
D) 97%
C
9) Which of the following categories generates the highest percentage of online retail revenue?
A) computers and electronics
B) apparel and accessories
C) books/music/video
D) automobile and automobile parts and accessories
B
10) All of the following are advantages of online retail except:
A) lower supply chain costs.
B) lower cost of distribution.
C) ability to change prices.
D) faster delivery of goods.
D
11) Which of the following is not one of the central challenges facing the online retail industry?
A) lack of physical store presence
B) consumer concerns about the privacy of personal information
C) inconvenience in returning goods
D) delivery delays
A
12) Which of the following is not one of the methods used by traditional retailers to develop omni-channel integration?
A) online catalog
B) online order, in-store pickup
C) online supply-push
D) online promotions for offline purchases
C
13) Which of the following statements is not true about the automobile and automobile parts and accessories online retail category?
A) Most of the revenue in this category is generated from the sales of automobiles.
B) Automobile manufacturers use the Internet to deliver branding advertising.
C) U.S. franchising law prohibits automobile manufacturers from selling cars directly to consumers.
D) Automobile retailing is dominated by dealership networks.
A
14) Approximately ________ retailers generate 90% of all retail e-commerce sales.
A) 10
B) 100
C) 1,000
D) 10,000
C
15) Which of the following had the highest online sales revenue in 2015?
A) Macy's
B) Walmart
C) Sears
D) Target
B
28) Which of the following is not a key industry strategic factor?
A) synergies
B) barriers to entry
C) industry value chain
D) existence of substitute products
A
29) All of the following are strategic factors that pertain specifically to a firm and its related businesses except:
A) core competencies.
B) synergies.
C) technology.
D) power of customers.
D
30) The lower the ________ compared to revenue, the higher the gross profit.
A) assets
B) cost of sales
C) gross margin
D) operating expenses
B
31) Gross margin is defined as gross profit:
A) minus total operating expenses.
B) divided by net sales revenues.
C) divided by cost of sales.
D) minus net income.
B
32) Which of the following is not categorized as an operating expense?
A) the cost of products being sold
B) marketing costs
C) administrative overhead
D) amortization of goodwill
A
33) Operating margin is defined as:
A) operating income or loss divided by net sales revenues.
B) operating income or loss divided by total operating expenses.
C) net sales revenues divided by net income or loss.
D) net assets divided by net liabilities.
A
34) What is another name for pro forma earnings?
A) net margin
B) operating income
C) earnings before income taxes, depreciation, and amortization (EBITDA)
D) generally accepted accounting principles (GAAP) earnings
C
35) Which of the following would not be considered a current asset?
A) long-term investments
B) cash
C) accounts receivable
D) marketable securities
A
36) Current liabilities are debts of the firm that will be due within:
A) three months.
B) six months.
C) one year.
D) two years.
C
37) For a quick check of a firm's short-term financial health, examine its:
A) working capital.
B) gross margin.
C) long-term debt.
D) cost of sales.
A
38) ________ measures the percentage of sales revenue a firm retains after all expenses are deducted from gross revenues.
A) Gross profit
B) Net margin
C) Operating margin
D) Working capital
B
39) Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date?
A) working capital
B) operating margin
C) balance sheet
D) gross margin
C
42) Which of the following is not an example of a virtual merchant?
A) Overstock
B) Wayfair
C) Rue La La
D) Dell
D
43) Omni-channel merchants are also referred to as:
A) virtual merchants.
B) bricks-and-clicks companies.
C) catalog merchants.
D) manufacturer-direct firms.
B
44) Which of the following is a subscription-based retailer using predictive marketing and Big Data?
A) Macy's
B) Birchbox
C) Dell
D) Lands' End
B
45) Virtual merchants face potentially large costs for all of the following except:
A) building and maintaining a website.
B) building and maintaining physical stores.
C) building an order fulfillment infrastructure.
D) developing a brand name.
B
46) All of the following statements about Amazon are true except:
A) Amazon failed to show a profit in 2015.
B) Amazon Web Services is now a major part of Amazon's business.
C) eBay can be considered a competitor of Amazon.
D) Amazon continues to generate revenue primarily by selling products.
A
47) All of the following are challenges faced by bricks-and-clicks firms except:
A) coordinating prices across channels.
B) handling returns of online purchases at retail outlets.
C) building a credible website.
D) building a brand name.
D
48) All of the following are challenges for catalog merchants except:
A) high costs of printing and mailing.
B) building a credible website.
C) the need to bring staff in or manage new technology.
D) building sophisticated order entry and fulfillment systems.
D
49) The term supply-push refers to:
A) making products prior to orders being received based on estimated demand.
B) waiting for orders to be received before building a product.
C) channel conflict.
D) multi-channel manufacturers who sell directly online to consumers.
A
50) All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:
A) moving to a demand-pull model.
B) high cost structures.
C) developing a fast-response online order and fulfillment system.
D) channel conflict.
B
51) Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?
A) disintermediation
B) localization
C) channel conflict
D) hypermediation
C
52) Which of the following has the highest share of online retail sales?
A) omni-channel merchants
B) virtual merchants
C) catalog merchants
D) manufacturer-direct
B
53) Which of the following has the second-highest share of online retail sales?
A) omni-channel merchants
B) virtual merchants
C) catalog merchants
D) manufacturer-direct
A
57) In the United States, the service sector accounts for approximately ________% of the United States GDP.
A) 70
B) 75
C) 80
D) 85
C
58) Service industry groups are categorized generally into two groups, those that provide transaction brokering and those that involve:
A) retailing goods.
B) personalization.
C) information brokering.
D) hands-on services.
D
59) Approximately ________% of the United States labor force is involved in providing services.
A) 50
B) 60
C) 70
D) 80
D
60) Which of the following is not an example of a transaction broker?
A) a stockbroker
B) a real estate agent
C) an accountant
D) an employment agency
C
61) All of the following services require extensive personalization except:
A) financial services.
B) legal services.
C) medical services.
D) accounting services.
A
62) Which of the following best explains why the service sector is a natural avenue for e-commerce?
A) The service sector is less geographically reliant and more globally oriented.
B) The service sector has historically been more technology-reliant.
C) Much of the value in services is based on the collection, storage, and exchange of information.
D) It is not; services are difficult to translate to e-commerce because they rely on face-to-face communication and barter.
C
63) Which of the following statements about online banking is not true?
A) Top mobile banking activities include checking balances and bank statements and viewing recent transactions.
B) Online and mobile banking transactions provide significant costs savings for banks.
C) Millennials are adopting mobile banking at a much higher rate than those who are older.
D) More people use a tablet for mobile banking than a mobile phone.
D
64) In ________, all of a customer's financial (and even nonfinancial) data are pulled together at a single personalized website.
A) account aggregation
B) a financial portal
C) integrated financial services
D) EBPP systems
A
65) The Internet has resulted in lower search costs, increased price comparison, and lower prices to consumers for which insurance product line?
A) term life insurance
B) automobile insurance
C) health insurance
D) property and casualty insurance
A
66) All of the following statements about the online insurance industry are true except:
A) the Internet has dramatically changed the insurance industry's value chain.
B) websites of almost all the major firms provide the ability to obtain an online quote.
C) Internet usage has led to a decline in term life insurance prices industry-wide.
D) the industry has been very successful in attracting visitors searching for information
A
67) All of the following statements about the online real estate services market are true except:
A) most people use the Internet to search for a home, but still use the services of a real estate agent to complete the purchase.
B) real estate differs from other types of online financial services because it is impossible to complete a property transaction online.
C) the primary service offered by real estate sites is a listing of houses available.
D) the Internet and e-commerce have created significant disintermediation in the real estate marketplace.
D
68) Craigslist is a player in which of the following online services markets?
A) real estate services and career services
B) insurance services and brokerage services
C) travel services
D) online accounting services
A
73) Which of the following has introduced a tool known as Consumer Alerts to inform readers when a review is likely to be fraudulent?
A) Yelp
B) TripAdvisor
C) Angie's List
D) TripExpert
A
74) What is the largest sector of the online travel services market in terms of revenue?
A) hotel reservations
B) car reservations
C) cruise/tour reservations
D) airline reservations
D
75) Which of the following statements is not true?
A) Price competition among online travel services is difficult as comparison shopping for better prices is easy.
B) Online travel services are one of the few sectors in which extensive disintermediation has occurred.
C) The ability of travel products and services to be commoditized is a significant factor in the explosive growth of the online travel services industry.
D) The online travel services industry has gone through a period of consolidation
B
76) Expedia owns all of the following except:
A) Travelocity.
B) Orbitz.
C) TripAdvisor.
D) CheapTickets.
C
78) Which of these job recruitment sites is not a job listing aggregator?
A) Indeed
B) SimplyHired
C) Glassdoor
D) CareerBuilder
B
79) Which of the following is not a major trend in the online recruitment services industry?
A) disintermediation
B) Millennials and GenX primarily use mobile devices to search for jobs.
C) social recruiting
D) hiring by algorithm
A
82) Which of the following is not true about on-demand service firms?
A) The growth of on-demand service firms is supported by the use of online reputation systems based on peer review.
B) It is not likely that on-demand service firms will totally escape government regulation.
C) On-demand service firms facilitate access to resources.
D) On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce
D
83) ________ is an on-demand service company focused on lodging.
A) Uber
B) Lyft
C) Airbnb
D) Task Rabbit
C
84) All of the following are terms used to describe on-demand service companies except:
A) mesh economy.
B) collaborative commerce.
C) we-commerce.
D) omni-channel commerce.
D
1.8) In 2020, it was estimated that about what percentage of Internet users over the age of 14 would make a purchase at an online retail store?
單選題 (2 分) 2分
A
.
A) 40%
B
.
B) 60%
C
.
C) 70%
D
.
D) 80%
正確答案: D
答案解釋:
2.61) Which of the following statements about online banking is not true?
單選題 (2 分) 2分
A
.
A) Top mobile banking activities include checking balances and bank statements.
B
.
B) Online and mobile banking transactions provide significant costs savings for banks.
C
.
C) Millennials are adopting mobile banking at a much higher rate than those who are older.
D
.
D) More people use a tablet for mobile banking than a mobile phone.
正確答案: D
答案解釋:
3.4. 網路搭售是屬於網路行銷組合 4P 決策中的哪一 P?(單選) 回答錯誤
單選題 (2 分) 0分
A
.
(A) 產品
B
.
(B) 價格
C
.
(C) 通路
D
.
(D) 促銷
正確答案: B
4.45) The term supply-push refers to:
單選題 (2 分) 2分
A
.
A) making products prior to orders being received based on estimated demand.
B
.
B) waiting for orders to be received before building a product.
C
.
C) channel conflict.
D
.
D) multi-channel manufacturers who sell directly online to consumers.
正確答案: A
答案解釋:
5.27) Gross margin is defined as gross profit:
單選題 (2 分) 2分
A
.
A) minus total operating expenses.
B
.
B) divided by net sales revenues.
C
.
C) divided by cost of sales.
D
.
D) minus net income.
正確答案: B
答案解釋:
6.48) Which of the following has the highest share of online retail sales?
單選題 (2 分) 2分
A
.
A) omni-channel merchants
B
.
B) virtual merchants
C
.
C) catalog merchants
D
.
D) manufacturer-direct
正確答案: B
答案解釋:
7.34) Which of the following measures the percentage of sales revenue a firm can retain after all expenses are deducted from gross revenues?
單選題 (2 分) 2分
A
.
A) gross profit
B
.
B) net margin
C
.
C) operating margin
D
.
D) working capital
正確答案: B
答案解釋:
8.73) Which of the following statements is not true?
單選題 (2 分) 2分
A
.
A) Price competition among online travel services is difficult as comparison shopping for better prices is easy.
B
.
B) The online travel services sector is one of the few in which extensive disintermediation has occurred.
C
.
C) The ability of travel products and services to be commoditized is a significant factor in the explosive growth of the online travel services industry.
D
.
D) The online travel services industry has gone through a period of consolidation.
正確答案: B
答案解釋:
9.10. 下列敘述何者有誤?(單選)
單選題 (2 分) 2分
A
.
(A) 促銷基本上是一種長期的活動
B
.
(B) 無法歸屬於人員推銷、廣告、公開報導的推廣活動都屬於促銷範圍
C
.
(C) 促銷目的在於刺激促銷對象立即購買
D
.
(D) 促銷是針對特定對象的活動,主要可分為消費者、零售商和經銷商
正確答案: A
答案解釋:
10.47) Which of the following occurs when retailers of products must compete on price and currency of inventory directly against the manufacturer?
單選題 (2 分) 2分
A
.
A) disintermediation
B
.
B) localization
C
.
C) channel conflict
D
.
D) hypermediation
正確答案: C
答案解釋:
11.14) Apart from Amazon, the top online retail firms in terms of online sales are all primarily ______ firms.
單選題 (2 分) 2分
A
.
A) manufacturer-direct
B
.
B) omni-channel
C
.
C) web-only
D
.
D) catalog merchant
正確答案: B
答案解釋:
12.58) Which of the following best explains why the service sector is a natural avenue for e-commerce?
單選題 (2 分) 2分
A
.
A) The service sector is less geographically reliant and more globally oriented.
B
.
B) The service sector requires “rich” marketing messages to reach new customers.
C
.
C) Much of the value in services is based on the collection, storage, and exchange of information.
D
.
D) It is not; services are difficult to translate to e-commerce because they all rely on face-to-face communication and barter.
正確答案: C
答案解釋:
13.40) Which of the following is a subscription-based retailer using predictive marketing and big data?
單選題 (2 分) 2分
A
.
A) Macy's
B
.
B) Stitch Fix
C
.
C) Dell
D
.
D) Lands' End
正確答案: B
答案解釋:
14.56) Which of the following is not an example of a transaction broker?
單選題 (2 分) 2分
A
.
A) a stockbroker
B
.
B) a real estate agent
C
.
C) an accountant
D
.
D) an employment agency
正確答案: C
答案解釋:
15.6) All of the following were parts of the vision during the early days of e-commerce except the belief that:
單選題 (2 分) 2分
A
.
A) new, "first-mover" middlemen, with expertise in e-commerce, would force traditional intermediaries out of business.
B
.
B) online consumers were rational and cost-driven.
C
.
C) entry costs to the online retail market would be much less than those needed to establish a physical storefront.
D
.
D) the cost of acquiring customers would be much lower.
正確答案: A
答案解釋:
16.62) In ________, all of a customer's financial (and even nonfinancial) data are pulled together into a single, personalized website.
單選題 (2 分) 2分
A
.
A) account aggregation
B
.
B) a financial portal
C
.
C) integrated financial services
D
.
D) EBPP systems
正確答案: A
答案解釋:
17.11) Which of the following is not one of the central challenges facing the online retail industry?
單選題 (2 分) 2分
A
.
A) lack of physical store presence
B
.
B) consumer concerns about the privacy of personal information
C
.
C) inconvenience in returning goods
D
.
D) delivery delays
正確答案: A
答案解釋:
18.59) Service industries (i.e., finance & travel) typically are very knowledge- and information-intense.
單選題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
19.7) All of the following have introduced social commerce functionality, such as buy buttons, shoppable ads, and marketplaces, except:
單選題 (2 分) 2分
A
.
A) Facebook.
B
.
B) Pinterest.
C
.
C) Instagram.
D
.
D) Tumblr.
正確答案: D
答案解釋:
20.35) Which of the following provides a financial snapshot of a company's assets and liabilities (debts) on a given date?
單選題 (2 分) 2分
A
.
A) working capital
B
.
B) operating margin
C
.
C) balance sheet
D
.
D) gross margin
正確答案: C
答案解釋:
21.29) Operating margin is defined as:
單選題 (2 分) 2分
A
.
A) operating income or loss divided by net sales revenues.
B
.
B) operating income or loss divided by total operating expenses.
C
.
C) net sales revenues divided by net income or loss.
D
.
D) net assets divided by net liabilities.
正確答案: A
答案解釋:
22.2. Kotler「個人和群體經由創造、提供與交易的過程,來滿足需要及欲望所做的種種活動」,是指?(單選)
單選題 (2 分) 2分
A
.
(A) 市場
B
.
(B) 交換
C
.
(C) 交易
D
.
(D) 行銷
正確答案: D
答案解釋:
23.46) All of the following are examples of the challenges that traditional manufacturers experience when using the Internet to sell directly to the consumer except:
單選題 (2 分) 2分
A
.
A) moving to a demand-pull model.
B
.
B) high-cost structures.
C
.
C) developing a fast-response online order and fulfillment system.
D
.
D) channel conflict.
正確答案: B
答案解釋:
24.65) All of the following statements about the online real estate services market are true except:
單選題 (2 分) 2分
A
.
A) the first step in the home buying process for nearly all ages of home buyers is to look online.
B
.
B) the major impact of Internet real estate sites has been in influencing offline decisions.
C
.
C) the primary service offered by real estate sites is a listing of houses available.
D
.
D) the Internet and e-commerce have created a revolution in the real estate value chain.
正確答案: D
答案解釋:
25.15) Which of the following is not a digitally native vertical brand (D2C)?
單選題 (2 分) 2分
A
.
A) Warby Parker
B
.
B) Wayfair
C
.
C) Everlane
D
.
D) Caspar
正確答案: B
答案解釋:
26.33) For a quick check of a firm's short-term financial health, examine its:
單選題 (2 分) 2分
A
.
A) working capital.
B
.
B) gross margin.
C
.
C) long-term debt.
D
.
D) cost of sales.
正確答案: A
答案解釋:
27.28) Which of the following is not categorized as an operating expense?
單選題 (2 分) 2分
A
.
A) the cost of products being sold
B
.
B) marketing costs
C
.
C) administrative overhead
D
.
D) amortization of goodwill
正確答案: A
答案解釋:
28.55) Approximately ________ % of the United States labor force is involved in providing services.
單選題 (2 分) 2分
A
.
A) 50
B
.
B) 60
C
.
C) 70
D
.
D) 80
正確答案: D
答案解釋:
29.43) All of the following are challenges faced by bricks-and-clicks firms except:
單選題 (2 分) 2分
A
.
A) coordinating prices across channels.
B
.
B) handling returns of online purchases at retail outlets.
C
.
C) building a credible website.
D
.
D) building a brand name.
正確答案: D
答案解釋:
30.78) Which of the following is not a major trend in the online recruitment services industry?
單選題 (2 分) 2分
A
.
A) disintermediation
B
.
B) video and remote recruiting
C
.
C) social recruiting
D
.
D) use of artificial intelligence technologies in the hiring process
正確答案: A
答案解釋:
31.9) Which of the following categories generated the highest percentage of online retail revenue in 2019? 回答錯誤
單選題 (2 分) 0分
A
.
A) computers and electronics
B
.
B) apparel and accessories
C
.
C) books/music/video
D
.
D) automobile and automobile parts and accessories
正確答案: A
32.74) Booking Holdings owns all of the following except:
單選題 (2 分) 2分
A
.
A) Priceline.
B
.
B) Expedia.
C
.
C) Booking.com
D
.
D) Kayak
正確答案: B
答案解釋:
33.13) Which of the following statements is not true about the automobile, and automobile parts and accessories, online retail category?
單選題 (2 分) 2分
A
.
A) Most of the revenue in this category is generated from the sales of automobiles.
B
.
B) Automobile manufacturers use the Internet to deliver branding advertising.
C
.
C) U.S. franchising law prohibits automobile manufacturers from selling cars directly to consumers.
D
.
D) Automobile retailing is dominated by dealership networks.
正確答案: A
答案解釋:
34.49) Which of the following has the second-highest share of online retail sales?
單選題 (2 分) 2分
A
.
A) omni-channel merchants
B
.
B) virtual merchants
C
.
C) catalog merchants
D
.
D) manufacturer-direct
正確答案: A
答案解釋:
35.26) The lower the ________ compared to revenue, the higher the gross profit.
單選題 (2 分) 2分
A
.
A) assets
B
.
B) cost of sales
C
.
C) gross margin
D
.
D) operating expenses
正確答案: B
答案解釋:
36.44) All of the following are challenges for catalog merchants except:
單選題 (2 分) 2分
A
.
A) high costs of printing and mailing.
B
.
B) building a credible website.
C
.
C) the need to bring staff in or manage new technology.
D
.
D) building sophisticated order entry and fulfillment systems.
正確答案: D
答案解釋:
37.3) Which of the following is not one of the seven major segments of the retail industry?
單選題 (2 分) 2分
A
.
A) electronics and computers
B
.
B) specialty stores
C
.
C) gasoline and fuel
D
.
D) food and beverage
正確答案: A
答案解釋:
38.31) Which of the following is not considered a current asset?
單選題 (2 分) 2分
A
.
A) long-term investments
B
.
B) cash
C
.
C) accounts receivable
D
.
D) marketable securities
正確答案: A
答案解釋:
39.75) The Covid-19 pandemic has severely impacted the online travel industry.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
40.19) Contrary to predictions of analysts made during the early days of e-commerce, the Internet has led to both disintermediation and hypermediation on a widespread basis.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
41.69) The term fintech applies only to tech companies that are seeking use technology to unbundle traditional institutional financial services industries and instead deliver targeted solutions.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
42.18) Personal consumption of retail goods and services accounts for over 80% of total gross domestic product (GDP).
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
43.50) Big data plays an important role in predictive marketing.
是非題 (2 分) 2分
A
.
A
B
.
B
C
.
AACSB: Application of knowledge
D
.
Learning Objective: 9.3: Identify the challenges faced by the different types of online retailers.
正確答案: A
答案解釋:
44.21) Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
45.36) The existence of substitute products is a key industry strategic factor.
是非題 (2 分) 2分
A
.
A
B
.
B
C
.
AACSB: Application of knowledge
D
.
Learning Objective: 9.2: Explain how to analyze the economic viability of an online firm.
正確答案: A
答案解釋:
46.16) Online retail constitutes about 20% of the total retail market today.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
47.68) The online mortgage industry has transformed the process of obtaining a mortgage.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
48.20) Consumers are primarily price-driven when shopping on the Internet.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
答案解釋:
49.67) In 2020, almost 75% of the adult U.S. population was expected to use online banking.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
答案解釋:
50.79) The social network LinkedIn has become major player in the online recruitment market.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
1.73) In 2019, which of the following was the producer of the largest percentage of revenues in the U.S. entertainment industry?
單選題 (2 分) 2分
A
.
A) radio
B
.
B) television
C
.
C) box office movies
D
.
D) games
正確答案: B
答案解釋:
2.44) Who was the first major fiction writer to create an e-book-only volume of a new work?
單選題 (2 分) 2分
A
.
A) Hugh Howey
B
.
B) Stephen King
C
.
C) Dan Brown
D
.
D) Amanda Hocking
正確答案: B
答案解釋:
3.52) Zinio is an example of which of the following?
單選題 (2 分) 2分
A
.
A) interactive book developer
B
.
B) magazine aggregator
C
.
C) e-reader platform
D
.
D) vanity press
正確答案: B
答案解釋:
4.11) Which of the following is not an example of industry structure convergence?
單選題 (2 分) 2分
A
.
A) Amazon’s creation of Amazon Books Publishing
B
.
B) Verizon’s acquisition of Yahoo
C
.
C) AT&T’s acquisition of Time Warner
D
.
D) Apple’s development of the iPad
正確答案: D
答案解釋:
5.72) Which of the following statements about the music industry is not true? 回答錯誤
單選題 (2 分) 0分
A
.
A) Music industry revenues in 2019 are still only 80% of what they were in 1999.
B
.
B) Digital revenues accounted almost 90% of all U.S. music revenues in 2019.
C
.
C) More revenue was generated by the sales of digital downloads than physical units in 2019.
D
.
D) Streaming music generated about 80% of all digital music sales in 2019.
正確答案: C
6.75) In 2020, which of the following comprised the largest segment of the online gaming audience?
單選題 (2 分) 2分
A
.
A) tablet gamers
B
.
B) smartphone gamers
C
.
C) PC gamers
D
.
D) console gamers
正確答案: B
答案解釋:
7.3) Which of the following U.S. media channels generates the most revenue?
單選題 (2 分) 2分
A
.
A) broadcast television/pay TV
B
.
B) video games
C
.
C) newspapers
D
.
D) box office movies
正確答案: A
答案解釋:
8.5) Which of the following statements about Millennials is not true?
單選題 (2 分) 2分
A
.
A) Millennials are more likely to have read a book in the past 12 months than older adults.
B
.
B) Millennials overwhelmingly prefer e-books to printed books.
C
.
C) Almost two-thirds of Millennials view digital videos daily.
D
.
D) Millennials are much more to use streaming services such as Netflix, Hulu, and Amazon than older adults.
正確答案: B
答案解釋:
9.49) In 2019, book publishing revenues: 回答錯誤
單選題 (2 分) 0分
A
.
A) were flat.
B
.
B) increased significantly.
C
.
C) experienced a sizeable decrease.
D
.
D) increased slightly.
正確答案: A
10.69) Which of the following statements is not true?
單選題 (2 分) 2分
A
.
A) iVOD revenues have grown faster than subscription streaming (SVOD) revenues.
B
.
B) Surveys indicated that a majority of people are unwilling to pay more than $20 per month for SVOD services.
C
.
C) Of all the content industries, thus far, the home entertainment and movie industry has been able to maintain its revenue stream and not be digitally destroyed by new technologies.
D
.
D) The movie industry's control of the release window of a movie is a form of price discrimination.
正確答案: A
答案解釋:
11.40) Which of the following is not an example of a native digital news site?
單選題 (2 分) 2分
A
.
A) Huffington Post
B
.
B) Buzzfeed
C
.
C) Vice
D
.
D) USA Today
正確答案: D
答案解釋:
12.3. 人和人之間的關係是指下列何者?(單選)
單選題 (2 分) 2分
A
.
(A) 口碑
B
.
(B) 社群
C
.
(C) 大眾關係
D
.
(D) 微區隔
正確答案: B
答案解釋:
13.71) Which of the following statements about the home entertainment industry is not true?
單選題 (2 分) 2分
A
.
A) Over 55% of the U.S. population uses an over-the-top (OTT) subscription service in addition to or instead of cable/satellite TV.
B
.
B) Apple TV is the digital media device used by the most people in the United States.
C
.
C) Both the television and movie industry share in home entertainment revenues.
D
.
D) Neither the television nor film industries have built an industry-wide Internet delivery system.
正確答案: B
答案解釋:
14.47) According to Amazon, around how many indie authors have earned more than $100,000 in royalties from their books? 回答錯誤
單選題 (2 分) 0分
A
.
A) 10
B
.
B) 100
C
.
C) 1,000
D
.
D) 10,000
正確答案: C
15.68) ________ is the leading online television and movie distributor.
單選題 (2 分) 2分
A
.
A) Netflix
B
.
B) Hulu
C
.
C) iTunes
D
.
D) Google Play
正確答案: A
答案解釋:
16.66) Which streaming gaming channel was purchased by Amazon in 2015?
單選題 (2 分) 2分
A
.
A) Dailymotion
B
.
B) YouTube Gaming
C
.
C) Twitch
D
.
D) Mixer
正確答案: C
答案解釋:
17.50) When was the future of e-books firmly established?
單選題 (2 分) 2分
A
.
A) in 2000, with the release on Amazon of Stephen King's novella, Riding the Bullet
B
.
B) in 2007, with the introduction of Amazon's Kindle
C
.
C) in 2009, when Barnes & Noble introduced its Nook e-reader
D
.
D) in 2010, when Apple introduced the first iPad
正確答案: B
答案解釋:
18.36) Which of the following statements about the newspaper industry is not true?
單選題 (2 分) 2分
A
.
A) U.S. newspaper revenues totaled about $26 billion in 2019.
B
.
B) The newspaper labor force has dropped precipitously since 2006.
C
.
C) Social media sites have become a major source of unique visitors to online newspapers.
D
.
D) Newspaper circulation revenues have declined dramatically since 2000.
正確答案: D
答案解釋:
19.12. 有關行銷 AIDA 模式之描述,下列何者不正確?(單選)
單選題 (2 分) 2分
A
.
(A) 第一個 A:代表「注意」(Attention)
B
.
(B) 第二個 I:代表「訊息」(Information)
C
.
(C) 第三個 D:代表「欲望」(Desire)
D
.
(D) 第四個 A:代表「行動」(Action)
正確答案: B
答案解釋:
20.55) The ________ model is not one of the three business models employed by newspapers between 1995 and 2018.
單選題 (2 分) 2分
A
.
A) Print-centric
B
.
B) Integrated Print/Web
C
.
C) Digital First
D
.
D) Convergence
正確答案: D
答案解釋:
21.37) Which of the following statements about online magazine publishing is not true? 回答錯誤
單選題 (2 分) 0分
A
.
A) The total magazine audience size increased by almost 25% from 2014 to 2019, due entirely to the growth of digital magazines, especially mobile web editions and video content.
B
.
B) The majority of magazine revenues derive from subscriptions.
C
.
C) Apple+ News is an example of a magazine aggregator.
D
.
D) An estimated 225 million people engage with magazine content via print/digital replica editions.
正確答案: B
22.34) Which of the following happened during the time period when newspapers used a print-centric business model?
單選題 (2 分) 2分
A
.
A) Google launched its search engine.
B
.
B) Apple introduced the iPhone.
C
.
C) Facebook opened to the public.
D
.
D) The adoption of smartphones and tablets has grown rapidly.
正確答案: A
答案解釋:
23.16) Content convergence describes convergence in the design, production, and ________ of content.
單選題 (2 分) 2分
A
.
A) sales
B
.
B) distribution
C
.
C) marketing
D
.
D) consumption
正確答案: B
答案解釋:
24.15. 有共同興趣的人,在網路上形成一個團體,團體間可藉由某些線上服務分享資訊,這是指哪個概念?(單選)
單選題 (2 分) 2分
A
.
(A) 商務
B
.
(B) 基模
C
.
(C) 社群
D
.
(D) 內容
正確答案: C
答案解釋:
25.43) Which of the following statements about the online newspaper audience is not true?
單選題 (2 分) 2分
A
.
A) The online newspaper is one of the most successful of all online media in terms of audience size.
B
.
B) Online readership of newspapers is growing at more than 30% a year
C
.
C) People in the age 18 to 34 age group are more likely to read the news online than older people.
D
.
D) Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.
正確答案: B
答案解釋:
26.39) Which of the following statements about independent bookstores is not true?
單選題 (2 分) 2分
A
.
A) The growth of national bookstore chains such as Barnes & Noble had a negative impact on independent bookstores.
B
.
B) Many independent bookstores have successfully transformed their legacy business models and technology.
C
.
C) The fate of independent bookstores remains a major question in the wake of the Covid-19 pandemic.
D
.
D) The number of independent bookstores declined by almost 50% between 2009 and 2018.
正確答案: D
答案解釋:
27.17) A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.
單選題 (2 分) 2分
A
.
A) sales
B
.
B) distribution
C
.
C) a la carte
D
.
D) freemium
正確答案: D
答案解釋:
28.67) Which of the following statements about e-sports is not true? 回答錯誤
單選題 (2 分) 0分
A
.
A) Many colleges now to offer scholarships for players on their video game teams.
B
.
B) YouTube Gaming accounts for over 80% of the online e-sports viewing in the United States.
C
.
C) E-sports tournaments routinely draw an online audience equal to professional football games.
D
.
D) The e-sport audience is predominantly composed of males between the ages of 21 and 34.
正確答案: B
29.38) Magazine digital advertising revenues are expected to _______ for the next few years.
單選題 (2 分) 2分
A
.
A) remain relatively flat
B
.
B) more than double
C
.
C) grow over 20%
D
.
D) significantly decrease
正確答案: A
答案解釋:
30.80) Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:
單選題 (2 分) 2分
A
.
A) dynamic pricing.
B
.
B) content convergence.
C
.
C) the release windows.
D
.
D) digital rights management.
正確答案: C
答案解釋:
31.48) ________ was sued by the Justice Department for violating antitrust laws in connection with e-books.
單選題 (2 分) 2分
A
.
A) Amazon
B
.
B) Google
C
.
C) Apple
D
.
D) Barnes & Noble
正確答案: C
答案解釋:
32.46) Around what percentage do e-book revenues constitute of overall book publishing revenues?
單選題 (2 分) 2分
A
.
A) About 13%
B
.
B) About 23%
C
.
C) About 33%
D
.
D) About 43%
正確答案: D
答案解釋:
33.56) Which of the following native digital news sites has the most unique monthly visitors? 回答錯誤
單選題 (2 分) 0分
A
.
A) HuffingtonPost.com
B
.
B) Vox Media
C
.
C) Vice Media
D
.
D) Buzzfeed
正確答案: B
34.8) All of the following are examples of technology convergence except:
單選題 (2 分) 2分
A
.
A) the iPad.
B
.
B) Amazon Books Publishing.
C
.
C) Apple TV.
D
.
D) smartphones.
正確答案: B
答案解釋:
35.58) According to Pew Research Center, what percentage of newspaper readers often use a desktop or laptop, as opposed to a mobile device, to read the news?
單選題 (2 分) 2分
A
.
A) 20%
B
.
B) 30%
C
.
C) 40%
D
.
D) 50%
正確答案: B
答案解釋:
36.59) Major newspapers withdrew from Facebook’s Instant Articles program because it resulted in Facebook draining newspaper sites of visitors.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
37.27) Cannibalization is a major challenge facing book publishers.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
38.83) In 2019, digital games generated more than three times the amount of digital music revenues.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
39.21) The video game industry accounts for the second highest percentage of U.S. media revenues.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
40.61) Vox is an example of the Digital First business model.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
41.22) The time spent on desktop computers and mobile devices now exceeds time spent in front of the television.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
42.23) The a la carte revenue model allows users to pay only for what they use.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
43.25) Revenue generated by online TV and movies is expected to grow by nearly 20% between 2020 and 2022.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
44.26) Smartphones are an example of technological convergence.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
45.24) Millennials are the first generation to be born into the digital revolution of the 20th century.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
46.60) In the wholesale model of e-book distribution, pricing power is with the publisher.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
47.19) The amount of time the average American adult spends consuming media is about two-and-a half times the amount of time spent at work.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
48.20) The proliferation of mobile devices has led to a decrease in the total amount of time spent with media.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
49.18) The Covid-19 pandemic has resulted in an increase in advertising revenue for online content providers.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
50.82) Streaming has replaced downloading as the preferred consumer viewing platform for home entertainment content.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
1) Which of the following is not a current trend in online content?
A) Sales of music in digital form produce more revenue than sales of physical units.
B) Readership of newspapers in print form continues to exceed online readership.
C) E-book sales growth slows.
D) Explosive growth of the mobile platform accelerates the transition to digital content.
B) Readership of newspapers in print form continues to exceed online readership.
2) Cord cutters and cord shavers are shrinking the number of pay TV households yearly by approximately:
A) 1%.
B) 5%.
C) 10%.
D) 15%.
A) 1%
3) Which of the following forms of media generate the most revenue?
A) television
B) Internet
C) newspapers
D) box office
A) television
4) Music streaming is growing at ________ a year.
A) 20%
B) 30%
C) 40%
D) 50%
C) 40%
5) Well over ________ of television viewers multitask while watching television.
A) 20%
B) 40%
C) 60%
D) 80%
D) 80%
6) Which of the following is the fastest growing segment of media revenues?
A) magazines
B) home video
C) Internet media
D) radio
C) Internet Media
7) Which of the following streaming TV devices does not involve use of a remote controller?
A) Google Chromecast
B) Apple TV
C) Amazon Fire TV
D) Roku
A) Google Chromecast
8) All of the following are examples of technology convergence except:
A) the iPad.
B) Amazon Books Publishing.
C) Apple TV.
D) smartphones.
B) Amazon Books Publishing.
9) All of the following are aspects of content convergence except:
A) language.
B) design.
C) production.
D) distribution.
A) language
10) Which of the following occurs first in the process of content convergence related to books?
A) media integration
B) media migration
C) media transformation
D) media maturity
B) media migration
11) ________ accounted for the second largest amount of paid online content revenues in the United States in 2016.
A) Online video games
B) Internet radio
C) Online music
D) Online TV and movies
A) Online video games
12) Internet media revenue is about ________ of total entertainment and media revenue.
A) 9%
B) 18%
C) 36%
D) 40%
A) 9%
13) The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:
A) aggregation.
B) repackaging.
C) media transformation.
D) industry convergence.
D) industry convergence.
14) DRM refers to a combination of ________ for protecting digital content.
A) hardware and software methods
B) technical and legal means
C) user and publisher agreements
D) local and remote policies
B) technical and legal means
15) ________ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.
A) Technological
B) Content
C) Media
D) Industry
A) Technological
16) Content convergence describes convergence in the design, production, and ________ of content.
A) sales
B) distribution
C) marketing
D) consumption
B) distribution
17) A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.
A) sales
B) distribution
C) a la carte
D) freemium
D) freemium
32) Which of the following newspaper audience platforms has the highest percentage of readers?
A) print/mobile
B) Web only
C) Web/mobile
D) print
D) print
33) ________ has the highest share of the e-book market.
A) Amazon
B) Apple
C) Google
D) Barnes & Noble
A) Amazon
34) Which of the following happened when newspapers used a print-centric business model?
A) Google launched its search engine.
B) Apple introduced the iPhone.
C) Facebook opened to the public.
D) The adoption of smartphones and tablets has grown rapidly.
A) Google launched its search engine.
35) Which of the following was the most troubled (e.g., revenues) segment of the publishing industry in 2016?
A) books
B) magazines
C) newspapers
D) periodicals
C) newspapers
36) Which of the following statements about the newspaper industry is not true?
A) The growth of the mobile platform and social networks has potential to lessen the disruption of the newspaper industry.
B) Online readership of newspapers is increasing.
C) The emergence of search engines such as Google has had a major impact on the newspaper industry.
D) Newspaper circulation revenues have declined by 10% since 2000.
A) The growth of the mobile platform and social networks has potential to lessen the disruption of the newspaper industry.
38) Magazine print advertising revenues are expected to ________ through 2020.
A) remain relatively flat
B) more than double
C) grow 20%
D) significantly decrease
A) remain relatively flat
39) Which of the following is not one of the top three players in e-book publishing?
A) Barnes & Noble
B) Apple
C) Amazon
D) Google
D) Google
40) Which of the following is not an example of a native digital news site?
A) Huffington Post
B) Buzzfeed
C) Vice
D) USA Today
D) USA Today
41) Which of the following routes to a newspaper website generates the most digital ad revenue for the newspaper?
A) via a search engine
B) via a social media site such as Facebook
C) directly to a newspaper's home page
D) via an online video
C) directly to a newspaper's home page
42) A metered subscription model is most similar to which of the following revenue models?
A) transaction fee
B) freemium
C) advertising
D) affiliate
B) Freemium
43) Which of the following statements about the online newspaper audience is not true?
A) The online newspaper is one of the most successful of all online media in terms of audience size.
B) Most newspaper readers read the news using a combination of the Web, print and mobile.
C) Over 65% of Internet users read newspaper content online.
D) Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.
B) Most newspaper readers read the news using a combination of the Web, print and mobile.
44) Who was the first major fiction writer to create an e-book-only volume of a new work?
A) Hugh Howey
B) Stephen King
C) Dan Brown
D) Amanda Hocking
B) Stephen King
45) Together Amazon and Apple account for ________ of the e-book market.
A) 50%
B) 75%
C) 85%
D) 90%
C) 85%
46) Around what percentage of Amazon's top 100 selling books are now self-published?
A) 10%
B) 25%
C) 40%
D) 50%
C) 40%
47) In 2016, e-book sales are expected to constitute about ________% of all consumer book sales.
A) 15
B) 25
C) 35
D) 45
B) 25
48) Which of the following was sued by the Justice Department for violating antitrust laws in connection with e-books?
A) Amazon
B) Google
C) Apple
D) Barnes & Noble
C) Apple
49) Over the past five years, book publishing revenues have:
A) decreased slightly.
B) increased steadily.
C) remained stable.
D) decreased sharply.
C) remained stable.
50) In 2014, Amazon engaged in a trade dispute with ________ over the pricing of e-books.
A) Barnes & Noble
B) Penguin Random House
C) Hachette
D) Harper Collins
C) Hachette
51) Which of the following statements about the wholesale and agency models for selling books is not true?
A) In the wholesale model, the retailer decides at what price to sell a book to the consumer.
B) Amazon surprised traditional publishers by selling e-books for below their wholesale cost.
C) Amazon supports the agency model.
D) A result of the agency model was that Amazon's prices on e-books rose.
C) Amazon supports the agency model.
52) Zinio is an example of which of the following?
A) interactive book developer
B) magazine aggregator
C) e-reader platform
D) vanity press
B) magazine aggregator
53) The New York Times introduced which of the following revenue models in 2011?
A) paywall
B) metered subscription
C) advertising
D) walled garden
B) metered subscription
54) Which of the following native digital news sites is owned by AOL?
A) Vox
B) Vice
C) Reddit
D) Huffington Post
D) Huffington Post
55) Which of the following is not one of the three business models employed by newspapers between 1995 and 2015?
A) The Print-centric model
B) The Integrated Print/Web
C) The Digital First model
D) The Convergence model
D) The Convergence model
56) Which of the following most accurately describes the resolution of the dispute between Hachette, Simon & Schuster, and Amazon?
A) The dispute remains unresolved.
B) Publishers can set the prices of their books, but Amazon can offer incentives to publishers to reduce prices on selected books and publishers may pay Amazon to list their books.
C) Amazon can determine the prices of books sold on its platform at its sole discretion.
D) Amazon must not sell the books for any lower than the price they are offered by Apple.
B) Publishers can set the prices of their books, but Amazon can offer incentives to publishers to reduce prices on selected books and publishers may pay Amazon to list their books.
57) Which of the following is a news aggregator app that organizes stories in a magazine format, with content drawn from traditional media and social sites, and then reassembled in an easy-to-navigate, personalized format for a mobile touchscreen environment?
A) Reddit
B) Huffington Post
C) Flipboard
D) Buzzfeed
C) Flipboard
58) What percentage of people read newspapers only on a mobile device?
A) 5%
B) 7%
C) 11%
D) 14%
A) 5%
66) Which streaming gaming channel was purchased by Amazon in 2015?
A) Dailymotion
B) YouTube.com
C) Twitch.tv
D) Shield.nvidia.com
C) Twitch.tv
68) ________ is the largest online movie download distributor.
A) Netflix
B) Hulu
C) iTunes
D) Google Play
C) iTunes
69) Which of the following statements about the movie industry is not true?
A) Over 300 million Americans were expected to watch movies online in 2015.
B) Online movie distribution is not dominated by a single distributor.
C) Of the digital formats, the most revenue is generated by subscription streaming.
D) DVD sales make up the largest share of movie revenues.
A) Over 300 million Americans were expected to watch movies online in 2015.
70) Which of the following is not a leading factor in changing the television industry?
A) increasing broadband penetration
B) development of the mobile platform
C) increased popularity of binge watching compared to watching linear TV
D) inability to attract customers to traditional products
D) inability to attract customers to traditional products
71) Which of the following statements about the television industry is not true?
A) Netflix is the leading distributor of streaming TV.
B) The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.
C) Americans spend more time watching television on a computer or mobile device than they do on a traditional television set.
D) Over-the-top entertainment services are a threat to cable television distributors.
B) The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.
73) Which of the following is the largest producer of revenues in the entertainment industry?
A) radio
B) television
C) films
D) video games
B) television
74) In 2015, which of the following forms of entertainment produced the least amount of revenue?
A) Radio
B) Music
C) Video games
D) Television
A) Radio
75) In 2016, which of the following comprised the largest segment of the online gaming audience?
A) social gamers
B) mobile gamers
C) casual gamers
D) console gamers
B) mobile gamers
76) House of Cards is an online TV series developed by which of the following?
A) Amazon Studios
B) HBO
C) Netflix
D) Hulu
C) Netflix
77) Which of the following statements about mobile gaming is not true?
A) Mobile games generated an estimated $3 billion in 2015.
B) Mobile games have proven difficult to monetize.
C) Mobile games appeal to a younger demographic than console games.
D) Mobile games are expensive to develop.
D) Mobile games are expensive to develop.
78) Which of the following is not a type of digital gamers?
A) casual gamers
B) local gamers
C) social gamers
D) console gamers
B) local gamers
79) The leading merchants of digital games are Apple's App Store and:
A) Xbox.
B) Twitch.tv.
C) Amazon Digital.
D) the Google Play store.
D) the Google Play store.
80) Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:
A) price discrimination.
B) content convergence.
C) the release window.
D) digital rights management.
C) the release window.
81) Which of the following statements is not true about OTT?
A) To use OTT services, consumers must purchase a bundle of channels.
B) OTT entertainment services are a threat to cable television.
C) OTT refers to the fact that the entertainment service rides "on top" of other network services such as cable TV and telephone service.
D) OTT entertainment services enable binge watching.
A) To use OTT services, consumers must purchase a bundle of channels.
Streaming has replaced downloading as the preferred consumer viewing platform for home entertainment content.
True
The a la carte revenue model allows users to pay only for what they use.
True
Revenue generated by online TV and movies is expected to grow by nearly 30% between 2018 and 2021.
true
In 2017, which of the following forms of entertainment produced the least amount of revenue?
recorded music
Which of the following is not a type of digital gamer?
local gamers
Which of the following platforms was used by the fewest gamers in 2018?
console
Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:
the release windows.
Which of the following statements about the wholesale and agency models for selling books is not true?
Amazon supports the agency model.
The video game industry accounts for the second highest amount of U.S. media revenues.
True
Which of the following has the highest share of the e-book market?
Amazon
Together Amazon and Apple account for ________ of the e-book market.
92%
Which of the following statements about the newspaper industry is not true?
Newspaper circulation revenues have declined dramatically since 2000.
Which of the following types of online content is consumed by the lowest percentage of U.S. Internet users?
magazines
Smartphones are an example of technological convergence.
True
Which of the following is not an example of industry structure convergence?
Apple's development of the iPad
The majority of Americans who read newspapers online read them exclusively on mobile devices.
True
Which of the following occurs first in the process of content convergence related to books?
media migration
In 2018, time spent with digital media accounted for ________ of total media time spent
50%
________ is the leading online television and movie distributor.
Netflix
The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:
industry convergence.
Online newspapers and magazines are the largest and fastest growing forms of online content.
-True
-False
False
Which of the following U.S. media channels generates the most revenue?
-motion pictures
-Internet
-television
-newspapers
television
All of the following are aspects of content convergence except:
-production.
-design.
-distribution.
-language.
language
Which of the following occurs first in the process of content convergence related to books?
-media integration
-media maturity
-media transformation
-media migration
media migration
Which of the following statements is not true about OTT?
-OTT entertainment services enable binge watching.
-To use OTT services, consumers must purchase a bundle of channels.
-OTT entertainment services are a threat to cable television.
-OTT refers to the fact that the entertainment service rides "on top" of -other network services such as cable TV and telephone service.
To use OTT services, consumers must purchase a bundle of channels.
Which streaming gaming channel was purchased by Amazon in 2015?
-Twitch.tv
-Shield.nvidia.com
-YouTube.com
-Dailymotion
Twitch.tv
Which of the following is not a current trend in online content?
-E-book sales growth slows.
-Explosive growth of the mobile platform accelerates the transition to digital content.
-Americans continue to spend more on streaming music than downloaded music.
-Readership of newspapers in print form continues to exceed online readership.
Readership of newspapers in print form continues to exceed online readership.
The entertainment industry is generally considered to be composed of five players: television, Hollywood films, music, radio, and games.
-True
-False
True
The leading merchants of digital games includes Apple's App Store and:
-Xbox.
-the Google Play store.
-Amazon Digital.
-Twitch.tv.
the Google Play store.
Which of the following magazines underwent a digital remaking following the introduction of a metered paywall in 2014?
-The New Yorker
-Time
-Newsweek
-Sports Illustrated
The New Yorker
________ is the largest downloading service of movies a la carte (electronic sell-through (EST)).
-Google Play
-Hulu
-Netflix
-iTunes
iTunes
Online readership of newspapers is growing by more than 10% a year.
-True
-False
True
Vox is an example of the Digital First business model.
-True
-False
False
Millennials are the first generation to be born into the digital revolution of the 20th century.
-True
-False
True
The average American adult spends twice as much time-consuming media than time spent at work.
-True
-False
True
Which of the following was expected to generate the highest amount of online content revenue in the United States in 2017?
-Internet radio
-online music
-online TV and movies
-online video games
online video games
________ were the most troubled segment of the publishing industry in 2017.
-Magazines
-Periodicals
-Newspapers
-Books
Newspapers
What percentage of Americans who read newspapers exclusively do so on a mobile device?
-23%
-43%
-53%
-33%
53%
Which of the following statements about the online newspaper audience is not true?
-Most newspaper readers read the news using a combination of the Web, print and mobile.
-Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.
-Social networks have become a major source of readers for newspaper articles.
-The online newspaper is one of the most successful of all online media in terms of audience size.
Most newspaper readers read the news using a combination of the Web, print and mobile.
________ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.
-Media
-Content
-Technological
-Industry
Technological
Which of the following is not a type of digital gamers?
-casual gamers
-console gamers
-social gamers
-local gamers
local gamers
Which of the following statements about the television industry is not true?
-Netflix is the leading distributor of streaming TV.
-The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.
-Over-the-top entertainment services are a threat to cable television distributors.
-Americans spend more time watching television on a computer or mobile device than they do on a traditional television set.
The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.
Content convergence describes convergence in the design, production, and ________ of content.
-consumption
-marketing
-sales
-distribution
distribution
In 2017, which of the following comprised the largest segment of the online gaming audience?
-casual gamers
-console gamers
-social gamers
-mobile gamers
mobile gamers
Which of the following is the fastest growing segment of U.S. media revenues?
-magazines
-radio
-home video
-Internet media
Internet media
Over 50% of the American population watches television online.
-True
-False
True
Which of the following is not a leading factor in changing the television industry?
-increased popularity of binge watching compared to watching linear TV
-development of the mobile platform
-increasing broadband penetration
-inability to attract customers to traditional products
inability to attract customers to traditional products
Which of the following native digital news sites is owned by AOL?
-Vox
-Huffington Post
-Vice
Huffington Post
Which of the following has the highest share of the e-book market?
-Apple
-Barnes & Noble
-Amazon
Amazon
Smartphones are an example of technological convergence.
-True
-False
True
Which of the following statements about the movie industry is not true?
-Online movie distribution is not dominated by a single distributor.
-Over 300 million Americans were expected to watch feature-length movies online in 2017.
-Of all the content industries, thus far, the movie industry has been able to maintain its revenue stream and not be digitally destroyed by new technologies.
-The movie industry's control of the release window of a movie is a form of price discrimination.
Over 300 million Americans were expected to watch feature-length movies online in 2017.
Which of the following streaming TV devices does not involve use of a remote controller?
-Google Chromecast
-Roku
-Apple TV
-Amazon Fire TV
Google Chromecast
All of the following are examples of technology convergence except:
-smartphones.
-the iPad.
-Apple TV.
-Amazon Books Publishing.
Amazon Books Publishing.
The publishing and entertainment industries make up the largest share of the commercial content marketplace, both online and offline.
-True
-False
True
When was the future of e-books firmly established?
-in 2000, with the release on Amazon of Stephen King's novella, Riding the Bullet
-in 2010, when Apple introduced the first iPad
-in 2007, with the introduction of Amazon's Kindle
-in 2009, when Barnes & Noble introduced its Nook e-reader
in 2007, with the introduction of Amazon's Kindle
In 2016, revenue from Internet media accounted for about ________ of total entertainment and media revenue.
-9%
-18%
-36%
-40%
9%
Cord cutters and cord shavers are shrinking the number of pay TV households yearly by approximately:
-2%.
-7%.
-9%.
-5%.
2%.
Which of the following statements about the newspaper industry is not true?
-Newspaper circulation revenues have remained flat since 2000.
-The emergence of search engines such as Google has had a major impact on the newspaper industry.
-Online readership of newspapers is increasing.
-The desktop computer remains the most common way that that Americans access online newspapers.
The desktop computer remains the most common way that that Americans access online newspapers.
Which of the following happened during the time period when newspapers used a print-centric business model?
-Apple introduced the iPhone.
-The adoption of smartphones and tablets has grown rapidly.
-Facebook opened to the public.
-Google launched its search engine.
Google launched its search engine.
Zinio is an example of which of the following?
-e-reader platform
-vanity press
-magazine aggregator
-interactive book developer
magazine aggregator
The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:
-industry convergence.
-repackaging.
-aggregation.
-media transformation.
industry convergence.
Together Amazon and Apple account for ________ of the e-book market.
-55%
-92%
-72%
-87%
92%
Which of the following is a news aggregator app that organizes stories in a magazine format, with content drawn from traditional media and social sites, and then reassembled in an easy-to-navigate, personalized format for a mobile touchscreen environment?
-Buzzfeed
-Huffington Post
Who was the first major fiction writer to create an e-book-only volume of a new work?
-Amanda Hocking
-Stephen King
-Hugh Howey
-Dan Brown
Stephen King
Which of the following is not one of the top three players in e-book publishing?
-Apple
-Amazon
-Barnes & Noble
DRM refers to a combination of ________ for protecting digital content.
-technical and legal means
-local and remote policies
-user and publisher agreements
-hardware and software methods
technical and legal means
Around what percentage of Amazon's top 100 selling e-books are now self-published?
-45%
-15%
-35%
-25%
45%
________ was sued by the Justice Department for violating antitrust laws in connection with e-books.
-Amazon
-Barnes & Noble
-Apple
Apple
In 2016, the sales of downloaded music ________, compared to the previous year.
-were flat
-decreased by 10%
-increased by 10%
-decreased by 20%
decreased by 10%
Magazine digital advertising revenues are expected to _______ for the next few years.
-grow over 20%
-significantly decrease
-more than double
-remain relatively flat
remain relatively flat
In 2017, e-book sales were expected to constitute about ________% of total trade book sales revenues in the United States.
-40
-30
-10
-20
20
Which of the following is the most common model for online newspaper access for U.S. newspapers with circulations over 50,000?
-most content free, but subscription fee to access premium content
-paywall
-totally free
-metered subscription model
metered subscription model
In 2016, mobile games generated more revenue than console games.
-True
-False
False
Which of the following is not part of an effort by Internet distributors to ensure the survival of legitimate news sites?
-the New Media Alliance
-Google's AMP tool
-Amazon's Spark network
-Facebook Journalism Project
the New Media Alliance
The time spent on desktop computers and mobile devices now exceeds time spent in front of the television.
-True
-False
True
Cannibalization is a major challenge facing book publishers.
-True
-False
False
Which of the following statements about mobile gaming is not true?
-Mobile gaming is a more open platform than console gaming.
-Mobile games generated an estimated $3 billion in 2016.
-Mobile games appeal to a younger demographic than console games.
-Mobile games are expensive to develop when compared to traditional gaming systems.
Mobile games are expensive to develop when compared to traditional gaming systems.
Which of the following statements about the wholesale and agency models for selling books is not true?
-A result of the agency model was that Amazon's prices on e-books rose.
-In the wholesale model, the retailer decides at what price to sell a book to the consumer.
-Amazon surprised traditional publishers by selling e-books for below their wholesale cost.
-Amazon supports the agency model.
Amazon supports the agency model.
House of Cards is an online TV series developed by which of the following?
-Amazon Studios
-Netflix
-Hulu
-HBO
Netflix
In the wholesale model of e-book distribution, pricing power is with the publisher.
-True
-False
False
Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:
-content convergence.
-digital rights management.
-the release window.
-dynamic pricing.
the release window.
The a la carte revenue model allows users to pay only for what they use.
-True
-False
True
A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.
-sales
-distribution
-freemium
-a la carte
freemium
________ is not one of the three business models employed by newspapers between 1995 and 2017.
-The Digital First model
-The Convergence model
-The Print-centric model
-The Integrated Print/Web
The Convergence model
In 2016, which of the following forms of entertainment produced the least amount of revenue?
-television
-video games
-radio
-recorded music
recorded music
The proliferation of mobile device has led to an increase in the total amount of time spent with media.
-True
-False
True
Which of the following is the largest producer of revenues in the U.S. entertainment industry?
-television
-motion pictures
-radio
-video games
television
Which of the following statements about the movie industry is not true?
A. Of all the content industries, thus far, the movie industry has been able to maintain its revenue stream and not be digitally destroyed by new technologies.
B. The movie industry's control of the release window of a movie is a form of price discrimination.
C. Over 300 million Americans were expected to watch feature-length movies online in 2017.
D. Online movie distribution is not dominated by a single distributor.
C. Over 300 million Americans were expected to watch feature-length movies online in 2017.
A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.
A. Distribution
B. A la carte
C. Freemium
D. Sales
C. Freemium
Which of the following occurs first in the process of content convergence related to books?
A. Media transformation
B. Media integration
C. Media migration
D. Media maturity
C. Media migration
________ is not one of the three business models employed by newspapers between 1995 and 2017.
A. The Digital First model
B. The Convergence model
C. The Integrated Print/Web
D. The Print-centric model
B. Convergence model
________ was sued by the Justice Department for violating antitrust laws in connection with e-books.
A. Barnes & Noble
B. Amazon
C. Apple
D. Google
C. Apple
All of the following are aspects of content convergence except:
A. Production.
B. Language.
C. Distribution.
D. Design.
B. Language
Which of the following statements about mobile gaming is not true?
A. Mobile games generated an estimated $3 billion in 2016.
B. Mobile gaming is a more open platform than console gaming.
C. Mobile games are expensive to develop when compared to traditional gaming systems.
D. Mobile games appeal to a younger demographic than console games.
C. Mobile games are expensive to develop when compared to traditional gaming systems.
In 2017, e-book sales were expected to constitute about ________% of total trade book sales revenues in the United States.
A. 30
B. 40
C. 20
D. 10
C. 20
Which streaming gaming channel was purchased by Amazon in 2015?
A. Dailymotion
B. Twitch.tv
C. YouTube.com
D. Shield.nvidia.com
B. Twitch.tv
________ were the most troubled segment of the publishing industry in 2017.
A. Books
B. Magazines
C. Periodicals
D. Newspapers
D. Newspapers
Which of the following is not part of an effort by Internet distributors to ensure the survival of legitimate news sites?
A. Google's AMP tool
B. The New Media Alliance
C. Amazon's Spark network
D. Facebook Journalism Project
B. The New Media Alliance
In 2016, the sales of downloaded music ________, compared to the previous year.
A. Were flat
B. Increased by 10%
C. Decreased by 10%
D. Decreased by 20%
D. Decreased by 10%
Which of the following happened during the time period when newspapers used a print-centric business model?
A. Google launched its search engine.
B. The adoption of smartphones and tablets has grown rapidly.
C. Facebook opened to the public.
D. Apple introduced the iPhone.
A. Google launched its search engine.
TRUE OR FALSE
In the wholesale model of e-book distribution, pricing power is with the publisher.
False
TRUE OR FALSE
The a la carte revenue model allows users to pay only for what they use.
True
TRUE OR FALSE
The average American adult spends twice as much time-consuming media than time spent at work.
True
TRUE OR FALSE
The proliferation of mobile device has led to an increase in the total amount of time spent with media.
True
Which of the following was expected to generate the highest amount of online content revenue in the United States in 2017?
A. Internet radio
B. Online music
C. Online TV and movies
D. Online video games
D. Online video games
Which of the following statements about the television industry is not true?
A. The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.
B. Over-the-top entertainment services are a threat to cable television distributors.
C. Americans spend more time watching television on a computer or mobile device than they do on a traditional television set.
D. Netflix is the leading distributor of streaming TV.
A. The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.
Content convergence describes convergence in the design, production, and ________ of content.
A. Marketing
B. Distribution
C. Consumption
D. Sales
B. Distribution
_______ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.
A. Technological
B. Industry
C. Media
D. Content
A. Technological
Which of the following U.S. media channels generates the most revenue?
A. Newspapers
B. Television
C. Motion pictures
D. Internet
B. Television
Which of the following is not a leading factor in changing the television industry?
A. Inability to attract customers to traditional products
B. Increasing broadband penetration
C. Development of the mobile platform
D. Increased popularity of binge watching compared to watching linear TV
A. Inability to attract customers to traditional products
Which of the following magazines underwent a digital remaking following the introduction of a metered paywall in 2014?
A. Sports Illustrated
B. The New Yorker
C. Newsweek
D. Time
B. The New Yorker
All of the following are examples of technology convergence except:
A. The iPad.
B. Apple TV.
C. Smartphones.
D. Amazon Books Publishing.
D. Amazon Books Publishing
Which of the following streaming TV devices does not involve use of a remote controller?
A. Apple TV
B. Roku
C. Google Chromecast
D. Amazon Fire TV
C. Google Chromecast
In 2016, revenue from Internet media accounted for about ________ of total entertainment and media revenue.
A. 36%
B. 40%
C. 18%
D. 9%
D. 9%
Which of the following native digital news sites is owned by AOL?
A. Huffington Post
B. Vice
C. Reddit
D. Vox
A. Huffington Post
Which of the following statements is not true about OTT?
A. To use OTT services, consumers must purchase a bundle of channels.
B. OTT entertainment services are a threat to cable television.
C. OTT refers to the fact that the entertainment service rides "on top" of other network services such as cable TV and telephone service.
D. OTT entertainment services enable binge watching.
A. To use OTT services, consumers must purchase a bundle of channels.
Which of the following is not a current trend in online content?
A. Americans continue to spend more on streaming music than downloaded music.
B. Readership of newspapers in print form continues to exceed online readership.
C. Explosive growth of the mobile platform accelerates the transition to digital content.
D. E-book sales growth slows.
B. Readership of newspapers in print form continues to exceed online readership.
What percentage of Americans who read newspapers exclusively do so on a mobile device?
A. 23%
B. 33%
C. 53%
D. 43%
C. 53%
Which of the following is a news aggregator app that organizes stories in a magazine format, with content drawn from traditional media and social sites, and then reassembled in an easy-to-navigate, personalized format for a mobile touchscreen environment?
A. Reddit
B. Huffington Post
C. Buzzfeed
D. Flipboard
D. Flipboard
Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:
A. The release window.
B. Dynamic pricing.
C. Content convergence.
D. Digital rights management.
A. The release window.
In 2016, which of the following forms of entertainment produced the least amount of revenue?
A. Television
B. Recorded music
C. Radio
D. Video games
B. Recorded music
TRUE OR FALSE
Online readership of newspapers is growing by more than 10% a year.
True
TRUE OR FALSE
Cannibalization is a major challenge facing book publishers.
False
TRUE OR FALSE
Millennials are the first generation to be born into the digital revolution of the 20th century.
True
TRUE OR FALSE
Online newspapers and magazines are the largest and fastest growing forms of online content.
False
The leading merchants of digital games includes Apple's App Store and:
A. Xbox.
B. The Google Play store.
C. Twitch.tv.
D. Amazon Digital.
B. The Google Play Store
Cord cutters and cord shavers are shrinking the number of pay TV households yearly by approximately:
A. 5%.
B. 7%.
C. 2%.
D. 9%.
C. 2%
Which of the following statements about the online newspaper audience is not true?
A. Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.
B. The online newspaper is one of the most successful of all online media in terms of audience size.
C. Social networks have become a major source of readers for newspaper articles.
D. Most newspaper readers read the news using a combination of the Web, print and mobile.
D. Most newspaper readers read the news using a combination of the Web, print and mobile.
Which of the following is the fastest growing segment of U.S. media revenues?
A. Home video
B. Radio
C. Internet media
D. Magazines
C. Internet media
Zinio is an example of which of the following?
A. E-reader platform
B. Magazine aggregator
C. Interactive book developer
D. Vanity press
B. Magazine aggregator
Which of the following is the most common model for online newspaper access for U.S. newspapers with circulations over 50,000?
A. Totally free
B. Most content free, but subscription fee to access premium content
C. Metered subscription model
D. Paywall
C. Metered subscription model
Which of the following is not one of the top three players in e-book publishing?
A. Barnes & Noble
B. Google
C. Apple
D. Amazon
B. Google
Together Amazon and Apple account for ________ of the e-book market.
A. 72%
B. 92%
C. 55%
D. 87%
B. 92%
The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:
A. Industry convergence.
B. Repackaging.
C. Media transformation.
D. Aggregation.
A. Industry convergence
In 2017, which of the following comprised the largest segment of the online gaming audience?
A. Social gamers
B. Console gamers
C. Mobile gamers
D. Casual gamers
C. Mobile gamers
Which of the following has the highest share of the e-book market?
A. Amazon
B. Apple
C. Google
D. Barnes & Noble
A. Amazon
Which of the following is the largest producer of revenues in the U.S. entertainment industry?
A. Radio
B. Motion pictures
C. Video games
D. Television
D. Television
TRUE OR FALSE
In 2016, mobile games generated more revenue than console games.
False
TRUE OR FALSE
The entertainment industry is generally considered to be composed of five players: television, Hollywood films, music, radio, and games.
True
Which of the following is not a type of digital gamers?
A. Social gamers
B. Console gamers
C. Local gamers
D. Casual gamers
C. Local gamers
1) Which of the following is not a current trend in online content?
A) Sales of music in digital form produce more revenue than sales of physical units.
B) Readership of newspapers in print form continues to exceed online readership.
C) E-book sales growth slows.
D) Explosive growth of the mobile platform accelerates the transition to digital content.
B) Readership of newspapers in print form continues to exceed online readership.
2) Cord cutters and cord shavers are shrinking the number of pay TV households yearly by approximately:
A) 1%.
B) 5%.
C) 10%.
D) 15%.
A) 1%
3) Which of the following forms of media generate the most revenue?
A) television
B) Internet
C) newspapers
D) box office
A) television
4) Music streaming is growing at ________ a year.
A) 20%
B) 30%
C) 40%
D) 50%
C) 40%
5) Well over ________ of television viewers multitask while watching television.
A) 20%
B) 40%
C) 60%
D) 80%
D) 80%
6) Which of the following is the fastest growing segment of media revenues?
A) magazines
B) home video
C) Internet media
D) radio
C) Internet Media
7) Which of the following streaming TV devices does not involve use of a remote controller?
A) Google Chromecast
B) Apple TV
C) Amazon Fire TV
D) Roku
A) Google Chromecast
8) All of the following are examples of technology convergence except:
A) the iPad.
B) Amazon Books Publishing.
C) Apple TV.
D) smartphones.
B) Amazon Books Publishing.
9) All of the following are aspects of content convergence except:
A) language.
B) design.
C) production.
D) distribution.
A) language
10) Which of the following occurs first in the process of content convergence related to books?
A) media integration
B) media migration
C) media transformation
D) media maturity
B) media migration
11) ________ accounted for the second largest amount of paid online content revenues in the United States in 2016.
A) Online video games
B) Internet radio
C) Online music
D) Online TV and movies
A) Online video games
12) Internet media revenue is about ________ of total entertainment and media revenue.
A) 9%
B) 18%
C) 36%
D) 40%
A) 9%
13) The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:
A) aggregation.
B) repackaging.
C) media transformation.
D) industry convergence.
D) industry convergence.
14) DRM refers to a combination of ________ for protecting digital content.
A) hardware and software methods
B) technical and legal means
C) user and publisher agreements
D) local and remote policies
B) technical and legal means
15) ________ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.
A) Technological
B) Content
C) Media
D) Industry
A) Technological
16) Content convergence describes convergence in the design, production, and ________ of content.
A) sales
B) distribution
C) marketing
D) consumption
B) distribution
17) A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.
A) sales
B) distribution
C) a la carte
D) freemium
D) freemium
32) Which of the following newspaper audience platforms has the highest percentage of readers?
A) print/mobile
B) Web only
C) Web/mobile
D) print
D) print
33) ________ has the highest share of the e-book market.
A) Amazon
B) Apple
C) Google
D) Barnes & Noble
A) Amazon
34) Which of the following happened when newspapers used a print-centric business model?
A) Google launched its search engine.
B) Apple introduced the iPhone.
C) Facebook opened to the public.
D) The adoption of smartphones and tablets has grown rapidly.
A) Google launched its search engine.
35) Which of the following was the most troubled (e.g., revenues) segment of the publishing industry in 2016?
A) books
B) magazines
C) newspapers
D) periodicals
C) newspapers
36) Which of the following statements about the newspaper industry is not true?
A) The growth of the mobile platform and social networks has potential to lessen the disruption of the newspaper industry.
B) Online readership of newspapers is increasing.
C) The emergence of search engines such as Google has had a major impact on the newspaper industry.
D) Newspaper circulation revenues have declined by 10% since 2000.
A) The growth of the mobile platform and social networks has potential to lessen the disruption of the newspaper industry.
38) Magazine print advertising revenues are expected to ________ through 2020.
A) remain relatively flat
B) more than double
C) grow 20%
D) significantly decrease
A) remain relatively flat
39) Which of the following is not one of the top three players in e-book publishing?
A) Barnes & Noble
B) Apple
C) Amazon
D) Google
D) Google
40) Which of the following is not an example of a native digital news site?
A) Huffington Post
B) Buzzfeed
C) Vice
D) USA Today
D) USA Today
41) Which of the following routes to a newspaper website generates the most digital ad revenue for the newspaper?
A) via a search engine
B) via a social media site such as Facebook
C) directly to a newspaper's home page
D) via an online video
C) directly to a newspaper's home page
42) A metered subscription model is most similar to which of the following revenue models?
A) transaction fee
B) freemium
C) advertising
D) affiliate
B) Freemium
43) Which of the following statements about the online newspaper audience is not true?
A) The online newspaper is one of the most successful of all online media in terms of audience size.
B) Most newspaper readers read the news using a combination of the Web, print and mobile.
C) Over 65% of Internet users read newspaper content online.
D) Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.
B) Most newspaper readers read the news using a combination of the Web, print and mobile.
44) Who was the first major fiction writer to create an e-book-only volume of a new work?
A) Hugh Howey
B) Stephen King
C) Dan Brown
D) Amanda Hocking
B) Stephen King
45) Together Amazon and Apple account for ________ of the e-book market.
A) 50%
B) 75%
C) 85%
D) 90%
C) 85%
46) Around what percentage of Amazon's top 100 selling books are now self-published?
A) 10%
B) 25%
C) 40%
D) 50%
C) 40%
47) In 2016, e-book sales are expected to constitute about ________% of all consumer book sales.
A) 15
B) 25
C) 35
D) 45
B) 25
48) Which of the following was sued by the Justice Department for violating antitrust laws in connection with e-books?
A) Amazon
B) Google
C) Apple
D) Barnes & Noble
C) Apple
49) Over the past five years, book publishing revenues have:
A) decreased slightly.
B) increased steadily.
C) remained stable.
D) decreased sharply.
C) remained stable.
50) In 2014, Amazon engaged in a trade dispute with ________ over the pricing of e-books.
A) Barnes & Noble
B) Penguin Random House
C) Hachette
D) Harper Collins
C) Hachette
52) Zinio is an example of which of the following?
A) interactive book developer
B) magazine aggregator
C) e-reader platform
D) vanity press
B) magazine aggregator
53) The New York Times introduced which of the following revenue models in 2011?
A) paywall
B) metered subscription
C) advertising
D) walled garden
B) metered subscription
54) Which of the following native digital news sites is owned by AOL?
A) Vox
B) Vice
C) Reddit
D) Huffington Post
D) Huffington Post
55) Which of the following is not one of the three business models employed by newspapers between 1995 and 2015?
A) The Print-centric model
B) The Integrated Print/Web
C) The Digital First model
D) The Convergence model
D) The Convergence model
56) Which of the following most accurately describes the resolution of the dispute between Hachette, Simon & Schuster, and Amazon?
A) The dispute remains unresolved.
B) Publishers can set the prices of their books, but Amazon can offer incentives to publishers to reduce prices on selected books and publishers may pay Amazon to list their books.
C) Amazon can determine the prices of books sold on its platform at its sole discretion.
D) Amazon must not sell the books for any lower than the price they are offered by Apple.
B) Publishers can set the prices of their books, but Amazon can offer incentives to publishers to reduce prices on selected books and publishers may pay Amazon to list their books.
57) Which of the following is a news aggregator app that organizes stories in a magazine format, with content drawn from traditional media and social sites, and then reassembled in an easy-to-navigate, personalized format for a mobile touchscreen environment?
A) Reddit
B) Huffington Post
C) Flipboard
D) Buzzfeed
C) Flipboard
58) What percentage of people read newspapers only on a mobile device?
A) 5%
B) 7%
C) 11%
D) 14%
A) 5%
66) Which streaming gaming channel was purchased by Amazon in 2015?
A) Dailymotion
B) YouTube.com
C) Twitch.tv
D) Shield.nvidia.com
C) Twitch.tv
68) ________ is the largest online movie download distributor.
A) Netflix
B) Hulu
C) iTunes
D) Google Play
C) iTunes
69) Which of the following statements about the movie industry is not true?
A) Over 300 million Americans were expected to watch movies online in 2015.
B) Online movie distribution is not dominated by a single distributor.
C) Of the digital formats, the most revenue is generated by subscription streaming.
D) DVD sales make up the largest share of movie revenues.
A) Over 300 million Americans were expected to watch movies online in 2015.
70) Which of the following is not a leading factor in changing the television industry?
A) increasing broadband penetration
B) development of the mobile platform
C) increased popularity of binge watching compared to watching linear TV
D) inability to attract customers to traditional products
D) inability to attract customers to traditional products
71) Which of the following statements about the television industry is not true?
A) Netflix is the leading distributor of streaming TV.
B) The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.
C) Americans spend more time watching television on a computer or mobile device than they do on a traditional television set.
D) Over-the-top entertainment services are a threat to cable television distributors.
B) The current transition to Internet and especially mobile delivery of television is leading to a decline in traditional television viewing.
73) Which of the following is the largest producer of revenues in the entertainment industry?
A) radio
B) television
C) films
D) video games
B) television
74) In 2015, which of the following forms of entertainment produced the least amount of revenue?
A) Radio
B) Music
C) Video games
D) Television
A) Radio
75) In 2016, which of the following comprised the largest segment of the online gaming audience?
A) social gamers
B) mobile gamers
C) casual gamers
D) console gamers
B) mobile gamers
76) House of Cards is an online TV series developed by which of the following?
A) Amazon Studios
B) HBO
C) Netflix
D) Hulu
C) Netflix
77) Which of the following statements about mobile gaming is not true?
A) Mobile games generated an estimated $3 billion in 2015.
B) Mobile games have proven difficult to monetize.
C) Mobile games appeal to a younger demographic than console games.
D) Mobile games are expensive to develop.
D) Mobile games are expensive to develop.
78) Which of the following is not a type of digital gamers?
A) casual gamers
B) local gamers
C) social gamers
D) console gamers
B) local gamers
79) The leading merchants of digital games are Apple's App Store and:
A) Xbox.
B) Twitch.tv.
C) Amazon Digital.
D) the Google Play store.
D) the Google Play store.
80) Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:
A) price discrimination.
B) content convergence.
C) the release window.
D) digital rights management.
C) the release window.
81) Which of the following statements is not true about OTT?
A) To use OTT services, consumers must purchase a bundle of channels.
B) OTT entertainment services are a threat to cable television.
C) OTT refers to the fact that the entertainment service rides "on top" of other network services such as cable TV and telephone service.
D) OTT entertainment services enable binge watching.
A) To use OTT services, consumers must purchase a bundle of channels.
1) Which of the following is not a current trend in online content?
A) Americans continue to spend more on streaming music than downloaded music.
B) Readership of newspapers in print form continues to exceed online readership.
C) E-book sales growth slows.
D) Explosive growth of the mobile platform accelerates the transition to digital content.
B
2) Cord cutters and cord shavers are shrinking the number of pay TV subscribers yearly by approximately:
A) 1%.
B) 4%.
C) 10%.
D) 14%.
B
3) Which of the following U.S. media channels generates the most revenue?
A) broadcast television/pay TV
B) video games
C) newspapers
D) box office movies
A
4) In 2019, the various entertainment industries together accounted for about __% of total media industry revenues, while the print media industries collectively accounted for about ___%.
A) 23, 77
B) 77, 23
C) 89, 11
D) 11, 89
B
5) Which of the following statements about Millennials is not true?
A) Millennials are more likely to have read a book in the past 12 months than older adults.
B) Millennials overwhelmingly prefer e-books to printed books.
C) Almost two-thirds of Millennials view digital videos daily.
D) Millennials are much more to use streaming services such as Netflix, Hulu, and Amazon than older adults.
B
6) In 2020, time spent with digital media in the United States accounted for ___ of total media time spent.
A) 23%
B) 33%
C) 55%
D) 75%
C
7) Which of the following types of online content is consumed by the highest percentage of U.S. Internet users?
A) digital audio
B) video
C) digital games
D) e-books
B
8) All of the following are examples of technology convergence except:
A) the iPad.
B) Amazon Books Publishing.
C) Apple TV.
D) smartphones.
B
9) All of the following are aspects of content convergence except:
A) language.
B) design.
C) production.
D) distribution.
A
10) Which of the following occurs first in the process of content convergence related to books?
A) media integration
B) media migration
C) media transformation
D) media maturity
B
11) Which of the following is not an example of industry structure convergence?
A) Amazon's creation of Amazon Books Publishing
B) Verizon's acquisition of Yahoo
C) AT&T's acquisition of Time Warner
D) Apple's development of the iPad
D
12) Which of the following types of online content is consumed by the lowest percentage of U.S. Internet users?
A) e-books
B) magazines
C) video
D) digital audio
B
13) The merger of media enterprises into powerful, synergistic combinations that can cross-market content on many different platforms is referred to as:
A) aggregation.
B) repackaging.
C) media transformation.
D) industry convergence.
D
14) DRM refers to a combination of ________ for protecting digital content.
A) hardware and software methods
B) technical and legal means
C) user and publisher agreements
D) local and remote policies
B
15) ________ convergence describes the development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.
A) Technological
B) Content
C) Media
D) Industry
A
16) Content convergence describes convergence in the design, production, and ________ of content.
A) sales
B) distribution
C) marketing
D) consumption
B
17) A business model that uses advertising revenue to provide some content for free, combined with an option to obtain additional content for a price is called a(n) ________ model.
A) sales
B) distribution
C) a la carte
D) freemium
D
18) The Covid-19 pandemic has resulted in an increase in advertising revenue for online content providers.
FALSE
19) The amount of time the average American adult spends consuming media is about two-and-a half times the amount of time spent at work.
TRUE
20) The proliferation of mobile devices has led to a decrease in the total amount of time spent with media.
FALSE
21) The video game industry accounts for the second highest percentage of U.S. media revenues.
TRUE
22) The time spent on desktop computers and mobile devices now exceeds time spent in front of the television.
TRUE
23) The a la carte revenue model allows users to pay only for what they use.
TRUE
24) Millennials are the first generation to be born into the digital revolution of the 20th century.
TRUE
25) Revenue generated by online TV and movies is expected to grow by nearly 20% between 2020 and 2022.
TRUE
26) Smartphones are an example of technological convergence.
TRUE
27) Cannibalization is a major challenge facing book publishers.
FALSE
32) Which of the following has not been purchased or invested in by a wealthy individual with ties to the technology industry?
A) Washington Post
B) Time Magazine
C) The Atlantic Magazine
D) The New Yorker
D
33) Which of the following has the highest share of the e-book market?
A) Amazon
B) Apple
C) Google
D) Barnes & Noble
A
34) Which of the following happened during the time period when newspapers used a print-centric business model?
A) Google launched its search engine.
B) Apple introduced the iPhone.
C) Facebook opened to the public.
D) The adoption of smartphones and tablets has grown rapidly.
A
35) ________ were the most troubled segment of the print publishing industry in 2020.
A) Books
B) Magazines
C) Newspapers
D) Periodicals
C
36) Which of the following statements about the newspaper industry is not true?
A) U.S. newspaper revenues totaled about $26 billion in 2019.
B) The newspaper labor force has dropped precipitously since 2006.
C) Social media sites have become a major source of unique visitors to online newspapers.
D) Newspaper circulation revenues have declined dramatically since 2000.
D
37) Which of the following statements about online magazine publishing is not true?
A) The total magazine audience size increased by almost 25% from 2014 to 2019, due entirely to the growth of digital magazines, especially mobile web editions and video content.
B) The majority of magazine revenues derive from subscriptions.
C) Apple+ News is an example of a magazine aggregator.
D) An estimated 225 million people engage with magazine content via print/digital replica editions.
B
39) Which of the following statements about independent bookstores is not true?
A) The growth of national bookstore chains such as Barnes & Noble had a negative impact on independent bookstores.
B) Many independent bookstores have successfully transformed their legacy business models and technology.
C) The fate of independent bookstores remains a major question in the wake of the Covid-19 pandemic.
D) The number of independent bookstores declined by almost 50% between 2009 and 2018.
D
40) Which of the following is not an example of a native digital news site?
A) Huffington Post
B) Buzzfeed
C) Vice
D) USA Today
D
41) Which of the following magazines underwent a digital remaking following the introduction of a metered paywall in 2014?
A) Sports Illustrated
B) The New Yorker
C) Newsweek
D) Time
B
42) Which of the following is the most common model for online newspaper access for U.S. newspapers?
A) totally free
B) most content free, but subscription fee to access premium content
C) paywall
D) metered subscription model
D
43) Which of the following statements about the online newspaper audience is not true?
A) The online newspaper is one of the most successful of all online media in terms of audience size.
B) Online readership of newspapers is growing at more than 30% a year
C) People in the age 18 to 34 age group are more likely to read the news online than older people.
D) Online newspapers reach over 75% of individuals in households earning more than $100,000 a year.
B
44) Who was the first major fiction writer to create an e-book-only volume of a new work?
A) Hugh Howey
B) Stephen King
C) Dan Brown
D) Amanda Hocking
B
45) Which of the following statements about e-books is not true?
A) Most self-published e-books are not counted by the publishing industry reports on e-book sales.
B) Apple is a distant second in the e-book market.
C) E-book sales revenue in 2019 decreased significantly from the previous year.
D) The vast majority of indie authors are unable to make a living solely from e-book sales.
C
47) According to Amazon, around how many indie authors have earned more than $100,000 in royalties from their books?
A) 10
B) 100
C) 1,000
D) 10,000
C
48) ________ was sued by the Justice Department for violating antitrust laws in connection with e-books.
A) Amazon
B) Google
C) Apple
D) Barnes & Noble
C
49) In 2019, book publishing revenues:
A) were flat.
B) increased significantly.
C) experienced a sizeable decrease.
D) increased slightly.
A
50) When was the future of e-books firmly established?
A) in 2000, with the release on Amazon of Stephen King's novella, Riding the Bullet
B) in 2007, with the introduction of Amazon's Kindle
C) in 2009, when Barnes & Noble introduced its Nook e-reader
D) in 2010, when Apple introduced the first iPad
B
51) Which of the following statements about the wholesale and agency models for selling books is not true?
A) In the wholesale model, the retailer decides at what price to sell a book to the consumer.
B) Amazon surprised traditional publishers by selling e-books for below their wholesale cost.
C) Today, each publisher makes an agreement with Amazon about the price of their books.
D) A result of the agency model was that Amazon's prices on e-books declined.
D
52) Zinio is an example of which of the following?
A) interactive book developer
B) magazine aggregator
C) e-reader platform
D) vanity press
B
53) Which of the following is not an advantage that pure digital news sites have over print newspapers?
A) They have a lower cost structure.
B) They can create new workflows and business processes that are timelier and more efficient.
C) They offer higher quality journalism.
D) They can take advantage of newer technologies for producing the news.
C
54) Which of the following native digital news sites was purchased by AOL?
A) Vox
B) Vice
C) Reddit
D) Huffington Post
D
55) The ________ model is not one of the three business models employed by newspapers between 1995 and 2018.
A) Print-centric
B) Integrated Print/Web
C) Digital First
D) Convergence
D
57) Which of the following refers to itself as the front page of the Internet?
A) Reddit
B) Huffington Post
C) Vox
D) Buzzfeed
A
58) According to Pew Research Center, what percentage of newspaper readers often use a desktop or laptop, as opposed to a mobile device, to read the news?
A) 20%
B) 30%
C) 40%
D) 50%
B
59) Major newspapers withdrew from Facebook's Instant Articles program because it resulted in Facebook draining newspaper sites of visitors.
TRUE
60) In the wholesale model of e-book distribution, pricing power is with the publisher.
FALSE
61) Vox is an example of the Digital First business model.
FALSE
66) Which streaming gaming channel was purchased by Amazon in 2015?
A) Dailymotion
B) YouTube Gaming
C) Twitch
D) Mixer
C
67) Which of the following statements about e-sports is not true?
A) Many colleges now to offer scholarships for players on their video game teams.
B) YouTube Gaming accounts for over 80% of the online e-sports viewing in the United States.
C) E-sports tournaments routinely draw an online audience equal to professional football games.
D) The e-sport audience is predominantly composed of males between the ages of 21 and 34.
B
68) ________ is the leading online television and movie distributor.
A) Netflix
B) Hulu
C) iTunes
D) Google Play
A
69) Which of the following statements is not true?
A) iVOD revenues have grown faster than subscription streaming (SVOD) revenues.
B) Surveys indicated that a majority of people are unwilling to pay more than $20 per month for SVOD services.
C) Of all the content industries, thus far, the home entertainment and movie industry has been able to maintain its revenue stream and not be digitally destroyed by new technologies.
D) The movie industry's control of the release window of a movie is a form of price discrimination.
A
70) Which of the following statements about piracy in the movie and television industry is not true?
A) Piracy still remains a threat to the movie and television industry.
B) The most common method of piracy uses bit cyberlockers/file hosting sites.
C) The monetary amount the movie industry loses as a result of piracy is unknown.
D) There has been a significant uptick in traffic to pirate websites during the Covid-19 pandemic.
B
71) Which of the following statements about the home entertainment industry is not true?
A) Over 55% of the U.S. population uses an over-the-top (OTT) subscription service in addition to or instead of cable/satellite TV.
B) Apple TV is the digital media device used by the most people in the United States.
C) Both the television and movie industry share in home entertainment revenues.
D) Neither the television nor film industries have built an industry-wide Internet delivery system.
B
72) Which of the following statements about the music industry is not true?
A) Music industry revenues in 2019 are still only 80% of what they were in 1999.
B) Digital revenues accounted almost 90% of all U.S. music revenues in 2019.
C) More revenue was generated by the sales of digital downloads than physical units in 2019.
D) Streaming music generated about 80% of all digital music sales in 2019.
C
73) In 2019, which of the following was the producer of the largest percentage of revenues in the U.S. entertainment industry?
A) radio
B) television
C) box office movies
D) games
B
74) In 2019, which of the following forms of entertainment produced the smallest percentage of revenue?
A) home entertainment
B) recorded music
C) games
D) television
B
75) In 2020, which of the following comprised the largest segment of the online gaming audience?
A) tablet gamers
B) smartphone gamers
C) PC gamers
D) console gamers
B
76) House of Cards is an online TV series developed by which of the following?
A) Amazon Studios
B) HBO
C) Netflix
D) Hulu
C
77) All of the following are 'live'/on-demand over-the-top (OTT) services except:
A) Sling TV.
B) AT&T TV Now.
C) Netflix.
D) YouTube TV.
C
78) Which of the following is not a type of digital gamer?
A) PC gamers
B) local gamers
C) social gamers
D) MMO gamers
B
79) Which of the following platforms was used by the fewest gamers in 2020?
A) consoles
B) PCs
C) smartphones
D) tablets
D
80) Hollywood's practice of staggering the distribution of movies in different channels, such as box office and DVDs, is referred to as:
A) dynamic pricing.
B) content convergence.
C) the release windows.
D) digital rights management.
C
81) Which of the following statements is not true about over-the-top (OTT) services?
A) To use OTT services, consumers must purchase a bundle of channels.
B) OTT entertainment services are a threat to cable/satellite television delivery systems.
C) OTT services include the ability to download content after purchase or rental, as well as subscription streaming and 'live' TV services.
D) OTT entertainment services enable binge watching.
A
82) Streaming has replaced downloading as the preferred consumer viewing platform for home entertainment content.
TRUE
83) In 2019, digital games generated more than three times the amount of digital music revenues.
TRUE
1.8. 廣告商是依照廣告被點選的次數來計價,而不管曝光次數的多寡。請問這是指何種模式?(單選) 回答錯誤
單選題 (2 分) 0分
A
.
(A) 定時定價
B
.
(B) 關鍵字計費
C
.
(C) 收益定價
D
.
(D) CPC 計價
正確答案: D
2.6. 會隨著捲軸而不斷上下移動的廣告,稱為?(單選)
單選題 (2 分) 2分
A
.
(A) 按鈕廣告
B
.
(B) 橫幅廣告
C
.
(C) 跳出式廣告
D
.
(D) 捲軸廣告
正確答案: D
答案解釋:
3.78) WebMD.com is an example of a:
單選題 (2 分) 2分
A
.
A) general purpose portal.
B
.
B) vertical market portal based on affinity group.
C
.
C) vertical market portal based on focused content.
D
.
D) focused content portal.
正確答案: D
答案解釋:
4.10. 在傳統的文字廣告中加入聲光影音的效果,甚至可透過 Flash 來進行。請問上述是指?(單選)
單選題 (2 分) 2分
A
.
(A) 多媒體廣告
B
.
(B) 電子郵件廣告
C
.
(C) 互動式廣告
D
.
(D) 按鈕廣告
正確答案: A
答案解釋:
5.75) Which of the following is not one of the defining functions of a portal?
單選題 (2 分) 2分
A
.
A) commerce
B
.
B) content
C
.
C) auctions
D
.
D) navigation of the Web
正確答案: C
答案解釋:
6.45) Which of the following types of auctions is perfect for sellers that have many identical items to sell?
單選題 (2 分) 2分
A
.
A) English auctions
B
.
B) Name Your Own Price auctions
C
.
C) Dutch Internet auctions
D
.
D) group buying auctions
正確答案: C
答案解釋:
7.24) Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace."
單選題 (2 分) 2分
A
.
A) social networks
B
.
B) virtual communities
C
.
C) community portals
D
.
D) social forums
正確答案: B
答案解釋:
8.61) ________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.
單選題 (2 分) 2分
A
.
A) Bid manipulation
B
.
B) Shill feedback
C
.
C) Shill bidding
D
.
D) Bid rigging
正確答案: C
答案解釋:
9.1) One of the first online virtual communities, formed in 1985, was:
單選題 (2 分) 2分
A
.
A) The Well.
B
.
B) Myspace.
C
.
C) AOL.
D
.
D) Salon.com.
正確答案: A
答案解釋:
10.76) Which of the following statements best describes the potential impact of network effects with respect to portals?
單選題 (2 分) 2分
A
.
A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market.
B
.
B) The value of the portal to advertisers and consumers increases geometrically as reach increases.
C
.
C) The greater the amount of content provided by a portal, the greater its value to the community.
D
.
D) The greater number of portals available, the greater the potential audience for each.
正確答案: B
答案解釋:
11.42) Which of the following types of auctions "shields the brand" of the seller?
單選題 (2 分) 2分
A
.
A) English auction
B
.
B) Name Your Own Price auction
C
.
C) Dutch Internet auction
D
.
D) penny auction
正確答案: B
答案解釋:
12.18) Which of the following has the highest penetration of social network usage among Internet users? 回答錯誤
單選題 (2 分) 0分
A
.
A) North America
B
.
B) Latin America
C
.
C) Europe
D
.
D) Asia-Pacific
正確答案: B
13.5) A website designed around a community of members who self-identify with a demographic or geographic category is classified as a(n):
單選題 (2 分) 2分
A
.
A) interest-based social network.
B
.
B) affinity community.
C
.
C) practice network.
D
.
D) sponsored community.
正確答案: B
答案解釋:
14.12) Facebook owns which of the following?
單選題 (2 分) 2分
A
.
A) Pinterest
B
.
B) Snapchat
C
.
C) WhatsApp
D
.
D) Tumblr
正確答案: C
答案解釋:
15.1. 廣告商依網路廣告被點選的次數來計價,是指?(單選)
單選題 (2 分) 2分
A
.
(A) Cost Per Impression
B
.
(B) Cost Per Sales
C
.
(C) Cost Per Thousand
D
.
(D) Cost Per Click
正確答案: D
答案解釋:
16.38) ________ is the market leader in C2C auctions.
單選題 (2 分) 2分
A
.
A) Amazon
B
.
B) eBay
C
.
C) Walmart
D
.
D) eBid
正確答案: B
答案解釋:
17.55) One partial solution to high monitoring costs is ________ pricing.
單選題 (2 分) 2分
A
.
A) fixed
B
.
B) dynamic
C
.
C) allocated
D
.
D) distress
正確答案: A
答案解釋:
18.9. 在網路上購買的人數,有多少的百分比是由該廣告連結而來。上述是指網路廣告衡量效益的哪一種?(單選)
單選題 (2 分) 2分
A
.
(A) 點送率
B
.
(B) 點選
C
.
(C) 購買行為
D
.
(D) 網站流量
正確答案: C
答案解釋:
19.2) The technology used by early online communities was limited to mostly:
單選題 (2 分) 2分
A
.
A) instant messaging.
B
.
B) FTP.
C
.
C) e-mail.
D
.
D) bulletin boards.
正確答案: D
答案解釋:
20.60) ________ refers to the feeling of having been too cheap in bidding and failing to win an auction.
單選題 (2 分) 2分
A
.
A) Winner's lament
B
.
B) Winner's regret
C
.
C) Loser's lament
D
.
D) Loser’s regret
正確答案: C
答案解釋:
21.25) A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared interest.
單選題 (2 分) 2分
A
.
A) practice network
B
.
B) general community
C
.
C) affinity community
D
.
D) interest-based social network
正確答案: A
答案解釋:
22.44) ________ occurs when sellers agree informally or formally to set floor prices below which they will not sell on auction items.
單選題 (2 分) 2分
A
.
A) Discriminatory pricing
B
.
B) Price matching
C
.
C) Bid rigging
D
.
D) Distress pricing
正確答案: B
答案解釋:
23.51) ________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.
單選題 (2 分) 2分
A
.
A) Group buying
B
.
B) Winner's regret
C
.
C) Herd behavior
D
.
D) Bid rigging
正確答案: C
答案解釋:
24.11) Each of the following is one of the top seven social network sites in the United States, in terms of monthly unique visitors, except:
單選題 (2 分) 2分
A
.
A) Tumblr.
B
.
B) MeWe.
C
.
C) Instagram.
D
.
D) Pinterest.
正確答案: B
答案解釋:
25.50) The profit a seller makes at auction is a function of all of the following except:
單選題 (2 分) 2分
A
.
A) initial pricing.
B
.
B) auction length.
C
.
C) the number of units for auction.
D
.
D) watch lists.
正確答案: D
答案解釋:
26.7. 陽光基金會透過網路,在 2007 年自行拍攝一支傷友「最簡單的心願和你一樣每天工作」的廣告,運用網路傳播的方式來打廣告。廣告推出之後,一個月平均每天到超過20 通的關心電話,甚至還有台商跨海要提供援助。請問上述是屬於網路廣告的何種特性?(單選) 回答錯誤
單選題 (2 分) 0分
A
.
(A) 區隔市場
B
.
(B) 即時更新
C
.
(C) 自行製作
D
.
(D) 提高互動
正確答案: C
27.79) Which of the following is not one of the typical portal revenue sources?
單選題 (2 分) 2分
A
.
A) commissions on sales
B
.
B) subscription fees
C
.
C) tenancy deals
D
.
D) referral fees
正確答案: D
答案解釋:
28.20) Which of the following social networks provides an open-source alternative to Twitter?
單選題 (2 分) 2分
A
.
A) MeWe
B
.
B) Mastadon
C
.
C) Tagged
D
.
D) Nextdoor
正確答案: B
答案解釋:
29.6) Instagram is an example of a(n) _______-based social network/community.
單選題 (2 分) 2分
A
.
A) interest
B
.
B) affinity
C
.
C) general
D
.
D) practice
正確答案: C
答案解釋:
30.3) Which of the following is a community of members who self-identify with a demographic or geographic category? 回答錯誤
單選題 (2 分) 0分
A
.
A) practice network
B
.
B) sponsored community
C
.
C) affinity community
D
.
D) interest-based social network
正確答案: C
31.2. 通常是以電子郵件行銷為基礎,在電子郵件內容最後加上「與好朋友一起分享」、「轉寄給親朋好友」等字眼的按鈕,只要填上 e-mail 地址,按下按鈕便可將信件轉寄出去,這是指?(單選)
單選題 (2 分) 2分
A
.
(A) 許可式行銷
B
.
(B) 病毒式行銷
C
.
(C) 聯盟網站行銷
D
.
(D) 部落格行銷
正確答案: B
答案解釋:
32.17) Which of the following is an example of a practice network?
單選題 (2 分) 2分
A
.
A) PredictWallstreet
B
.
B) Instagram
C
.
C) DebatePolitics
D
.
D) Doximity
正確答案: D
答案解釋:
33.66) Keeping bid increments low decreases the number of bidders and lowers the frequency of their bids.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
34.67) Closed bidding offers the advantage of herd effects.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
35.56) The term ________ refer(s) to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.
是非題 (2 分) 2分
A
.
A) siphoning
B
.
B) herd behavior
C
.
C) network effects
D
.
D) channel expansion
正確答案: C
答案解釋:
36.64) Priceline's auctions utilize fixed pricing.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
37.28) More than three-quarters of Internet users worldwide participate in social networks.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
38.29) Facebook’s current user growth is being driven by growth in the number of users in the United States.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
39.69) Consumers in auctions are driven solely by value maximization.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
40.80) The original portals in the early days of e-commerce were search engines.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
41.30) A community site created by a corporation is called a sponsored community site.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
42.58) The time spent watching and reviewing auction bids is a part of ________ costs.
是非題 (2 分) 2分
A
.
A) pricing
B
.
B) monitoring
C
.
C) delayed consumption
D
.
D) fulfillment
正確答案: B
答案解釋:
43.81) The value of portals to advertisers and content owners is primarily a function of the size of the audience the portal reaches, and the length of time visitors stay on the site.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
44.57) A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.
是非題 (2 分) 2分
A
.
A) bidding fee auction
B
.
B) channel manager
C
.
C) watch list
D
.
D) rating system
正確答案: C
答案解釋:
45.63) Penny auctions don't require money to bid.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
46.68) Auction prices are often higher than prices in fixed priced markets.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
47.65) In a Dutch Internet auction, a single seller puts up multiple items for bidding.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
48.62) In B2C auctions, consumers control assets and use dynamic pricing to establish the price.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
49.83) Portals are not immune to network effects.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
50.82) Vertical content portals and affinity group portals tend to be more well-known brands than general-purpose portals.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
One of the first online virtual communities was:
A) The Well
B) Myspace
C) AOL
D) Salon.com
A
The technology used by early online communities was limited to mostly:
A) instant messaging.
B) FTP.
C) e-mail.
D) bulletin boards.
D
Which of the following is a community of members who self-identify with a demographic or geographic category?
A) practice network
B) sponsored community
C) affinity community
D) interest-based social network
C
PredictWallStreet is an example of a(n):
A) interest-based social network.
B) affinity community.
C) sponsored community.
D) practice network.
A
A website designed around a community of members who self-identify with a demographic or geographic category is classified as a(n):
A) interest-based social network.
B) affinity community.
C) practice network.
D) sponsored community.
B
Instagram is an example of a(n):
A) interest-based social network.
B) affinity community/social network.
C) general community/social network.
D) practice network
C
Which social network functionality allows users to view a list of updates from friends as well as advertisements and notifications in chronological order?
A) message board
B) timeline
C) friends' network
D) newsfeed
D
In 2018, around what percentage of the total United States population used social networks?
A) 50%
B) 60%
C) 70%
D) 80%
C
Which of the following is the second leading social network in the United States in terms of monthly unique visitors?
A) Twitter
B) LinkedIn
C) Instagram
D) Pinterest
B
Which of the following is a leading social network in Germany?
A) Xing
B) Tuenti
C) Orkut
D) Mixi
A
Each of the following is one of the top seven social network sites in the United States, in terms of monthly unique visitors, except:
A) Tumblr.
B) Myspace.
C) Instagram.
D) Pinterest.
B
Facebook owns which of the following?
A) Pinterest
B) Snapchat
C) WhatsApp
D) Tumblr
C
In 2017, Fortune 500 companies used ________ more than Facebook.
A) Twitter
B) Tumblr
C) LinkedIn
D) Pinterest
C
On which of the following do users spent the least amount of time per day?
A) Snapchat
B) Tumblr
C) LinkedIn
D) Pinterest
C
When did the first online communities form?
A) the 1970s
B) the 1980s
C) the 1990s
D) the 2000s
B
BlackPlanet is an example of a(n) ________ social network.
A) practice-based
B) interest-based
C) affinity-based
D) general
C
Which of the following is an example of a practice network?
A) PredictWallstreet
B) Instagram
C) DebatePolitics
D) Doximity
D
Which of the following has the highest penetration of social network usage among the general population?
A) North America
B) Latin America
C) Europe
D) Asia-Pacific
A
In 2018, which age group had the fastest growing rate of Facebook usage?
A) 12-34
B) 35-45
C) 46-65
D) adults over 65
D
Which of the following early leaders in social networking has been reinvented as a music-oriented social network?
A) Vevo
B) Myspace
C) Polyvore
D) Tumblr
B
Which of the following now owns LinkedIn?
A) Facebook
B) Google
C) Microsoft
D) Verizon
C
Which of the following companies purchased Instagram?
A) Google
B) Apple
C) Facebook
D) Microsoft
C
Which of the following statements about Instagram is not true?
A) Instagram trails only Facebook in U.S. ad revenue.
B) Instagram is a social network that focuses on video and photo sharing.
C) Instagram is growing more quickly than Facebook.
D) Instagram users spend more time on Instagram than Facebook users spend on Facebook.
D
Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in
cyberspace."
A) social networks
B) virtual communities
C) community portals
D) social forums
B
A(n) ________ offers members focused discussion groups, help, information, and knowledge
related to an area of shared interest.
A) practice network
B) general community
C) affinity community
D) interest-based social network
A
The amount of time visitors spend on a site is a measure of:
A) reach.
B) loyalty.
C) conversation.
D) engagement.
D
More than two-thirds of Internet users worldwide participate in social networks.
T/F
True
Facebook is the fastest growing of the most popular social networks.
T/F
False
A community site created by a corporation is called a sponsored community site.
T/F
True
Describe the evolution of social networks from their earliest appearance.
The earliest social networks, in the mid-1980s and 1990s were community bulletin
boards, or discussion groups, like The Well. In the early 2000s, technology changed, bringing in
blogging, photo sharing features. As the Internet user population expanded, more and more
socially oriented sites appeared, including Facebook, allowing users to share content directly
with each other. More recently, in the late 2000s and early 2010s, as the Internet became
available to browse (and post to) via mobile devices, more and more photo and video sharing
social networks have emerged, such as Pinterest and Instagram. A new crop of social networks
launched since 2008 (i.e., Snapchat and WhatsApp) focus on messaging.
Describe four shared characteristics of social networks
Social networks involve (1) a group of people, (2) shared social interactions, (3) common ties among members, and (4) people who share an area for some period of time.
If a large number of Internet users set Facebook as their primary destination on their web browser, should Facebook be considered a portal?
Student answers will vary but should include reference to social networks broadening
their offerings to become more portal-like. An example answer is: While Facebook can be a
primary destination, the goal of Facebook is to keep users occupied and communicating with
each other. One of the main goals of a portal is to provide avenues to third party content and
other areas of the Internet. Although social networks are aiming to include portal-like features, to
keep and grow audiences, the primary goals of a portal currently don't include social sharing.
What business models do social networks use?
The most popular general social networks, such as Facebook, have adopted an
advertising model, and make money from ads displayed to users. There are number for profit and
non-profit networks that stay afloat from user donations, member dues, premium services, or
through sponsorship financing.
Discuss the impact social networks have had on how businesses operate, communicate, and serve their customers.
Social networks have had an important impact on how businesses operate,
communicate, and serve their customers. The most visible business firm use of social networks is
as a marketing and branding tool. The most popular social network tool for large corporate
businesses is LinkedIn, with 98% of the Fortune 500 using LinkedIn. Twitter is the second most
popular, used by 88%, while 85% use Facebook. A less visible marketing use of networks is as a
powerful listening tool which has strengthened the role of customers and customer feedback
systems. Social networks are where corporate brands and reputations are formed, and firms today
take very seriously the topic of "online reputation," as evidenced by social network posts,
commentary, chat sessions, and Likes. In this sense, social network sites have become an
extension of corporate customer relationship management systems and extend existing market
research programs. Beyond branding, social network sites are being used increasingly as
advertising platforms to contact a somewhat younger audience than websites and e-mail, and as
customers increasingly shift their eyeballs to social networks. Rosetta Stone, for instance, uses its
Facebook page to display videos of its learning technology, encourage discussions and reviews,
and post changes in its learning tools. Public social networks like Facebook have not been used
extensively in firms as collaboration tools thus far. However, in 2016, Facebook launched its
Workplace app, designed to spur collaboration and networking inside large firms. Over 14,000 organizations worldwide use this relatively new app.
________ of procurement officers use auctions to purchase goods.
A) Approximately 80%
B) Less than a quarter
C) Over one third
D) Approximately 25%
C
All of the following are benefits of auctions except:
A) more efficient price discovery.
B) lower transaction costs.
C) decreased price transparency.
D) increased market efficiency.
C
________ is the market leader in C2C auctions.
A) Amazon
B) eBay
C) uBid
D) eBid
B
Which of the following is not a risk or cost of Internet auctions?
A) delayed consumption costs
B) equipment costs
C) price transparency
D) trust risks
C
The fact that participating in an Internet auction means that you will need to purchase a
computer, learn to use it, and pay for Internet access, is an example of ________ costs.
A) equipment
B) fulfillment
C) delayed consumption
D) monitoring
A
All of the following are solutions to the problem of high monitoring costs except:
A) seller rating systems.
B) watch lists.
C) proxy bidding.
D) fixed pricing.
A
Which of the following types of auctions "shields the brand" of the seller?
A) English auction
B) Name Your Own Price auction
C) Dutch auction
D) penny auction
B
Which of the following allows the consumer to enter a maximum price and the auction
software automatically places incremental bids, up to that maximum price, as their original bid is
surpassed?
A) watch lists
B) proxy bidding
C) sealed bidding
D) price matching
B
________ occurs when sellers agree informally or formally to set floor prices below which
they will not sell on auction items.
A) Discriminatory pricing
B) Price matching
C) Bid rigging
D) Distress pricing
B
Which of the following types of auctions is perfect for sellers that have many identical items
to sell?
A) English auctions
B) Name Your Own Price auctions
C) Dutch Internet auctions
D) group buying auctions
C
All of the following types of auctions involve single units except:
A) an English auction.
B) a Dutch Internet auction.
C) a Name Your Own Price auction.
D) a penny auction.
B
A(n) ________, in which the highest bidder wins, is the most common form of auction.
A) Dutch Internet auction
B) Japanese auction
C) English auction
D) reverse auction
C
Priceline is an example of a(n):
A) English auction.
B) Dutch auction.
C) penny auction.
D) Name Your Own Price auction
D
Which of the following is not one of the top factors a business should consider when
planning an Internet auction?
A) type of product
B) type of auction
C) location of auction
D) bid increments
C
The profit a seller makes at auction is a function of all of the following except:
A) initial pricing.
B) auction length.
C) the number of units for auction.
D) watch lists
D
________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.
A) Group buying
B) Winner's regret
C) Herd behavior
D) Bid rigging
C
Which of the following involves the feeling after winning an auction that you paid too much for an item?
A) herd behavior
B) winner's regret
C) seller's lament
D) loser's lament
B
Which of the following involves e-mailing another seller's bidders and offering the same
product for less?
A) transaction interception
B) bid siphoning
C) shill bidding
D) persistent bidding
B
Threatening negative feedback in return for a benefit is an example of:
A) feedback extortion.
B) offensive shill feedback.
C) defensive shill feedback.
D) sending spam.
A
One partial solution to high monitoring costs is ________ pricing.
A) fixed
B) dynamic
C) allocated
D) distress
A
The term ________ refers to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.
A) siphoning
B) herd behavior
C) network effects
D) channel expansion
C
A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.
A) bidding fee auction
B) channel manager
C) watch list
D) rating system
C
The time spent watching and reviewing auction bids is a part of ________ costs.
A) pricing
B) monitoring
C) delayed consumption
D) fulfillment
B
E-mailing buyers to warn them away from a seller is a type of auction fraud known as:
A) transaction interference.
B) bid siphoning.
C) bid rigging.
D) shill bidding.
A
________ refers to the feeling of having been too cheap in bidding and failing to win an auction.
A) Winner's lament
B) Winner's regret
C) Loser's lament
D) Loser's regret
C
________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.
A) Bid manipulation
B) Shill feedback
C) Shill bidding
D) Bid rigging
C
In B2C auctions, consumers control assets and use dynamic pricing to establish the price.
False
Penny auctions don't require money to bid.
T/F
False
Priceline's auctions utilize fixed pricing.
T/F
True
In a Dutch Internet auction, a single seller puts up multiple items for bidding.
T/F
True
Keeping bid increments low decreases the number of bidders and lowers the frequency of their bids.
T/F
False
Closed bidding offers the advantage of herd effects.
T/F
False
Auction prices are often higher than prices in fixed priced markets.
T/F
True
Consumers in auctions are driven solely by value maximization.
T/F
False
Identify and describe the main types of portals.
There are two primary types of portals: general purpose and vertical market. General
purpose portals attempt to attract a very large general audience and then retain the audience on-
site by providing in-depth vertical content channels. Vertical market portals (sometimes also
referred to as destination sites or vortals) attempt to attract highly focused, loyal audiences with a
deep interest either in community or specialized content — from sports to the weather. In
addition to their focused content, vertical market portals have recently begun adding many of the
features found in general purpose portals
Describe the four major Internet auction types discussed in the chapter and how they function.
The four major types of Internet auctions are English, Dutch Internet, Name Your Own Price, and penny (bidding fee) auctions.
In an English auction, a single item is up for sale from a single seller. Multiple buyers bid against
one another within a specific time frame. The highest bidder wins the object, as long as the high
bid has exceeded the reserve bid set by the seller, below which she refuses to sell.
In Dutch Internet auctions, sellers with many identical items to sell list a minimum price or starting bid and buyers indicate both a bid price and a quantity desired. All winning bidders pay the lowest winning bid that clears the available quantity. Those with the highest bid are assured of receiving the quantity they desire, but only pay the amount of the lowest successful bid. This
is referred to as a uniform pricing rule.
In Name Your Own Price or reverse auctions, buyers specify the price they are willing to pay for an item and multiple sellers bid for their business. This is one example of discriminatory pricing in which winners may pay different amounts for the same product or service depending upon how much they have bid.
In a penny (bidding fee auction), you typically must pay the penny auction site for bids ahead of time, typically 50 cents to $1 dollar, usually in packs costing $25-$50. Once you have purchased the bids, you can use them to bid on items listed by the penny auction site (unlike traditional auctions, items are owned by the site, not third parties). Items typically start at or near $0 and
each bid raises the price by a fixed amount, usually just a penny. Auctions are timed, and when the time runs out, the last and highest bidder wins the item. Although the price of the item itself may not be that high, the successful bidder will typically have spent much more than that. Unlike a traditional auction, it costs money to bid and that money is gone even if the bidder does not win the auction. The bidder's cumulative cost of bidding must be added to the final price of a successful bid to determine the true cost of the item.
What are the benefits of Internet auctions to sellers, buyers, and market makers in an auction?
The general benefits of auctions to sellers and buyers are liquidity, price discovery, price transparency, market efficiency, lowered transaction costs, consumer aggregation, and network effects.
Sellers and buyers are connected in a global marketplace where even difficult to price items can
be competitively priced based on supply and demand. Everyone in the world can see the asking and bidding prices for items, although prices can vary from auction site to auction site. Buyers are offered access to a selection of goods that would be impossible to access physically. Buyers and sellers benefit by the reduced costs of selling and purchasing goods compared to the physical marketplace. A large number of consumers who are motivated to buy are amassed in one marketplace, which is a great convenience to the seller. Network effects are achieved because the larger an auction site becomes in both the numbers of users and products, and ultimately increasing the value of the marketplace.
What are the costs and risks for buyers at an auction, and how have auction sites sought to reduce these risks?
The costs for buyers when they participate in an auction are delayed consumption, monitoring costs, equipment costs, trust risks, and fulfillment costs. Delayed consumption occurs because auctions can go on for days and the product must then be shipped to the buyer. Buyers will typically want to pay less for an item for which they cannot receive immediate gratification. Buyers must also spend time monitoring the bidding, returning to the site frequently to see if they need to raise their bid. They must also purchase, or have already purchased, computer systems and Internet service, and learned how to operate these systems. Since buyers must pay for packing, shipping, and insurance, they will factor these fulfillment costs into their bid price.
Consumers also face an increased risk of experiencing a loss because online auctions are a major source of Internet fraud. Auction sites have sought to reduce these trust risks through various methods including rating systems, watch lists, and proxy bidding. Rating systems are designed so that previous customers can evaluate sellers based upon their experience with them. These evaluations are posted on the site for other buyers to see. Watch lists allow buyers to monitor
specific auctions as they proceed over several days and only pay close attention in the last few minutes of bidding. In proxy bidding systems, buyers can enter the maximum price they are willing to pay, and the auction software will automatically place incremental bids as their original bid is surpassed. In addition, one partial solution to high monitoring costs is, ironically, fixed pricing. At eBay, consumers can reduce the cost of monitoring and waiting for auctions to end by simply clicking on the "Buy It Now!" button and paying a premium price.
Which of the following purchased Yahoo?
A) AT&T
B) Microsoft
C) AOL
D) Verizon
D
To address the falling price of display ads and declining user engagement, Yahoo acquired all of the following except:
A) Tumblr.
B) Flickr.
C) Aviate.
D) Instagram
D
Which of the following is not one of the defining functions of a portal?
A) commerce
B) content
C) auctions
D) navigation of the Web
C
Which of the following statements best describes the potential impact of network effects with respect to portals?
A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market.
B) The value of the portal to advertisers and consumers increases geometrically as reach increases.
C) The greater the amount of content provided by a portal, the greater its value to the community.
D) The greater number of portals available, the greater the potential audience for each.
B
After Google, the next portal/search engine site with the most unique visitors is:
A) Yahoo.
B) Microsoft.
C) AOL.
D) Facebook
A
WebMD.com is an example of a:
A) general purpose portal.
B) vertical market portal based on affinity group.
C) vertical market portal based on focused content.
D) focused content portal.
D
Facebook was the leader in U.S. ad spending revenues on social networks in 2018. What company earned the second most amount of ad spending revenue?
A) Snapchat
B) Instagram
C) Pinterest
D) Twitter
B
Which of the following is not one of the typical portal revenue sources?
A) commissions on sales
B) subscription fees
C) tenancy deals
D) referral fees
D
The original portals in the early days of e-commerce were search engines.
T/F
True
The value of portals to advertisers and content owners is primarily a function of the size of the audience the portal reaches, and the length of time visitors stay on the site.
T/F
True
Vertical content portals and affinity group portals tend to be more well-known brands than general-purpose portals
False
Portals are not immune to network effects.
False
The value of portals to advertisers and content owners is primarily a function of the size of the audience the portal reaches, and the length of time visitors stay on the site
True
Closed bidding offers the advantage of herd effects
False
Which of the following statements best describes the potential impact of network effects with respect to portals
The value of the portal to advertisers and consumers increases geometrically as reach increases
Which of the following involves emailing another sellers bidders and offering the same product for less
Bid siphoning
Refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item
Shill bidding
Which of the following is not one of the defining functions of a portal
Auctions
Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to "cultural aggregations that emerge when enough people bump into each other often enough in cyberspace."
virtual communities
One of the first online virtual communities was:
well
One partial solution to high monitoring cost is
Fixed pricing
when did the first online communities form
1980s
1) One of the first online virtual communities, formed in 1985, was:
A) The Well.
B) Myspace.
C) AOL.
D) Salon.com.
A
2) The technology used by early online communities was limited to mostly:
A) instant messaging.
B) FTP.
C) e-mail.
D) bulletin boards.
D
3) Which of the following is a community of members who self-identify with a demographic or geographic category?
A) practice network
B) sponsored community
C) affinity community
D) interest-based social network
C
4) PredictWallStreet is an example of a(n):
A) interest-based social network.
B) affinity community.
C) sponsored community.
D) practice network.
A
6) Instagram is an example of a(n) _______-based social network/community.
A) interest
B) affinity
C) general
D) practice
C
7) Which social network functionality allows users to view a list of updates from friends as well as advertisements and notifications in chronological order?
A) message board
B) timeline
C) friends' network
D) newsfeed
D
8) In 2020, around what percentage of the total U.S. population uses social networks?
A) 53%
B) 63%
C) 73%
D) 83%
B
9) Which of the following is the second leading social network in the United States in terms of monthly unique visitors?
A) Twitter
B) LinkedIn
C) Instagram
D) Pinterest
C
10) Which of the following is a leading social network in Germany?
A) Xing
B) Tuenti
C) Orkut
D) Mixi
A
11) Each of the following is one of the top seven social network sites in the United States, in terms of monthly unique visitors, except:
A) Tumblr.
B) MeWe.
C) Instagram.
D) Pinterest.
B
12) Facebook owns which of the following?
A) Pinterest
B) Snapchat
C) WhatsApp
D) Tumblr
C
13) A survey of Fortune 500 companies found that 98% of those companies used:
A) Twitter.
B) Facebook.
C) LinkedIn.
D) Instagram.
C
14) On which of the following do users spent the least amount of time per month?
A) Snapchat
B) Tumblr
C) LinkedIn
D) Pinterest
C
15) When did the first online communities form?
A) the 1970s
B) the 1980s
C) the 1990s
D) the 2000s
B
16) BlackPlanet is an example of a(n) ________ social network.
A) practice-based
B) interest-based
C) affinity-based
D) general
C
17) Which of the following is an example of a practice network?
A) PredictWallstreet
B) Instagram
C) DebatePolitics
D) Doximity
D
18) Which of the following has the highest penetration of social network usage among Internet users?
A) North America
B) Latin America
C) Europe
D) Asia-Pacific
B
19) Which age group has the fastest growing rate of Facebook usage?
A) 12-34
B) 35-45
C) 46-65
D) adults over 65
D
20) Which of the following social networks provides an open-source alternative to Twitter?
A) MeWe
B) Mastadon
C) Tagged
D) Nextdoor
B
21) Which of the following owns LinkedIn?
A) Facebook
B) Google
C) Microsoft
D) Verizon
C
22) Which of the following companies purchased Instagram?
A) Google
B) Apple
C) Facebook
D) Microsoft
C
23) Which of the following statements about Instagram is not true?
A) Instagram trails only Facebook in U.S. ad revenue.
B) Instagram is a social network that focuses on video and photo sharing.
C) Instagram is growing more quickly than Facebook.
D) Instagram users spend more time on Instagram than Facebook users spend on Facebook.
D
24) Howard Rheingold, one of The Well's early participants, coined the term ________ to refer to 'cultural aggregations that emerge when enough people bump into each other often enough in cyberspace.'
A) social networks
B) virtual communities
C) community portals
D) social forums
B
25) A(n) ________ offers members focused discussion groups, help, information, and knowledge related to an area of shared interest.
A) practice network
B) general community
C) affinity community
D) interest-based social network
A
26) The amount of time visitors spend on a site is a measure of:
A) reach.
B) loyalty.
C) conversation.
D) engagement.
D
27) Facebook was the leader in U.S. ad spending revenues on social networks in 2019. What company earned the second most amount of ad spending revenue?
A) Snapchat
B) Instagram
C) Pinterest
D) Twitter
B
28) More than three-quarters of Internet users worldwide participate in social networks.
TRUE
29) Facebook's current user growth is being driven by growth in the number of users in the United States.
FALSE
30) A community site created by a corporation is called a sponsored community site.
TRUE
36) Which of the following statements about auctions is not true?
A) Most of the listings on eBay today use auction pricing.
B) The popularity of online auctions has significantly declined.
C) Online auctions were among the most successful early business models in retail and B2B e-commerce.
D) The marketplace for online auctions is highly concentrated.
A
37) All of the following are benefits of auctions except:
A) more efficient price discovery.
B) lower transaction costs.
C) decreased price transparency.
D) increased market efficiency.
C
38) ________ is the market leader in C2C auctions.
A) Amazon
B) eBay
C) Walmart
D) eBid
B
39) Which of the following is not a risk or cost of Internet auctions?
A) delayed consumption costs
B) equipment costs
C) price transparency
D) trust risks
C
40) The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ________ costs.
A) equipment
B) fulfillment
C) delayed consumption
D) monitoring
A
41) All of the following are solutions to the problem of high monitoring costs except:
A) seller rating systems.
B) watch lists.
C) proxy bidding.
D) fixed pricing.
A
42) Which of the following types of auctions 'shields the brand' of the seller?
A) English auction
B) Name Your Own Price auction
C) Dutch Internet auction
D) penny auction
B
43) Which of the following allows the consumer to enter a maximum price and the auction software automatically places incremental bids, up to that maximum price, as their original bid is surpassed?
A) watch lists
B) proxy bidding
C) sealed bidding
D) price matching
B
44) ________ occurs when sellers agree informally or formally to set floor prices below which they will not sell on auction items.
A) Discriminatory pricing
B) Price matching
C) Bid rigging
D) Distress pricing
B
45) Which of the following types of auctions is perfect for sellers that have many identical items to sell?
A) English auctions
B) Name Your Own Price auctions
C) Dutch Internet auctions
D) group buying auctions
C
46) All of the following types of auctions involve single units except:
A) an English auction.
B) a Dutch Internet auction.
C) a Name Your Own Price auction.
D) a penny auction.
B
47) A(n) ________, in which the highest bidder wins, is the most common form of auction.
A) Dutch Internet auction
B) Japanese auction
C) English auction
D) reverse auction
C
48) Priceline is an example of a(n):
A) English auction.
B) Dutch Internet auction.
C) penny auction.
D) Name Your Own Price auction.
D
49) Which of the following is not one of the top factors a business should consider when planning an Internet auction?
A) type of product
B) type of auction
C) location of auction
D) bid increments
C
50) The profit a seller makes at auction is a function of all of the following except:
A) initial pricing.
B) auction length.
C) the number of units for auction.
D) watch lists.
D
51) ________ is the tendency to gravitate toward, and bid for, auction listings with one or more existing bids.
A) Group buying
B) Winner's regret
C) Herd behavior
D) Bid rigging
C
52) Which of the following involves the feeling after winning an auction that you paid too much for an item?
A) herd behavior
B) winner's regret
C) seller's lament
D) loser's lament
B
53) Which of the following involves e-mailing another seller's bidders and offering the same product for less?
A) transaction interception
B) bid siphoning
C) shill bidding
D) persistent bidding
B
54) Threatening negative feedback in return for a benefit is an example of:
A) feedback extortion.
B) offensive shill feedback.
C) defensive shill feedback.
D) sending spam.
A
55) One partial solution to high monitoring costs is ________ pricing.
A) fixed
B) dynamic
C) allocated
D) distress
A
56) The term ________ refer(s) to the advantages conferred as an auction site becomes larger in terms of visitors and products for sale.
A) siphoning
B) herd behavior
C) network effects
D) channel expansion
C
57) A ________ permits the consumer to monitor specific auctions of interest, requiring the consumer to pay close attention only in the last few minutes of bidding.
A) bidding fee auction
B) channel manager
C) watch list
D) rating system
C
58) The time spent watching and reviewing auction bids is a part of ________ costs.
A) pricing
B) monitoring
C) delayed consumption
D) fulfillment
B
59) E-mailing buyers to warn them away from a seller is a type of auction fraud known as:
A) transaction interference.
B) bid siphoning.
C) bid rigging.
D) shill bidding.
A
60) ________ refers to the feeling of having been too cheap in bidding and failing to win an auction.
A) Winner's lament
B) Winner's regret
C) Loser's lament
D) Loser's regret
C
61) ________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.
A) Bid manipulation
B) Shill feedback
C) Shill bidding
D) Bid rigging
C
62) In B2C auctions, consumers control assets and use dynamic pricing to establish the price.
FALSE
63) Penny auctions don't require money to bid.
FALSE
64) Priceline's auctions utilize fixed pricing.
TRUE
65) In a Dutch Internet auction, a single seller puts up multiple items for bidding.
TRUE
66) Keeping bid increments low decreases the number of bidders and lowers the frequency of their bids.
FALSE
67) Closed bidding offers the advantage of herd effects.
FALSE
68) Auction prices are often higher than prices in fixed priced markets.
TRUE
69) Consumers in auctions are driven solely by value maximization.
FALSE
73) Which of the following owns Yahoo?
A) AT&T
B) Microsoft
C) AOL
D) Verizon Media
D
74) To address the falling price of display ads and declining user engagement, Yahoo acquired all of the following except:
A) Tumblr.
B) Flickr.
C) Aviate.
D) Instagram.
D
75) Which of the following is not one of the defining functions of a portal?
A) commerce
B) content
C) auctions
D) navigation of the Web
C
76) Which of the following statements best describes the potential impact of network effects with respect to portals?
A) Specialized vertical market portals attract only a small percentage of the audience, while a few large megaportals garner most of the market.
B) The value of the portal to advertisers and consumers increases geometrically as reach increases.
C) The greater the amount of content provided by a portal, the greater its value to the community.
D) The greater number of portals available, the greater the potential audience for each.
B
77) After Google, the portal/search engine site with the most unique visitors is:
A) Yahoo.
B) Microsoft.
C) Verizon Media.
D) Facebook.
B
78) WebMD.com is an example of a:
A) general purpose portal.
B) vertical market portal based on affinity group.
C) vertical market portal based on focused content.
D) focused content portal.
D
79) Which of the following is not one of the typical portal revenue sources?
A) commissions on sales
B) subscription fees
C) tenancy deals
D) referral fees
D
80) The original portals in the early days of e-commerce were search engines.
TRUE
81) The value of portals to advertisers and content owners is primarily a function of the size of the audience the portal reaches, and the length of time visitors stay on the site.
TRUE
82) Vertical content portals and affinity group portals tend to be more well-known brands than general-purpose portals.
FALSE
83) Portals are not immune to network effects.
FALSE
1.1. 透過網路讓使用者彼此進行資源交換,是指下列何者概念?(單選)
單選題 (2 分) 2分
A
.
(A) 協同交換
B
.
(B) 協同設計
C
.
(C) 協同商務
D
.
(D) 協同消費
正確答案: D
答案解釋:
2.1) Analysts predict that B2B e-commerce in the United States will grow to approximately ________ by 2024.
單選題 (2 分) 2分
A
.
A) $9.8 billion
B
.
B) $98 billion
C
.
C) $980 billion
D
.
D) $9.8 trillion
正確答案: D
答案解釋:
3.49) The term BYOD refers to employees:
單選題 (2 分) 2分
A
.
A) working from home.
B
.
B) being allowed or encouraged to use their own mobile devices and laptops.
C
.
C) using mobile devices for work.
D
.
D) bringing work devices to the home.
正確答案: B
答案解釋:
4.40) Which of the following is a transaction database that operates on a distributed P2P network that connects all participant members in a single database and is highly secure, reliable, resilient, and inexpensive?
單選題 (2 分) 2分
A
.
A) SCM system
B
.
B) blockchain
C
.
C) EDI
D
.
D) cloud-based B2B system
正確答案: B
答案解釋:
5.61) Which of the following primarily involve long-term sourcing?
單選題 (2 分) 2分
A
.
A) e-distributors and exchanges
B
.
B) e-distributors and industry consortia
C
.
C) e-procurement Net marketplaces and exchanges
D
.
D) e-procurement Net marketplaces and industry consortia
正確答案: D
答案解釋:
6.62) An ________ provides an online catalog that represents the products of thousands of direct manufacturers.
單選題 (2 分) 2分
A
.
A) e-distributor
B
.
B) e-procurement company
C
.
C) exchange
D
.
D) industry consortium
正確答案: A
答案解釋:
7.37) Which of the following is a method of inventory cost management that seeks to eliminate excess inventory?
單選題 (2 分) 2分
A
.
A) lean production
B
.
B) sustainable production
C
.
C) just-in-time production
D
.
D) supply chain simplification
正確答案: C
答案解釋:
8.4) Which of the following refers to the links that connect business firms with one another to coordinate production?
單選題 (2 分) 2分
A
.
A) supply chain
B
.
B) B2B e-commerce
C
.
C) vertical market
D
.
D) horizontal market
正確答案: A
答案解釋:
9.43) Which of the following is not a characteristic of the use of social networks in B2B e-commerce?
單選題 (2 分) 2分
A
.
A) It is typically unstructured.
B
.
B) It helps develop a more personal relationship between participants in the supply chain.
C
.
C) It enables participants to make decisions based on current conditions.
D
.
D) They are always private.
正確答案: D
答案解釋:
10.44) Walmart is using which of the following technologies in its Food Traceability Initiative?
單選題 (2 分) 2分
A
.
A) EDI
B
.
B) blockchain
C
.
C) cloud-based B2B system
D
.
D) collaborative commerce system
正確答案: B
答案解釋:
11.77) Trans-organizational business processes require _______ to perform.
單選題 (2 分) 2分
A
.
A) one firm
B
.
B) two independent firms
C
.
C) three independent firms
D
.
D) at least ten firms
正確答案: B
答案解釋:
12.42) Collaborative commerce systems:
單選題 (2 分) 2分
A
.
A) focus on structuring intra-firm communications.
B
.
B) bring customers into the product development phase.
C
.
C) provide open, competitive marketplaces.
D
.
D) foster sharing sensitive internal information with suppliers and purchasers.
正確答案: D
答案解釋:
13.69) NeweggBusiness is an example of a(n):
單選題 (2 分) 2分
A
.
A) e-distributor.
B
.
B) exchange.
C
.
C) private industrial network.
D
.
D) e-procurement Net marketplace.
正確答案: A
答案解釋:
14.2) In 2019, B2B e-commerce accounted for approximately ___ of all B2B commerce.
單選題 (2 分) 2分
A
.
A) 22%
B
.
B) 49%
C
.
C) 51%
D
.
D) 78%
正確答案: C
答案解釋:
15.60) Which of the following primarily deal with direct goods?
單選題 (2 分) 2分
A
.
A) e-distributors and independent exchanges
B
.
B) exchanges and e-procurement Net marketplaces
C
.
C) exchanges and industry consortia
D
.
D) e-procurement Net marketplaces and industry consortia
正確答案: C
答案解釋:
16.65) An ________ primarily serves businesses that primarily buy indirect goods on a contract purchasing basis. 回答錯誤
單選題 (2 分) 0分
A
.
A) e-distributor
B
.
B) e-procurement Net marketplace
C
.
C) exchange
D
.
D) industry consortium
正確答案: B
17.45) EDI document structures are defined by:
單選題 (2 分) 2分
A
.
A) a single international standards body.
B
.
B) individual suppliers and buyers.
C
.
C) industry committees.
D
.
D) each purchaser.
正確答案: C
答案解釋:
18.14) Supply chain ________ refers to differentiating a firm's products or prices on the basis of superior supply chain management.
單選題 (2 分) 2分
A
.
A) management
B
.
B) simplification
C
.
C) competition
D
.
D) collaboration
正確答案: C
答案解釋:
19.79) All of the following are forms of collaboration among businesses except:
單選題 (2 分) 2分
A
.
A) RFQs.
B
.
B) CPFR.
C
.
C) demand chain visibility.
D
.
D) marketing coordination and product design.
正確答案: A
答案解釋:
20.64) E-distributors:
單選題 (2 分) 2分
A
.
A) make money by charging a mark-up on products they distribute.
B
.
B) usually operate "private" markets.
C
.
C) operate in vertical markets.
D
.
D) focus on selling direct products.
正確答案: A
答案解釋:
21.10) All of the following are potential benefits of B2B e-commerce except:
單選題 (2 分) 2分
A
.
A) lower administrative costs.
B
.
B) lower search costs.
C
.
C) lower price transparency.
D
.
D) lower transaction costs.
正確答案: C
答案解釋:
22.50) Which of the following statements about B2B marketing is not true?
單選題 (2 分) 2分
A
.
A) The majority of B2B ad spending is aimed at desktops.
B
.
B) Spending on B2B digital marketing and advertising accounts for about 30% of the total amount spend on digital marketing and advertising.
C
.
C) LinkedIn is the most common social network used for B2B marketing.
D
.
D) The disparity between the amount spent on B2B marketing compared to B2C e-commerce reflects the different nature of much of B2B e-commerce when compared to B2C e-commerce.
正確答案: B
答案解釋:
23.66) ________ is an example of an e-procurement Net marketplace.
單選題 (2 分) 2分
A
.
A) McMaster-Carr
B
.
B) Ariba
C
.
C) Amazon Business
D
.
D) SupplyOn
正確答案: B
答案解釋:
24.8. 二手產品銷售的概念,是指協同消費的哪個模式?(單選)
單選題 (2 分) 2分
A
.
(A) 產品服務系統
B
.
(B) 市場再流通
C
.
(C) 協同式生活
D
.
(D) 消費者導向
正確答案: B
答案解釋:
25.11) EDI began as a(n) ________ system.
單選題 (2 分) 2分
A
.
A) document automation
B
.
B) document exchange
C
.
C) invoice generation
D
.
D) MRP
正確答案: A
答案解釋:
26.80) Which of the following is not a typical barrier to the implementation of a private industrial network?
單選題 (2 分) 2分
A
.
A) It requires participating firms to share sensitive data.
B
.
B) It requires the large network owners to give up some of its independence.
C
.
C) It requires a significant investment of time and money.
D
.
D) It requires a change of mindset and behavior of employees.
正確答案: B
答案解釋:
27.76) Which of the following statements about Walmart's Global Replenishment System (GRS) is not true?
單選題 (2 分) 2分
A
.
A) GRS is an online analytics package.
B
.
B) GRS is a just-in-time inventory management system.
C
.
C) GRS is predictive, not just reflective, of past sales.
D
.
D) To use GRS and make decisions about order sizes, vendors must first input data to the system in a spreadsheet format.
正確答案: D
答案解釋:
28.21) What is the first step in the procurement process?
單選題 (2 分) 2分
A
.
A) negotiate price
B
.
B) qualify the seller and its products
C
.
C) issue a purchase order
D
.
D) search for suppliers
正確答案: D
答案解釋:
29.4. zipcar 讓會員共同擁有汽車,隨時都可以進行租用,請問這是下列何種概念?(單選)
單選題 (2 分) 2分
A
.
(A) 協同交換
B
.
(B) 協同設計
C
.
(C) 協同商務
D
.
(D) 協同消費
正確答案: D
答案解釋:
30.9. 透過平台讓使用者共同分享與交易無形的資源,是指協同消費的哪個模式?(單選)
單選題 (2 分) 2分
A
.
(A) 產品服務系統
B
.
(B) 市場再流通
C
.
(C) 協同式生活
D
.
(D) 消費者導向
正確答案: C
答案解釋:
31.63) An ________ primarily serves businesses that buy indirect goods on a spot purchasing basis.
單選題 (2 分) 2分
A
.
A) e-distributor
B
.
B) e-procurement company
C
.
C) exchange
D
.
D) industry consortium
正確答案: A
答案解釋:
32.3. 透過租賃服務來提供高價商品、奢侈品牌、限量商品等給有需要的使用者選購,這是下列何種概念?(單選)
單選題 (2 分) 2分
A
.
(A) 協同交換
B
.
(B) 協同設計
C
.
(C) 協同商務
D
.
(D) 協同消費
正確答案: D
答案解釋:
33.67) An ________ serves businesses that primarily buy direct goods on a contract purchasing basis. 回答錯誤
單選題 (2 分) 0分
A
.
A) e-distributor
B
.
B) e-procurement company
C
.
C) exchange
D
.
D) industry consortium
正確答案: D
34.30) ________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers.
單選題 (2 分) 2分
A
.
A) Spot
B
.
B) Indirect
C
.
C) Vertical
D
.
D) Bulk
正確答案: A
答案解釋:
35.10. 請問協同消費的核心為何?(單選)
單選題 (2 分) 2分
A
.
(A) 分享
B
.
(B) 個人化
C
.
(C) 服務
D
.
(D) 平台便利性
正確答案: A
答案解釋:
36.18) Few large firms today have Electronic Data Interchange (EDI) systems.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
37.32) Purchasing managers are key players in the procurement process.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
38.73) Exchanges are not directly tied to ERP systems used by large firms.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
39.72) Exchanges are used for spot purchasing of MRO supplies.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
40.17) B2B e-commerce websites tend to serve horizontal markets.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
41.83) Private industrial networks are usually owned collectively by the major firms participating in the network, while exchanges usually are created by a single sponsoring company.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
42.31) MRO goods are also known as direct goods.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
43.70) EDI was developed to reduce the cost, delays, and errors inherent in the manual exchanges of documents among firms.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
44.52) EDI systems generally serve vertical markets.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
45.71) E-distributors are sometimes referred to as many-to-one markets, with many sellers serving one firm.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
46.82) A private industrial network is an independently owned online marketplace that connects many suppliers and buyers.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
47.53) The primary goal of tight coupling is to reduce excess inventory to a bare minimum.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
48.81) Walmart is both the world’s largest retailer and has the world’s largest supply chain.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
答案解釋:
49.51) Highly centralized supply chains produce higher short-term costs and lower long-term risk protection.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
答案解釋:
50.84) Operating on a global scale is one objective of private industrial networks.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
1) Analysts predict that B2B e-commerce in the United States will grow to approximately ________ by 2024.
A) $9.8 billion
B) $98 billion
C) $980 billion
D) $9.8 trillion
D
2) In 2019, B2B e-commerce accounted for approximately ___ of all B2B commerce.
A) 22%
B) 49%
C) 51%
D) 78%
C
3) Which of the following was the first step in the development of B2B e-commerce?
A) Electronic Data Interchange (EDI)
B) automated order entry systems
C) computerized inventory databases
D) digital invoices
B
4) Which of the following refers to the links that connect business firms with one another to coordinate production?
A) supply chain
B) B2B e-commerce
C) vertical market
D) horizontal market
A
5) Automated order entry systems:
A) only show goods from a single seller.
B) increased the costs of inventory replenishment.
C) are typically owned by the purchasing firm.
D) no longer play an important role in B2B commerce.
A
6) Which of the following statements about EDI systems is true?
A) They typically serve vertical markets.
B) They are seller-side solutions.
C) They evolved from private trading exchanges.
D) They still play an important role in B2C commerce.
A
7) B2B e-commerce websites:
A) are a predecessor of industry consortia.
B) tend to serve horizontal markets.
C) are buyer-side solutions.
D) are considered a type of EDI system.
B
8) Which of the following is another name for a private industrial network?
A) industry consortia
B) EDI system
C) PTX
D) net marketplace
C
9) In 2019, which of the following accounted for the smallest amount of B2B commerce?
A) EDI
B) private industrial networks
C) Net marketplaces
D) traditional B2B
C
10) All of the following are potential benefits of B2B e-commerce except:
A) lower administrative costs.
B) lower search costs.
C) lower price transparency.
D) lower transaction costs.
C
11) EDI began as a(n) ________ system.
A) document automation
B) document exchange
C) invoice generation
D) MRP
A
12) All of the following are potential benefits of B2B e-commerce except:
A) increased production flexibility.
B) increased product cycle time.
C) increased opportunities to collaborate with suppliers and distributors.
D) increased visibility and real-time information sharing among all participants in the supply chain network.
B
13) All of the following have led to the development of outsourcing of manufacturing around the world except:
A) technology.
B) globalization of trade.
C) environmental concerns.
D) high levels of wage disparity between the developed and undeveloped worlds.
C
14) Supply chain ________ refers to differentiating a firm's products or prices on the basis of superior supply chain management.
A) management
B) simplification
C) competition
D) collaboration
C
15) A(n) ________ market is one that provides expertise and products for a specific industry (i.e., automobiles).
A) vertical
B) horizontal
C) indirect
D) buyer-biased
A
16) The essential characteristic of ________ is that they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade.
A) industry consortia
B) exchanges
C) Net marketplaces
D) horizontal markets
C
17) B2B e-commerce websites tend to serve horizontal markets.
TRUE
18) Few large firms today have Electronic Data Interchange (EDI) systems.
FALSE
21) What is the first step in the procurement process?
A) negotiate price
B) qualify the seller and its products
C) issue a purchase order
D) search for suppliers
D
22) The last step in the procurement process is:
A) sending a remittance payment.
B) sending the invoice.
C) shipping the goods.
D) delivering the goods.
A
23) Office supplies are an example of:
A) direct goods.
B) indirect goods.
C) MRO goods.
D) distributed goods.
B
24) The majority of inter-firm trade involves:
A) spot purchasing of direct goods.
B) contract purchasing of indirect goods.
C) contract purchasing of direct goods.
D) spot purchasing of indirect goods.
C
25) All of the following are examples of direct goods in the auto industry except:
A) sheet steel.
B) shatter-resistant glass.
C) rubber molding.
D) desktop computers.
D
26) An example of an indirect good in the fast-food industry is:
A) mustard.
B) paper napkins.
C) beef.
D) sugar.
B
27) An ________ is an independently owned, online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment.
A) exchange
B) e-distributor
C) e-procurement company
D) industry consortium
A
29) The liquidity of a market is measured by all of the following except:
A) price transparency.
B) number of buyers and sellers in market.
C) volume of transactions.
D) size of transactions.
A
30) ________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers.
A) Spot
B) Indirect
C) Vertical
D) Bulk
A
31) MRO goods are also known as direct goods.
FALSE
32) Purchasing managers are key players in the procurement process.
TRUE
35) All of the following are major technology trends in B2B e-commerce in 2020-2021, except:
A) a movement of B2B systems to cloud computing providers as a means of slowing rising technology costs.
B) a growing emphasis on the use of business analytics software (business intelligence) to understand very large data sets.
C) a growing use of the mobile platform for B2B systems.
D) a decrease in the use of social network platforms.
D
36) All of the following are weaknesses of EDI except:
A) EDI is not well suited for electronic marketplaces.
B) EDI lacks universal standards.
C) EDI does not provide a real-time communication environment.
D) EDI does not scale easily.
B
37) Which of the following is a method of inventory cost management that seeks to eliminate excess inventory?
A) lean production
B) sustainable production
C) just-in-time production
D) supply chain simplification
C
38) Which of the following statements about cloud-based B2B systems is not true?
A) Much of the expense of the system is shifted from the B2B network provider to the firm.
B) B2B network providers charge customers on a demand basis.
C) Network effects apply, enabling the spreading of costs.
D) Cloud-based B2B data networks can be implemented in short periods of time.
A
39) ________ is a method for ensuring that suppliers precisely deliver ordered parts at a specific time and to a particular location.
A) Having an adaptive supply chain
B) Tight coupling
C) Supply-chain management
D) Materials requirement planning
B
40) Which of the following is a transaction database that operates on a distributed P2P network that connects all participant members in a single database and is highly secure, reliable, resilient, and inexpensive?
A) SCM system
B) blockchain
C) EDI
D) cloud-based B2B system
B
41) A(n) ________ system continuously links the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating order entry systems.
A) EDI
B) ERP
C) CPFR
D) SCM
D
42) Collaborative commerce systems:
A) focus on structuring intra-firm communications.
B) bring customers into the product development phase.
C) provide open, competitive marketplaces.
D) foster sharing sensitive internal information with suppliers and purchasers.
D
43) Which of the following is not a characteristic of the use of social networks in B2B e-commerce?
A) It is typically unstructured.
B) It helps develop a more personal relationship between participants in the supply chain.
C) It enables participants to make decisions based on current conditions.
D) They are always private.
D
44) Walmart is using which of the following technologies in its Food Traceability Initiative?
A) EDI
B) blockchain
C) cloud-based B2B system
D) collaborative commerce system
B
45) EDI document structures are defined by:
A) a single international standards body.
B) individual suppliers and buyers.
C) industry committees.
D) each purchaser.
C
46) A(n) ________ supply chain is one in which the labor conditions in low-wage, underdeveloped producer countries are visible and morally acceptable to ultimate consumers in more developed industrial societies.
A) sustainable
B) ethical
C) lean
D) accountable
D
47) ________ production is a set of production methods that focuses on the elimination of waste throughout the customer value chain.
A) Green
B) Sustainable
C) Lean
D) Just-in-time
C
48) ________ is defined as the use of digital technologies to permit organizations to work together to design, develop, build, and manage products through their life cycles.
A) SCM
B) Social e-commerce
C) EDI
D) Collaborative commerce
D
49) The term BYOD refers to employees:
A) working from home.
B) being allowed or encouraged to use their own mobile devices and laptops.
C) using mobile devices for work.
D) bringing work devices to the home.
B
50) Which of the following statements about B2B marketing is not true?
A) The majority of B2B ad spending is aimed at desktops.
B) Spending on B2B digital marketing and advertising accounts for about 30% of the total amount spend on digital marketing and advertising.
C) LinkedIn is the most common social network used for B2B marketing.
D) The disparity between the amount spent on B2B marketing compared to B2C e-commerce reflects the different nature of much of B2B e-commerce when compared to B2C e-commerce.
B
51) Highly centralized supply chains produce higher short-term costs and lower long-term risk protection.
FALSE
52) EDI systems generally serve vertical markets.
TRUE
53) The primary goal of tight coupling is to reduce excess inventory to a bare minimum.
FALSE
57) Which of the following is an example of an e-distributor?
A) Grainger
B) Go2Paper
C) The Seam
D) Ariba Network
A
58) Which of the following primarily serve horizontal markets?
A) e-distributors and exchanges
B) e-distributors and e-procurement Net marketplaces
C) e-procurement Net marketplaces and industry consortia
D) exchanges and industry consortia
B
59) Which of the following primarily deal with indirect goods?
A) e-distributors and industry consortia
B) e-distributors and e-procurement Net marketplaces
C) exchanges and industry consortia
D) exchanges and e-procurement Net marketplaces
B
60) Which of the following primarily deal with direct goods?
A) e-distributors and independent exchanges
B) exchanges and e-procurement Net marketplaces
C) exchanges and industry consortia
D) e-procurement Net marketplaces and industry consortia
C
61) Which of the following primarily involve long-term sourcing?
A) e-distributors and exchanges
B) e-distributors and industry consortia
C) e-procurement Net marketplaces and exchanges
D) e-procurement Net marketplaces and industry consortia
D
62) An ________ provides an online catalog that represents the products of thousands of direct manufacturers.
A) e-distributor
B) e-procurement company
C) exchange
D) industry consortium
A
63) An ________ primarily serves businesses that buy indirect goods on a spot purchasing basis.
A) e-distributor
B) e-procurement company
C) exchange
D) industry consortium
A
64) E-distributors:
A) make money by charging a mark-up on products they distribute.
B) usually operate 'private' markets.
C) operate in vertical markets.
D) focus on selling direct products.
A
65) An ________ primarily serves businesses that primarily buy indirect goods on a contract purchasing basis.
A) e-distributor
B) e-procurement Net marketplace
C) exchange
D) industry consortium
B
66) ________ is an example of an e-procurement Net marketplace.
A) McMaster-Carr
B) Ariba
C) Amazon Business
D) SupplyOn
B
67) An ________ serves businesses that primarily buy direct goods on a contract purchasing basis.
A) e-distributor
B) e-procurement company
C) exchange
D) industry consortium
D
68) The Seam is an example of an:
A) exchange.
B) industry consortium.
C) e-procurement Net marketplace.
D) e-distributor.
B
69) NeweggBusiness is an example of a(n):
A) e-distributor.
B) exchange.
C) private industrial network.
D) e-procurement Net marketplace.
A
70) EDI was developed to reduce the cost, delays, and errors inherent in the manual exchanges of documents among firms.
TRUE
71) E-distributors are sometimes referred to as many-to-one markets, with many sellers serving one firm.
FALSE
72) Exchanges are used for spot purchasing of MRO supplies.
TRUE
73) Exchanges are not directly tied to ERP systems used by large firms.
TRUE
76) Which of the following statements about Walmart's Global Replenishment System (GRS) is not true?
A) GRS is an online analytics package.
B) GRS is a just-in-time inventory management system.
C) GRS is predictive, not just reflective, of past sales.
D) To use GRS and make decisions about order sizes, vendors must first input data to the system in a spreadsheet format.
D
77) Trans-organizational business processes require _______ to perform.
A) one firm
B) two independent firms
C) three independent firms
D) at least ten firms
B
78) Private industrial networks are direct descendants of:
A) e-procurement Net marketplaces.
B) existing EDI networks.
C) independent exchanges.
D) industry consortia.
B
79) All of the following are forms of collaboration among businesses except:
A) RFQs.
B) CPFR.
C) demand chain visibility.
D) marketing coordination and product design.
A
80) Which of the following is not a typical barrier to the implementation of a private industrial network?
A) It requires participating firms to share sensitive data.
B) It requires the large network owners to give up some of its independence.
C) It requires a significant investment of time and money.
D) It requires a change of mindset and behavior of employees.
B
81) Walmart is both the world's largest retailer and has the world's largest supply chain.
TRUE
82) A private industrial network is an independently owned online marketplace that connects many suppliers and buyers.
FALSE
83) Private industrial networks are usually owned collectively by the major firms participating in the network, while exchanges usually are created by a single sponsoring company.
FALSE
84) Operating on a global scale is one objective of private industrial networks.
TRUE
1.10. 消費者使用「基礎運算資源」,這是指下列何者?(單選)
單選題 (4 分) 4分
A
.
(A) SaaS
B
.
(B) PaaS
C
.
(C) IaaS
D
.
(D) PaaS
正確答案: C
答案解釋:
2.10. 商業客戶導向的個人社交網路服務網站,這是指下列何者?(單選)
單選題 (4 分) 4分
A
.
(A) Pinterest
B
.
(B) Instagram
C
.
(C) LinkedIn
D
.
(D) Facebook
正確答案: C
答案解釋:
3.8. 請問下列何者屬於 Pinterest 的功能?(單選)
單選題 (4 分) 4分
A
.
(A) 個人銷售平台
B
.
(B) 群眾付款
C
.
(C) 互動影音
D
.
(D) 推薦圖釘
正確答案: D
答案解釋:
4.9. 請問下列何者非雲端運算的安全問題?(單選)
單選題 (4 分) 4分
A
.
(A) 隱私
B
.
(B) 在未經授權的情況下,他人以不正當的方式進行資料侵入,獲得用戶資料
C
.
(C) 政府部門或其他權利機構為達到目的對雲端運算平台上的資訊進行檢查
D
.
(D) 不能為了取得商業利益對用戶資訊進行蒐集和處理
正確答案: D
答案解釋:
5.7. 關於 Pinterest 的描述,下列何者錯誤?(單選)
單選題 (4 分) 4分
A
.
(A) 在電腦與手機平台都有的應用程式
B
.
(B) 讓照片以類別的方式呈現
C
.
(C) 用戶可以按主題分類來上傳和釘 (Pin) 圖片到自己線上相簿的社群網路服務
D
.
(D) 使用的網站布局為瀑布流布局 (Pinterest-style Layout)
正確答案: B
答案解釋:
6.8. 請問 Google 的無人智慧車較偏向下列何種應用?(單選)
單選題 (4 分) 4分
A
.
(A) 協同消費
B
.
(B) 行動商務
C
.
(C) 數位匯流
D
.
(D) 物聯網
正確答案: D
答案解釋:
7.2. 請問格子店是屬於個人商務應用實例的哪一種?(單選)
單選題 (4 分) 4分
A
.
(A) 個人商家
B
.
(B) 群眾募資
C
.
(C) 個人影音頻道
D
.
(D) Pinterest
正確答案: A
答案解釋:
8.6. 請問由感應器 (Reader) 和標籤 (Tag) 所組成的系統是指下列何者?(單選)
單選題 (4 分) 4分
A
.
(A) 無線射頻辨識技術
B
.
(B) 無線感知網路
C
.
(C) 嵌入式智慧技術
D
.
(D) 奈米與微機電技術
正確答案: A
答案解釋:
9.1. 把所有的資料全部丟到網路上處理,請問這是下列哪個概念?(單選)
單選題 (4 分) 4分
A
.
(A) 雲端運算
B
.
(B) 網路社群
C
.
(C) 長尾理論
D
.
(D) 群眾募資
正確答案: A
答案解釋:
10.10. 下列何者非物聯網重要的商業模式之一?(單選)
單選題 (4 分) 4分
A
.
(A) 平台使用人數
B
.
(B) 資料販售與交換
C
.
(C) 產品即服務
D
.
(D) 產品共享
正確答案: A
答案解釋:
11.3. 請問淘寶網在台灣開設淘寶大學是屬於個人商務應用實例的哪一種?(單選)
單選題 (4 分) 4分
A
.
(A) 個人商家
B
.
(B) 群眾募資
C
.
(C) 個人影音頻道
D
.
(D) Pinterest
正確答案: A
答案解釋:
12.7. 請問下列哪個技術可將軟體結合硬體裝置 (行動電話、遊樂器、數位家電等),使設備皆可具備接收網路訊息與處理資訊的能力?(單選)
單選題 (4 分) 4分
A
.
(A) 無線射頻辨識技術
B
.
(B) 無線感知網路
C
.
(C) 嵌入式智慧技術
D
.
(D) 奈米與微機電技術
正確答案: C
答案解釋:
13.9. 關於 Instagram 的敘述,下列何者錯誤?(單選)
單選題 (4 分) 4分
A
.
(A) 提供行動裝置的照片分享
B
.
(B) 多樣的濾鏡效果,讓使用者可以輕易地變換出美麗的圖片效果
C
.
(C) 是一個免費提供在線圖片及短影片分享的社交應用
D
.
(D) 是很好用的導購工具
正確答案: D
答案解釋:
14.6. 把社會資源進行測試、分類和整合,並向有需求的用戶提供相應的服務,這是雲端運算的哪個應用?(單選)
單選題 (4 分) 4分
A
.
(A) 雲端物聯
B
.
(B) 雲端社交
C
.
(C) 雲端安全
D
.
(D) 雲端政務
正確答案: B
答案解釋:
15.9. 「羊毛出在狗身上,豬來買單」,是指下列何種商業模式?(單選)
單選題 (4 分) 4分
A
.
(A) 協同消費
B
.
(B) 行動商務
C
.
(C) 數位匯流
D
.
(D) 物聯網
正確答案: D
答案解釋:
16.5. 請問下列何者非物聯網的關鍵技術?(單選)
單選題 (4 分) 4分
A
.
(A) 無線射頻辨識技術
B
.
(B) 無線感知網路
C
.
(C) 嵌入式智慧技術
D
.
(D) 行動通訊設備
正確答案: D
答案解釋:
17.1. 建構在網路、電信等資訊媒介,讓許多植入感應器的物件能夠互聯互通的網絡模式,指的是下列哪個概念?(單選)
單選題 (4 分) 4分
A
.
(A) 協同消費
B
.
(B) 行動商務
C
.
(C) 數位匯流
D
.
(D) 物聯網
正確答案: D
答案解釋:
18.5. 透過網際網路以簡短的影片來展示、宣傳原始的創意與設計,同時說明量產實現的計畫,請問這是屬於個人商務應用實例的哪一種?(單選)
單選題 (4 分) 4分
A
.
(A) 個人商家
B
.
(B) 群眾募資
C
.
(C) 個人影音頻道
D
.
(D) Pinterest
正確答案: B
答案解釋:
19.7. 關於雲端儲存的描述,下列何者錯誤?(單選)
單選題 (4 分) 4分
A
.
(A) 網際網路中大量的儲存裝置透過應用軟體共同作用協同發展
B
.
(B) 具體的儲存裝置
C
.
(C) 運算和處理海量資料
D
.
(D) 支援雲端運算系統需要配置大量的儲存裝置
正確答案: B
答案解釋:
20.3. 請問雲端運算中,何者是資料與程式皆在組織內管理,且不會受到網路頻寬、安全疑慮、法規限制影響?(單選)
單選題 (4 分) 4分
A
.
(A) 公用雲
B
.
(B) 私有雲
C
.
(C) 社群雲
D
.
(D) 混合雲
正確答案: B
答案解釋:
21.1. 請問下列哪些屬於個人化平台?(複選)
複選題 (2 分) 2分
A
.
(A) Pinterest
B
.
(B) Instagram
C
.
(C) YouTube
D
.
(D) Facebook
正確答案: A B C D
答案解釋:
22.2. 請問雲端運算分為哪幾類?(複選)
複選題 (2 分) 2分
A
.
(A) SaaS
B
.
(B) PaaS
C
.
(C) IaaS
D
.
(D) PaaS
正確答案: A B C
答案解釋:
23.3. 請問物聯網涵蓋哪三大範疇?(複選)
複選題 (2 分) 2分
A
.
(A) 人與人
B
.
(B) 物件與物件
C
.
(C) 人與物件
D
.
(D) 網路系統
正確答案: A B C
答案解釋:
24.8. 請問個人雲應用包括下列哪些項目?(複選)
複選題 (2 分) 2分
A
.
(A) Dropbox
B
.
(B) Google Drive
C
.
(C) Microsoft OneDrive
D
.
(D) Apple iCloud
正確答案: A B C D
答案解釋:
25.5. 雲端教育的描述,下列哪些正確?(複選)
複選題 (2 分) 2分
A
.
(A) 打破傳統教育的壟斷和原生邊界
B
.
(B) 可以通過視訊雲端運算的應用對學校特色教育課程進行直播和錄播
C
.
(C) 可汗學院 (KHAN ACADEMY) 最早提出翻轉教室的概念
D
.
(D) 可完全取代傳統教育模式
正確答案: A B C
答案解釋:
26.6. 群眾募資者需要注意哪些原則?(複選)
複選題 (2 分) 2分
A
.
(A) 專案必須創造出能與他人分享的事物
B
.
(B) 專案必須誠實且清楚的呈現
C
.
(C) 如果專案是製造產品,必須要有原型產品的展示
D
.
(D) 允許慈善活動
正確答案: A B C
答案解釋:
27.4. 請問物聯網的四大預測包括哪些?(複選)
複選題 (2 分) 2分
A
.
(A) 在車用以及工業用的領域加速發展
B
.
(B) 結合巨量資料讓服務更聰明
C
.
(C) 更快速的連線
D
.
(D) 更完整的規範
正確答案: A B C D
答案解釋:
28.4. 請問雲端運算包括哪些特徵?(複選)
複選題 (2 分) 2分
A
.
(A) 隨需求而變的自助服務
B
.
(B) 網路使用無所不在
C
.
(C) 快速部署彈性
D
.
(D) 多人共享資源池
正確答案: A B C D
答案解釋:
29.4. 請問淘寶大學包括哪些課程?(複選)
複選題 (2 分) 2分
A
.
(A) 開店流程
B
.
(B) 商品與商店美化
C
.
(C) 行銷手法
D
.
(D) 客戶服務
正確答案: A B C D
答案解釋:
30.2. 請問物聯網的發展可分為哪三個維度?(複選)
複選題 (2 分) 2分
A
.
(A) 時間
B
.
(B) 網路
C
.
(C) 地點
D
.
(D) 物件
正確答案: A C D
1.5) ________
is the ability to ensure that an e-commerce site continues to function as
intended.
C)
Availability
2.11)
Which system functionality must your website have to be able to personalize or
customize a product for a client?
D)
customer on-site tracking
3.19)
Which of the following uses a subscription-based sales revenue model?
D)
Dollar Shave Club
4.下列敘述何者有誤?[單選]
A. 變動性較低、需求固定的市場,可採用拉式基礎的供應鏈
5.7)
What are the two most important management challenges in building a successful
e-commerce presence?
A)
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
6.77)
Above all, e-commerce is a ________ phenomenon.
A)
technology driven
7.13. 在電子商務交易中,買賣雙方皆為企業,為下列何種型態?[單選]
D.B2B
8.18)
________ is a utility program that allows you to check the connection between
your client and a TCP/IP network.
A) Ping
9.請問下列何者非呈現式廣告的概念?[單選]
B. 又稱為關鍵字廣告
10.「SCM」是指?[單選]
B. 供應鏈管理
11.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線 速度,造成使用者點選網頁時需要花很久的時間,再加上添購電子化設備費用 昂貴,最後導致成效不如預期而收編。由上述案例來看,除了外部影響外, NOVA在內部還遇到哪個困難?[單選]
C. 導入費用過高
12.14)
The existence of many competitors in any one market segment may indicate:
B) the
market is saturated.
13.台灣銀行在民國86年1月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]
A.電子資料交換
14.2)
Which of the following uses a subscription revenue model for books?
B)
Amazon Kindle Unlimited
15.52)
Proxy servers are also known as __________ because they have two network
interfaces.
C) dual
home systems
16.37)
All of the following might be part of a website's middle-tier layer except:
C)
legacy corporate applications.
17.52)
All of the following are involved in the effort to create standards for IoT
except: 回答錯誤
D) W3C.
18.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]
D.興趣
19.22. 冷門產品的需求量不高,但匯聚多樣的冷門產品所產生之效果會大於傳統熱門產品所產生的效果,這是指?[單選] 回答錯誤
B.15 組
20.13)
________ is a model of computing in computer processing, storage, software, and
other services which are provided as a shared pool of virtualized resources
over the Internet.
D) Cloud
computing
21.30)
________ typically attack governments, organizations, and sometimes individuals
for political purposes.
D)
Hacktivists
22.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]
B.目錄式價格
23.導入CRM之各個時期都必須獲得公司各部門鼎力合作才能真正成功,這 是在解決顧客關係管理的哪項失敗因素?[單選]
D. 缺乏人才與共識
24.40)
Which of the following would you use to verify that links on web pages are
valid? 回答錯誤
D) site
management tools
正確答案: D
25.24) The
percentage of all e-mail that is spam averaged around ________ in 2020.
A) 55%
26.博客來網路書店承諾「中午前訂,隔天7-11取貨」,此符合B to C電子商務影響因素中的哪一個?[單選]
D.便捷的運送服務
正確答案: D
27.29) Which
of the following types of attacks enabled hackers to take control of the
Twitter accounts of dozens of America’s most prominent political, entertainment
and technology leaders?
C)
social engineering
28.44)
Which of the following is an example of a company using the content provider
model?
B)
Netflix
29.由Call Center轉為顧客關係管理時,原先利用電話蒐集到的顧客資訊無法 和網頁整合,此時造成顧客在詢問或購買時不方便,這是屬於顧客關係管理可 能會遇到的困難的哪一種?[單選]
B. 與原系統整合不易
30.37)
Which of the following is based on the idea of complete price transparency in a
perfect information marketplace? 回答錯誤
A) the
Law of One Price
31.27) A
template test is a form of which type of testing?
D) A/B
testing
正確答案: D
32.46)
In general, the key to becoming a successful content provider is to:
A) own
the content being provided.
33.50)
M-commerce is the type of e-commerce that generates the most revenue.
B.B
正確答案: B
34.4. 智慧財產權法想要保護的是下列何者?(單選)
(A) 人類腦力辛勤創作的結晶
正確答案: A
35.3. 下列哪些是常見的網路犯罪?(複選)
(A) 網路販賣盜版光碟
(B) 網路販賣贓物
(C) 入侵他人網站
正確答案: A B C
36.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
A
.
(A) 隱私權
B
.
(B) 著作權
C
.
(C) 專利權
D
.
(D) 商標權
正確答案: B C D
37.8. 下列何者不受著作權法的保護?(單選)
B
.
(B) 中華民國憲法
C
.
(C) 學校的試題
D
.
(D) 學校的網頁
正確答案: B C D
38.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
39.6. 有關網路禮儀,下列哪些正確?(複選)
(A) 電腦禮儀的基本原則是「尊重」
(C) 轉載別人的文章時,最好註明出處
(D) 最好取得原作者的同意後再進行轉載
正確答案: A C D
40.3. 有關電子商務的定義,下列哪些錯誤?(複選)
(A) 電子商務就是不用在網路上做生意
(C) 電子商務一定要透過網路線來傳遞
正確答案: A C
41.58)
Face ID is an example of which of the following?
是非題 (2 分) 2分
A)
biometrics
正確答案: A
42.59)
WLAN-based Internet access derives from the same technological foundations as
telephone-based wireless Internet access.
是非題 (2 分) 2分
B.B
正確答案: B
43.38)
Personalization involves targeting marketing messages to specific individuals
by adjusting the message based upon a consumer's preferences or past purchasing
behavior.
是非題 (2 分) 2分
A.A
正確答案: A
44.35)
Exploit kits can be purchased by users to protect their computers from malware.
是非題 (2 分) 2分
B.B
正確答案: B
45.76)
Scale economies are efficiencies that result from increasing the size of the
business.
是非題 (2 分) 2分
A.A
46.7)
Research shows the two key factors shaping the decision to purchase online are
utility and trust.
是非題 (2 分) 2分
A.A
47.79) Interactivity
that enables product customization alters industry structure by decreasing the
threat of substitutes.
是非題 (2 分) 2分
A.A
正確答案: A
48.58)
The United States has the world’s highest average Internet connection
speed.
是非題 (2 分) 2分
B.B
正確答案: B
49.34) A
multi-tier architecture includes a web and database server.
是非題 (2 分) 2分
B.B
正確答案: B
50.10)
Online traffic is partially driven by offline brands and traditional shopping.
是非題 (2 分) 2分
A.A
正確答案: A
1.79)
Which of the following statements about responsive web design (RWD) is not
true?
A) RWD
works best for sites that have complex functionality.
正確答案: A
2.1. 下列敘述何者錯誤?(單選)
(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果
正確答案: C
3.有關專利權的敘述,下列何者正確?[單選]
C. 專利權只限於申請的國家,出了國境就不受保護
正確答案: C
4.45)
All of the following statements about public key cryptography are true except:
B)
public key cryptography ensures authentication of the sender.
正確答案: B
5.31) The
incremental cost of building the next unit of a good is called the:
C)
marginal cost.
正確答案: C
6.63)
Django is based on which of the following?
B)
Python
正確答案: B
7.78)
View-to-cart ratio is a measure of the: 回答錯誤
B)
percentage of views that lead to an add-to-cart action.
正確答案: B
8.82)
Which of the following is a programming language introduced by Apple
specifically for developing iOS applications?
D) Swift
正確答案: D
9.83)
Applications for Android operating system-based smartphones are typically
written in which of the following?
B) Java
正確答案: B
10.4. 小駱是個很認真的保險業務員,每當拜訪舊顧客時,總會拿出顧客從前留下的資料加以研讀,藉此提供最符合顧客需求的保險建議。請問這是屬於下列何種概念?(單選)
(D) 顧客關係管理
正確答案: D
11.30)
The NIKEiD program is an example of which of the following marketing
techniques?
A)
customer co-production
正確答案: A
12.24.阿傑是個Apple的重度使用者,每天都會逛Apple的App Store搜尋最新的應用程式,請問App Store豐富的數位化內容是屬於網路商業模式的哪種特性? [單選]
B.核心面
正確答案: B
13.23)
Which of the following is not a primary source of ad fraud?
D)
native advertising that is displayed on a social media site
正確答案: D
14.1. 下列何者非企業電子化的主要應用範圍?(單選)
(A) 六個標準差
正確答案: A
15.9. 阿斌是 Apple 的瘋狂粉絲,在 iPad mini 尚未在台灣上市時,就透過拍賣網站先買到,請問這是屬於 C to C 網路交易模式帶來的何種效益?(單選)
(B) 特殊性
正確答案: B
16.9. 在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)
(A) 駭客
正確答案: A
17.25) Which
of the following statements about CAN-SPAM is not true?
B)
CAN-SPAM prohibits unsolicited e-mail (spam).
正確答案: B
18.42. 女鞋業者Grace Gift利用素人以及知名部落客合作,推出其專屬商品,成功擄獲消費者的心而使商品大賣,請問Grace Gift是考慮到網路商業模式的哪種特性?[單選] 回答錯誤
A.服務面
正確答案: A
19.1. 網站藉由銷售商品、資訊或服務給消費者而從中賺取價差,這是屬於下列哪一種收益模式?(單選)
(D) 銷售收益模式
正確答案: D
20.供應鏈上基於資訊回饋困難與前置時間的延遲,造成許多決策者容易做出 重複訂購或臨時取消訂單的決策,而產生需求放大(或縮小)的效果。請問上 述是指哪個問題?[單選]
A. 長鞭效應
正確答案: A
21.26)
Which form of testing compares a control page with one that is very different?
B) new
concept test
正確答案: B
22.68)
Which of the following is an example of an e-commerce first mover that failed?
B) eToys
正確答案: B
23.下列何者不是顧客關係管理的關鍵成功因素?[單選]
C. 上、下游廠商配合度
正確答案: C
24.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]
C.金流
正確答案: C
25.21)
Amazon's Associates program is an example of which of the following?
C)
affiliate marketing
26.6) A
firm's ________ describes how a firm will produce a superior return on invested
capital.
B)
revenue model
正確答案: B
27.將傳統拍賣方式轉換到網際網路上來進行,此模式稱為?[單選] 回答錯誤
D.Outranet
正確答案: D
28.5. 供應鏈管理的發展流程為以下何者?(單選)
(B) 單一企業階段→物流管理階段→運籌管理階段→供應鏈管理階段
正確答案: B
29.小泰規劃著他與小仙的甜蜜旅行,並且打算在晶華酒店住下並求婚,為了以防萬一,他使用晶華酒店的線上訂房服務,請問晶華酒店提供線上訂房的服務是屬於網路交易市場的哪個角色?
B.基本的電子商務
正確答案: B
30.49)
Which of the following is a standard that makes it possible to access data from
any application regardless of the database and operating system software being
used?
B) ODBC
正確答案: B
31.8)
The Internet Layer of TCP/IP is responsible for which of the following?
B)
addressing, packaging, and routing messages
正確答案: B
32.「ERP」是指?[單選]
A. 企業資源規劃
正確答案: A
33.14) Which
of the following did the Internet Advertising Bureau urge advertisers to
abandon? 回答錯誤
C) Adobe
Flash
正確答案: C
34.Morgan
Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選]
C.匯聚人潮
正確答案: C
35.8. 下列何者不受著作權法的保護?(單選)
(B) 中華民國憲法
(C) 學校的試題
(D) 學校的網頁
正確答案: B C D
36.3. 下列哪些是常見的網路犯罪?(複選)
(A) 網路販賣盜版光碟
(B) 網路販賣贓物
(C) 入侵他人網站
正確答案: A B C
37.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
38.3. 有關電子商務的定義,下列哪些錯誤?(複選)
(A) 電子商務就是不用在網路上做生意
(C) 電子商務一定要透過網路線來傳遞
正確答案: A C
39.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
40.6. 有關網路禮儀,下列哪些正確?(複選)
(A) 電腦禮儀的基本原則是「尊重」
(C) 轉載別人的文章時,最好註明出處
(D) 最好取得原作者的同意後再進行轉載
正確答案: A C D
41.C)72)
The emergence of mobile, social, and local e-commerce occurred during the
Consolidation period of e-commerce.
是非題 (2 分) 2分
B.B
正確答案: B
42.84)
The information systems discipline spans the technical and behavioral
approaches to e-commerce.
是非題 (2 分) 2分
A.A
正確答案: A
43.8) A
roughly equal percentage of men and women in the United States use the Internet
today.
是非題 (2 分) 2分
A.A
正確答案: A
44.80)
Bluetooth is the primary enabling technology for mobile wallets.
是非題 (2 分) 2分
B.B
正確答案: B
45.45)
Lead generation marketing firms specialize in inbound marketing.
是非題 (2 分) 2分
A.A
正確答案: A
46.39)
E-commerce technologies provide a unique, many-to-many model of mass
communication.
是非題 (2 分) 2分
A.A
正確答案: A
47.73)
The current versions of most web browsers no longer support Java applets.
是非題 (2 分) 2分
A.A
正確答案: A
48.59)
All of the following are methods of improving the processing architecture of a
website except:
是非題 (2 分) 2分
D)
adding web servers.
正確答案: D
49.56) Bluetooth
is a high-speed, fixed broadband wireless local area network for commercial and
residential use.
是非題 (2 分) 2分
B.B
正確答案: B
50.65)
SaaS and PaaS providers can typically provide services at lower costs through
scale economies.
是非題 (2 分) 2分
A.A
正確答案: A
1.25. 小仙是個愛網購的女生,每當想要買東西時,總會上愛合購揪團買東西,請問愛合購是屬於何種網路商業模式?[單選]
D.中介平台
正確答案: D
2.24)
Which of the following is the best definition of transaction cost?
B) the
cost of participating in a market
正確答案: B
3.5. 中華汽車為了提高公司的競爭力而導入一套系統可以建立個人知識平台並與工作管理系統進行結合,經由工作社群網路來建立不同的知識社群,進而發展出團隊的作業模式與規範。請問這套系統是?(單選)
(D) 知識管理
正確答案: D
4.45)
Which of the following is not an example of an on-demand service company?
D)
Facebook
正確答案: D
5.77)
Recency refers to the:
B) time
elapsed since the last visit made by a customer.
正確答案: B
6.66)
Which of the following was the most popular mobile web browser as of June 2020?
C)
Chrome
正確答案: C
7.下列何者非拉式基礎供應鏈的優點?[單選]
B. 可進行成本規劃
正確答案: B
8.26) Which
of the following protocols enables the exchange of routing information among
different autonomous systems on the Internet?
B) BGP
正確答案: B
9.28)
All of the following are "traditional" online marketing tools except:
C)
social marketing.
正確答案: C
10.1. 下列何者非企業電子化的主要應用範圍?(單選)
(A) 六個標準差
正確答案: A
11.2. 下列何者是對電子商務的正確認知?[單選]
D.電子商業 (e-Business) 乃是徹底的改變
正確答案: D
12.64)
Ruby on Rails is based on which of the following philosophies?
B) CoC
正確答案: B
13.17)
Which of the following is the leading cause of data breaches?
C)
hackers
正確答案: C
14.23)
Which of the following is not a primary source of ad fraud?
D)
native advertising that is displayed on a social media site
正確答案: D
15.11)
The address used by a browser to identify the location of content on the Web is
called:
B) a
Uniform Resource Locator.
正確答案: B
16.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]
D.興趣
正確答案: D
17.我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術是下列何者?[單選]
D. 影音串流
正確答案: D
18.有關專利權的敘述,下列何者正確?[單選]
C. 專利權只限於申請的國家,出了國境就不受保護
正確答案: C
19.3)
During which phase of the development of the Internet was the Domain Name
System (DNS) introduced?
B)
Institutional phase
正確答案: B
20.76)
Acquisition rate is a measure of the:
A)
percentage of visitors who indicate an interest in a site's products by
registering or visiting a product's pages.
正確答案: A
21.7. 阿任很想買一台 New iPad,為了以較優惠的價格買到,於是到殺價王和其他消費者競標,在這裡,以唯一最低出價者得標,請問此概念類似下列哪種拍賣模式?(單選)
(D) 荷式拍賣
正確答案: D
22.小香在一家行銷公關公司工作,分析每個不同的人在哪裡按讚、分享哪些 連結,以幫助顧客做出最佳的行銷分案。請問這屬於顧客關係管理的哪個階 段?[單選] 回答錯誤
C. 互動與修改階段
正確答案: C
23.34)
E-commerce is available just about everywhere and anytime. This is known as:
C)
ubiquity.
正確答案: C
24.18)
Software that is used to obtain private user information such as a user's
keystrokes or copies of e-mail is referred to as:
A)
spyware.
正確答案: A
25.9. 統一超商導入銷售時點系統 (POS),藉此系統來即時記錄顧客購買的產品、時間、年齡等資訊,以改善傳統人工記錄的不便,並提供管理者在制定決策時的參考。請問上述是屬於企業電子化帶來的何種效益?(單選)
(A) 流程技術的改革
正確答案: A
26.26) All
of the following can be considered examples of the market creator business
model except:
D)
Twitter.
正確答案: D
27.4)
Which of the following is an example of an integrity violation of e-commerce
security?
D) An
unauthorized person intercepts an online communication and changes its
contents.
正確答案: D
28.讓使用者透過網路來通話、訊息傳遞、資訊往來或分享影像的系統,這是指下列何者?[單選]
C. 即時通訊
正確答案: C
29.5)
________ is the ability to ensure that an e-commerce site continues to function
as intended.
C)
Availability
正確答案: C
30.根據Kalakota & Whinston
(1997年) 提出電子商務架構的概念,「Java」屬於 哪一種基礎架構?[單選]
D.多媒體內容及網路出版基礎架構
正確答案: D
31.Amazon.com提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一個概念?[單選]
A. 網路交易模式
正確答案: A
32.8. 下列何者不屬於Porter 的產業五力?[單選]
D.電子商務科技
正確答案: D
33.26)
Which of the following is not an example of a potentially unwanted program
(PUP)?
C)
drive-by download
正確答案: C
34.Morgan
Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選]
C.匯聚人潮
正確答案: C
35.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
36.8. 下列何者不受著作權法的保護?(單選)
(B) 中華民國憲法
(C) 學校的試題
(D) 學校的網頁
正確答案: B C D
37.3. 下列哪些是常見的網路犯罪?(複選)
(A) 網路販賣盜版光碟
(B) 網路販賣贓物
(C) 入侵他人網站
正確答案: A B C
38.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
39.6. 有關網路禮儀,下列哪些正確?(複選)
(A) 電腦禮儀的基本原則是「尊重」
(C) 轉載別人的文章時,最好註明出處
(D) 最好取得原作者的同意後再進行轉載
正確答案: A C D
40.3. 有關電子商務的定義,下列哪些錯誤?(複選)
(A) 電子商務就是不用在網路上做生意
(C) 電子商務一定要透過網路線來傳遞
正確答案: A C
41.59)
Which of the following is the most common protocol for securing a digital
channel of communication?
是非題 (2 分) 2分
B) TLS
正確答案: B
42.34) Spoofing
is the attempt to hide a hacker's true identity by using someone else's e-mail
or IP address.
是非題 (2 分) 2分
A.A
正確答案: A
43.82)
Which of the following measures the percentage of times an ad is clicked?
是非題 (2 分) 2分
B) CTR
正確答案: B
44.73)
The Reinvention period of e-commerce is as much a sociological phenomenon as it
is a technological or business phenomenon.
是非題 (2 分) 2分
A.A
正確答案: A
45.37)
Price transparency refers to the ease with which consumers can find out what
merchants pay for products.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
46.81)
There is a finite number of Bitcoins that can be created.
是非題 (2 分) 2分
A.A
正確答案: A
47.32) Phishing
attacks rely on browser parasites.
是非題 (2 分) 2分
B.B
正確答案: B
48.61)
The easiest and least expensive way to prevent threats to system integrity is
to install anti-virus software.
是非題 (2 分) 2分
A.A
正確答案: A
49.52)
Dynamic page generation enables price discrimination.
是非題 (2 分) 2分
A.A
正確答案: A
50.45)
Lead generation marketing firms specialize in inbound marketing.
是非題 (2 分) 2分
A.A
正確答案: A
1.48)
Which of the following is Google hoping to use to provide Internet access to
remote parts of the world?
B)
high-altitude balloons
正確答案: B
2.82)
Beginning the e-commerce development process with a mobile presence rather than
a desktop website is referred to as which of the following?
C)
mobile first design
正確答案: C
3.「同一時間內,每一公司皆向供應商訂貨,造成某時段需求預測過高,而 其他時段則無需求,使供應商面臨較高的需求變異。」請問這是哪一種訂購方 式?[單選] 回答錯誤
A. 相關訂購
正確答案: A
4.22. 冷門產品的需求量不高,但匯聚多樣的冷門產品所產生之效果會大於傳統熱門產品所產生的效果,這是指?[單選]
B.15 組
正確答案: B
5.45)
All of the following statements about public key cryptography are true except:
B) public
key cryptography ensures authentication of the sender.
正確答案: B
6.3)
Which element of the business model addresses what a firm provides that other
firms do not and cannot?
D) value
proposition
正確答案: D
7.根據市場需求預測來訂定生產計畫,請問這是哪種生產方式?[單選]
A. BTS
正確答案: A
8.「所有和Internet有關的行為都必須經過防火牆,所以防火牆可以記錄所 有Internet的活動事件。」此為防火牆的哪個功用?[單選]
B. 監視活動
正確答案: B
9.43. 透過iPhone就能夠到App Stores下載軟體,使得每一支iPhone都具有獨特的個人風格,而可依照自己的想法與需求轉變成遊戲機、事務機等,創造出獨特性與特殊性。請問Apple掌握到了網路商業模式的哪種特性?[單選]
A.只要動手架設網站,其他的都會水到渠成
正確答案: A
10.14)
Google introduced which of the following changes to its search algorithm to
weed out low quality sites from search results?
C) Panda
正確答案: C
11.61)
Which of the following may offer its customers value chain management software?
B)
e-procurement companies
正確答案: B
12.46)
In 2016, the United States gave up control of which of the following
organizations involved with Internet governance?
D) IANA
正確答案: D
13.防火牆的設定步驟為?[單選]
A. 開啟防火牆→勾選設定值→新增例外連結
正確答案: A
14.79)
Which of the following measures the ratio of items purchased to product views?
A)
conversion rate
B
.
B) cart
conversion rate
C
.
C)
browse-to-buy ratio
D
.
D)
view-to-cart ratio
正確答案: C
15.3.
amazon.com 提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一個概念?(單選)
(A) 網路交易模式
正確答案: A
16.承阿宏的公司,他還考慮到員工當中會操作電腦的人數,以及要如何安排課 程以培育員工使用新的資訊科技系統。請問這類的問題較接近哪個面向?[單 選]
D. 人員面
正確答案: D
17.71)
Uber has been criticized for using which of the following?
C) surge
pricing
正確答案: C
18.我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術是下列何者?[單選]
D. 影音串流
正確答案: D
19.71)
Which of the following is not an element of friction-free commerce? 回答錯誤
D)
Unfair competitive advantages are eliminated.
正確答案: D
20.41)
The backbone of the Internet is formed by:
B) Tier
1 ISPs.
正確答案: B
21.以Yahoo!奇摩與PChome Online的交易模式來看,其屬於電子商務的哪個階段?[單選]
B.發展交易
正確答案: B
22. 將傳統拍賣方式轉換到網際網路上來進行,此模式稱為?[單選]
D.Extranet
是指企業間網?
正確答案: D
23.4)
Which of the following is an example of an integrity violation of e-commerce
security?
D) An
unauthorized person intercepts an online communication and changes its
contents.
正確答案: D
24.15)
Accessing data without authorization on Dropbox is an example of a:
B) cloud
security issue.
正確答案: B
25.1. 下列敘述何者錯誤?(單選)
(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果
正確答案: C
26.70)
Which of the following refers to the displacement of market middlemen and the
creation of a new direct relationship between producers and consumers?
B)
disintermediation
正確答案: B
27.9. 在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)
(A) 駭客
正確答案: A
28.19)
Which of the following technologies has enabled the Internet to grow
exponentially to support millions of users, without overloading the network
architecture?
D)
client/server computing
正確答案: D
29.60)
The marketing technique known as ________ involves merchants offering many
products for which there is little demand.
A) long
tail marketing
正確答案: A
30.8. 博客來網路書店面對需求量不高的冷門書籍,大多是採接單後才向書商訂書,藉此降低本身的庫存成本。請問博客來網路書店是屬於何種供應鏈?(單選)
(B) 拉式基礎的供應鏈
正確答案: B
31.璿璿愛打網路遊戲,常常上遊戲基地的虛擬寶物區與網友們交換裝備。請問遊戲基地虛擬寶物區的出現,是來自虛擬社群互動基礎的哪一項?[單選] 回答錯誤
B.Plurk
正確答案: B
32.28. 網站扮演市場製造者的角色,將買賣雙方聚集起來,並從交易中抽取用,是屬於哪一種收益模式?[單選]
C.經紀模式
正確答案: C
33.42)
Which type of e-commerce is distinguished by the type of technology used in the
transaction rather than by the nature of the market relationship?
C)
mobile e-commerce
正確答案: C
34.在顧客間或供應商、顧客,或競爭者之間,透過網路進行交易而成的商務行為指的是?[單選]
B.降低傳遞成本
正確答案: B
35.3. 下列哪些是常見的網路犯罪?(複選)
(A) 網路販賣盜版光碟
(B) 網路販賣贓物
(C) 入侵他人網站
正確答案: A B C
36.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
37.3. 有關電子商務的定義,下列哪些錯誤?(複選)
(A) 電子商務就是不用在網路上做生意
(C) 電子商務一定要透過網路線來傳遞
正確答案: A C
38.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
B
.
(B) 著作權
C
.
(C) 專利權
D
.
(D) 商標權
正確答案: B C D
39.8. 下列何者不受著作權法的保護?(單選)
(B) 中華民國憲法
(C) 學校的試題
(D) 學校的網頁
正確答案: B C D
40.6. 有關網路禮儀,下列哪些正確?(複選)
(A) 電腦禮儀的基本原則是「尊重」
(C) 轉載別人的文章時,最好註明出處
(D) 最好取得原作者的同意後再進行轉載
正確答案: A C D
41.47)
Bundling is the process of selling two or more products together for a price
that is less than the sum of the two product's individual prices.
是非題 (2 分) 2分
A.A
正確答案: A
42.39)
E-commerce technologies provide a unique, many-to-many model of mass
communication.
是非題 (2 分) 2分
A.A
正確答案: A
43.37)
FREAK is an example of a software vulnerability.
是非題 (2 分) 2分
A.A
正確答案: A
44.28) The
term latency refers to a delay that can be experienced in packet-switched
networks.
是非題 (2 分) 2分
A.A
正確答案: A
45.32)
Using prebuilt templates is typically one of the most inexpensive options when
building an e-commerce site.
是非題 (2 分) 2分
A.A
正確答案: A
46.32)
Phishing attacks rely on browser parasites.
是非題 (2 分) 2分
B.B
正確答案: B
47.81)
There is a finite number of Bitcoins that can be created.
是非題 (2 分) 2分
A.A
正確答案: A
48.57)
Tier 1 ISPs provide Internet access to consumers and businesses.
是非題 (2 分) 2分
B.B
正確答案: B
49.33)
WannaCry is an example of ransomware.
是非題 (2 分) 2分
A.A
正確答案: A
50.55)
T1 and T3 refer to international telephone standards for digital communication.
是非題 (2 分) 2分
A.A
正確答案: A
1.70)
Which of the following refers to the displacement of market middlemen and the
creation of a new direct relationship between producers and consumers?
B)
disintermediation
正確答案: B
2.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]
D.興趣
正確答案: D
3.56) Which
of the following statements is not true?
C) A VPN
uses a dedicated secure line.
正確答案: C
4.26. 「amazon.com 透過網路來銷售,產品選擇範圍廣,同時在倉庫配貨運送,後來更推出網路商城,商家可以在商城開店,就像進駐百貨公司專櫃一樣」,請問上述符合網路商業模式創新的哪個條件?[單選]
C.亮眼的業績表現
正確答案: C
5.4. 下列哪一個屬於資料蒐集技術?(單選)
(C) 電話客服中心
正確答案: C
6.承阿宏的公司,他甚至還想到整個作業流程都必須改變,為防止新、舊系統 整合的問題,更設立幾個檢核點來確保過程沒有偏差。請問這類的問題較接近 哪個面向?[單選]
B. 流程面
正確答案: B
7.在線上以物易物的方式進行交易,在電子商務中屬於何種經營模式?[單選]
D.Peer
to People
正確答案: D
8.28)
When using multivariate testing, if you wish to test three elements, such as an
image, a button, and a piece of text, each with two different versions, how
many combinations will you need to test?
D) 8
正確答案: D
9.51) A
________ is hardware or software that acts as a filter to prevent unwanted
packets from entering a network.
A)
firewall
正確答案: A
10.請問企業對企業間電子商務是透過?[單選]
A.
Extranet
正確答案: A
11.42)
Advantages of dynamic page generation include all of the following except:
D)
client-side execution of programming.
正確答案: D
12.67) A
________ refers to a competitive strategy in which firms attempt to achieve
lower business process costs.
A)
strategy of cost competition
正確答案: A
13.下列何者不是顧客關係管理的關鍵成功因素?[單選]
C. 上、下游廠商配合度
正確答案: C
14.10. 網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關係?(單選)
(C) 網站是否提供線上購物的服務
正確答案: C
15.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]
C.金流
正確答案: C
16.42)
Asymmetric key cryptography is also known as:
A)
public key cryptography.
正確答案: A
17.請問下列何者非呈現式廣告的概念?[單選]
B. 又稱為關鍵字廣告
正確答案: B
18.10)
The ________ allows a natural language expression, such as Google.com to
represent a numeric IP address.
C)
domain name system
正確答案: C
19.15)
Which of the following forms of online advertising is expected to grow the most
between 2020 and 2024?
D) video
正確答案: D
20.68)
Which of the following features of e-commerce technology changes industry
structure by lowering barriers to entry but greatly expands the market at the
same time?
A)
global reach
正確答案: A
21.52) Which
of the following describes the basic web policy of large firms during the
Invention period?
D)
Maintain a basic, static website depicting the firm's brand.
正確答案: D
22.66)
All of the following are website design features that annoy customers except:
D)
multi-browser functionality.
正確答案: D
23.30)
The NIKEiD program is an example of which of the following marketing
techniques?
A)
customer co-production
正確答案: A
24.6)
Which of the following is the core communications protocol for the Internet?
C)
TCP/IP
正確答案: C
25.在設立B to B交易平台的時候,會非常注意市集的風險控管與安全無虞的付款機制,請問這是注意B to B交易平台影響因素的哪一項?[單選] 回答錯誤
D.市場接受度
正確答案: D
26.47)
Which of the following is not a concern about IoT?
A) the
falling cost of sensors
正確答案: A
27.38)
The leading web server software is:
A)
Apache.
正確答案: A
28.26)
All of the following can be considered examples of the market creator business
model except:
D)
Twitter.
正確答案: D
29.25)
Which of the following is a utility program that allows you to track the path
of a message sent from a client computer to a remote computer on the Internet?
D)
Tracert
正確答案: D
30.65)
You could expect to find all of the following services in a web server software
package except:
D) an
RSS aggregator.
正確答案: D
31.下列何者非數位匯流的概念?[單選]
B. 經由郵局寄送信件
正確答案: B
32.65) What
is the first step in developing an e-commerce security plan?
C)
Perform a risk assessment.
正確答案: C
33.78)
View-to-cart ratio is a measure of the:
B)
percentage of views that lead to an add-to-cart action.
正確答案: B
34.下列何者不是電子現金的特性?[單選]
B. 不可轉換性
正確答案: B
35.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
36.8. 下列何者不受著作權法的保護?(單選)
(B) 中華民國憲法
(C) 學校的試題
(D) 學校的網頁
正確答案: B C D
37.3. 有關電子商務的定義,下列哪些錯誤?(複選)
(A) 電子商務就是不用在網路上做生意
(C) 電子商務一定要透過網路線來傳遞
正確答案: A C
38.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
39.6. 有關網路禮儀,下列哪些正確?(複選)
(A) 電腦禮儀的基本原則是「尊重」
(C) 轉載別人的文章時,最好註明出處
(D) 最好取得原作者的同意後再進行轉載
正確答案: A C D
40.3. 下列哪些是常見的網路犯罪?(複選)
(A) 網路販賣盜版光碟
B
.
(B) 網路販賣贓物
C
.
(C) 入侵他人網站
正確答案: A B C
41.65)
SaaS and PaaS providers can typically provide services at lower costs through
scale economies.
是非題 (2 分) 2分
A.A
正確答案: A
42.83)
An HTML5 app is one designed to specifically operate using a mobile device's
hardware and operating system.
是非題 (2 分) 2分
B.B
正確答案: B
43.35)
Slow followers are sometimes more successful than first movers.
是非題 (2 分) 2分
A.A
正確答案: A
44.78)
The Internet's universal standards have changed industry structure by increasing
barriers to entry and decreasing competition within an industry.
是非題 (2 分) 2分
B.B
正確答案: B
45.73)
The current versions of most web browsers no longer support Java applets.
是非題 (2 分) 2分
A.A
正確答案: A
46.33)
In general, the annual system maintenance cost will roughly parallel the
development cost.
是非題 (2 分) 2分
A.A
正確答案: A
47.44) A
significant percentage of online ad impressions served are not actually viewed
or even viewable.
是非題 (2 分) 2分
A.A
正確答案: A
48.59)
Which of the following is the most common protocol for securing a digital
channel of communication?
是非題 (2 分) 2分
B) TLS
正確答案: B
49.78)
About 75% of U.S. smart speaker users make voice-based purchases using those
devices.
是非題 (2 分) 2分
B.B
正確答案: B
50.84)
The information systems discipline spans the technical and behavioral
approaches to e-commerce.
是非題 (2 分) 2分
A.A
正確答案: A
1.65)
Which of the following is a characteristic of the Consolidation phase of
e-commerce?
C) brand
extension and strengthening becomes more important than creating new brands
2.6. 有關電子商務的特性,下列描述何者正確?[單選]
C.全年全天無休
3.45)
Which of the following is not an example of an on-demand service company? 回答錯誤
D)
Facebook
4.10)
Which of the following is not a major business trend in e-commerce in
2020-2021?
B)
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
5.在電子商務的構面中,廠商將產品送至消費者手上的過程,指的是下列何者?[單選] 回答錯誤
D.顧客關係管理
6.忍忍今天想做張卡片給心愛的女友薇薇,開心的在網路上使用Picasa沖印服務,請問這是屬於電子商務的哪個範疇?[單選] 回答錯誤
C.服務電子化
7.1. 透過電腦網路進行購買、銷售、運送、產品、服務交換之過程,我們稱為?(單選)
(B) 電子商務
8.28)
Interactivity in the context of e-commerce provides which of the following
functionalities?
D) the
enabling of two-way communication between consumer and merchant
9.64)
Which of the following is a characteristic of the Reinvention phase of
e-commerce?
D)
expansion of e-commerce to include services as well as goods
10.79)
Which of the following is an important societal issue related to e-commerce?
D)
intellectual property
11.52)
Which of the following describes the basic web policy of large firms during the
Invention period?
D)
Maintain a basic, static website depicting the firm's brand.
12.34)
E-commerce is available just about everywhere and anytime. This is known as:
C)
ubiquity.
13.9.
amazon.com 透過資料庫以及相關資訊科技的幫助,推出推薦書單的服務,這是屬於何種理論?(單選) 回答錯誤
(D) 個人佔有率
14.50)
M-commerce is the type of e-commerce that generates the most revenue.
B.B
15.13) Which
of the following statements about the mobile platform is not true?
B) Over
235 million individuals in the United States used tablet computer apps in 2020.
16.14)
Which of the following statements about the Web is not true?
A) The
Web is the technology upon which the Internet is based.
17.57)
All of the following are examples of Web 2.0 sites and applications except:
D)
auction sites.
18.9. 在電子商務的構面中,廠商將產品送至消費者手上的過程,是指? [單選]
D.物流
19.一套藉由企業內部網路快速建置及整合公司採購後勤、生產、行銷、人資、財務、研發等部門機能來提升企業作業流程的系統,指的是下列何者?[單選] 回答錯誤
C.C2C
20.46)
Which of the following is a platform for B2B e-commerce?
D)
Go2Paper
21.16)
Which of the following was the original "killer app" that made the
Internet commercially interesting and extraordinarily popular?
B) the
Web
22.5)
Which of the following is an example of e-business?
A)
Amazon's inventory control system
23.23)
Which of the following features of e-commerce technology allows users to
participate in the creation of online content? 回答錯誤
D)
social technology
24.6)
Which of the following can be considered synonymous with the term e-commerce?
B)
digital commerce
25.8)
All of the following statements about e-commerce in the United States in 2020
are true except:
A)
Social e-commerce generated more revenue than mobile e-commerce.
26.29)
The cost incurred by merchants to change product prices (i.e., the costs of
reentering prices into computer systems) is referred to as:
C) Menu
costs.
27.根據Kalakota & Whinston
(1997年) 提出電子商務架構的概念,「Java」屬於 哪一種基礎架構?[單選] 回答錯誤
D.多媒體內容及網路出版基礎架構
28.1)
Analysts estimate that by 2024, consumers will be spending around _______ in
digital transactions.
D) $1.8
trillion
29.7)
Which of the following is not true about the use of apps?
B) Users
still spend more time using mobile browsers than they do using mobile apps.
30.阿光不小心弄壞了小仙的耳機,因而上PChome Online找尋賣家,請問PChome Online拍賣是屬於電子商務的哪一類?[單選] 回答錯誤
C.金流
31.就一般而論,在電子商務交易市場中,下列何者交易金額最高? [單選]
C.B2B
32.下列何者不是電子商務的特性?[單選]
C.演算價值
33.4)
Which of the following best defines e-commerce?
A)
digitally enabled commercial transactions between and among organizations and
individuals
34.15)
In 2019, there were more than ________ Internet hosts worldwide.
D) 1
billion
35.58)
Which of the following is not a characteristic of a perfect competitive market?
D) It is
highly regulated.
36.3. 有關電子商務的定義,下列哪些錯誤?(複選)
(A) 電子商務就是不用在網路上做生意
(C) 電子商務一定要透過網路線來傳遞
37.2) It
is likely that e-commerce will eventually impact nearly all commerce.
A. A
38.39)
E-commerce technologies provide a unique, many-to-many model of mass
communication.
A.A
39.74)
Price dispersion has been eliminated in e-commerce.
B.B
40.C)72)
The emergence of mobile, social, and local e-commerce occurred during the
Consolidation period of e-commerce.
B.B
41.73)
The Reinvention period of e-commerce is as much a sociological phenomenon as it
is a technological or business phenomenon.
A.A
42.35)
Ubiquity increases the cognitive energy required to transact in a marketspace.
B.B
43.18) E-commerce
and e-business systems blur together at the business firm boundary, where
internal business systems link up with suppliers or customers.
A.A
44.19)
The Internet has shown similar growth patterns as other electronic technologies
of the past.
B.B
45.36)
Universal standards make price discovery more costly, slower, and less
accurate.
B.B
46.80)
E-commerce poses special challenges to methods used in the past to protect
intellectual property rights.
A.A
47.38)
Personalization involves targeting marketing messages to specific individuals
by adjusting the message based upon a consumer's preferences or past purchasing
behavior.
A.A
48.37)
Price transparency refers to the ease with which consumers can find out what
merchants pay for products.
B.B
49.84)
The information systems discipline spans the technical and behavioral
approaches to e-commerce.
A.A
50.17)
The term e-commerce refers to the digital enabling of business processes both
inside and outside the firm.
B.B
---------------------------
---------------------------
1.23)
Which of the following features of e-commerce technology allows users to
participate in the creation of online content?
D)
social technology
2.70)
Which of the following refers to the displacement of market middlemen and the
creation of a new direct relationship between producers and consumers?
B)
disintermediation
3.32)
_________ represents the total number of users or customers an e-commerce
business can obtain.
C) Reach
4.15) In
2019, there were more than ________ Internet hosts worldwide.
D) 1
billion
5.50)
M-commerce is the type of e-commerce that generates the most revenue.
B.B
6.65)
Which of the following is a characteristic of the Consolidation phase of
e-commerce?
C) brand
extension and strengthening becomes more important than creating new brands
7.10)
Which of the following is not a major business trend in e-commerce in
2020-2021?
B)
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
8.63)
Which of the following best describes the early years of e-commerce?
A) They
were a technological success but a mixed business success.
9.阿光不小心弄壞了小仙的耳機,因而上PChome Online找尋賣家,請問PChome Online拍賣是屬於電子商務的哪一類?[單選]
C.金流
10.14. 在電子商務交易中,供應商想降低採購與工程發包成本,使用台塑網的平台來找尋另外一家廠商,這是下列何種型態?[單選]
A.B2B
11.78)
Which business application is associated with the technological development of
local area networks and client/server computing?
D)
workgroup automation (e.g., document sharing)
12.21. 依據梅特卡夫定律(Metcalfe's Law),若網路上只有兩個人,就只有一組對話;當有三個人時,就有三組對話,當四個人時,就有六組對話;當有五個人時,就有十組對話。依此類推,請問當有六個人時,會有幾組對話?[單選] 回答錯誤
B.間接網路外部性
13.6)
Which of the following can be considered synonymous with the term e-commerce?
B)
digital commerce
14.28)
Interactivity in the context of e-commerce provides which of the following
functionalities?
D) the
enabling of two-way communication between consumer and merchant
15.21)
Which of the following is not a unique feature of e-commerce technology?
C)
information asymmetry
16.60)
Unfair competitive advantages occur when:
A) one
competitor has an advantage that others cannot purchase.
17.26)
Which of the following features of e-commerce technology is related to the
concept of network externalities? 回答錯誤
C)
universal standards
18.一套藉由企業內部網路快速建置及整合公司採購後勤、生產、行銷、人資、財務、研發等部門機能來提升企業作業流程的系統,指的是下列何者?[單選]
C.C2C
19.61)
The early years of e-commerce were driven by all of the following factors
except:
A) an
emphasis on exploiting traditional distribution channels.
20.24)
Which of the following is the best definition of transaction cost?
B) the
cost of participating in a market
21.83)
Which of the following statements is not true?
B)
Economists take a purely technical approach to e-commerce.
22.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]
C.金流
23.31)
Which of the following is a physical place you visit in order to transact?
B)
marketplace
24.11)
Which of the following is not a major technology trend in e-commerce in
2020-2021?
D)
Growth of the Internet of Things slows down.
25.根據Kalakota & Whinston
(1997年) 提出電子商務架構的概念,「EDI」屬於哪一種基礎架構?[單選]
C.商業媒介收益模式
26.53)
All of the following can be considered a precursor to e-commerce except:
A) the
development of the smartphone.
27.在電子商務的構面中,廠商將產品送至消費者手上的過程,指的是下列何者?[單選]
D.顧客關係管理
28.16)
Which of the following was the original "killer app" that made the
Internet commercially interesting and extraordinarily popular?
B) the
Web
29.4)
Which of the following best defines e-commerce?
A)
digitally enabled commercial transactions between and among organizations and
individuals
30.在顧客間或供應商、顧客,或競爭者之間,透過網路進行交易而成的商務行為指的是?[單選]
B.降低傳遞成本
31.13)
Which of the following statements about the mobile platform is not true?
B) Over
235 million individuals in the United States used tablet computer apps in 2020.
32.59)
All of the following were visions of e-commerce expressed during the early
years of e-commerce except:
D) fast
follower advantage.
33.7)
Which of the following is not true about the use of apps?
B) Users
still spend more time using mobile browsers than they do using mobile apps.
34.46)
Which of the following is a platform for B2B e-commerce?
D)
Go2Paper
35.25)
The world's online population was estimated to be around ________ in 2020.
B) 4 billion
36.3. 有關電子商務的定義,下列哪些錯誤?(複選)
(A) 電子商務就是不用在網路上做生意
(C) 電子商務一定要透過網路線來傳遞
37.39)
E-commerce technologies provide a unique, many-to-many model of mass
communication.
A.A
38.17)
The term e-commerce refers to the digital enabling of business processes both
inside and outside the firm.
B.B
39.84)
The information systems discipline spans the technical and behavioral
approaches to e-commerce.
A.A
40.73)
The Reinvention period of e-commerce is as much a sociological phenomenon as it
is a technological or business phenomenon.
A.A
41.37)
Price transparency refers to the ease with which consumers can find out what
merchants pay for products.
B.B
42.C)72)
The emergence of mobile, social, and local e-commerce occurred during the
Consolidation period of e-commerce.
B.B
43.2) It
is likely that e-commerce will eventually impact nearly all commerce.
A.A
44.80)
E-commerce poses special challenges to methods used in the past to protect
intellectual property rights.
A.A
45.35)
Ubiquity increases the cognitive energy required to transact in a marketspace.
B.B
46.18)
E-commerce and e-business systems blur together at the business firm boundary,
where internal business systems link up with suppliers or customers.
A.A
47.19)
The Internet has shown similar growth patterns as other electronic technologies
of the past.
B.B
48.38)
Personalization involves targeting marketing messages to specific individuals
by adjusting the message based upon a consumer's preferences or past purchasing
behavior.
A.A
49.36)
Universal standards make price discovery more costly, slower, and less
accurate.
B.B
50.74)
Price dispersion has been eliminated in e-commerce.
B.B
-------------------
-------------------
1.45) Which
of the following is not an example of an on-demand service company?
D)
Facebook
2.12)
Which of the following has not been the subject of concern about its increasing
market dominance in 2020-2021?
C)
Netflix
3.60)
Unfair competitive advantages occur when:
A) one
competitor has an advantage that others cannot purchase.
4.52)
Which of the following describes the basic web policy of large firms during the
Invention period?
D)
Maintain a basic, static website depicting the firm's brand.
5.4. 國內線上音樂提供者 KKBOX,其有別於一般傳統的實體商店賣 CD,而是在網路上直接付費點播下載,這是屬於電子商務的何種特性?(單選)
(A) 數位化
6.8) All
of the following statements about e-commerce in the United States in 2020 are
true except:
A)
Social e-commerce generated more revenue than mobile e-commerce.
7.70)
Which of the following refers to the displacement of market middlemen and the
creation of a new direct relationship between producers and consumers?
B)
disintermediation
8.31)
Which of the following is a physical place you visit in order to transact?
B)
marketplace
9.阿光不小心弄壞了小仙的耳機,因而上PChome Online找尋賣家,請問PChome Online拍賣是屬於電子商務的哪一類?[單選]
C.金流
10.69)
Which of the following refers to the practice of researching a product online
before purchasing it at a physical store?
D)
webrooming
11.就一般而論,在電子商務交易市場中,下列何者交易金額最高? [單選]
C.B2B
12.21)
Which of the following is not a unique feature of e-commerce technology?
C)
information asymmetry
13.28) Interactivity
in the context of e-commerce provides which of the following functionalities?
D) the
enabling of two-way communication between consumer and merchant
14.24)
Which of the following is the best definition of transaction cost?
B) the
cost of participating in a market
15.83)
Which of the following statements is not true?
B)
Economists take a purely technical approach to e-commerce.
16.15)
In 2019, there were more than ________ Internet hosts worldwide.
D) 1
billion
17.5. 電子商務交易中,供應商想降低採購與工程發包成本,便到網路上的平台找尋另外一家廠商,此為下列何種型態?(單選)
(A) B2B
18.21. 依據梅特卡夫定律(Metcalfe's Law),若網路上只有兩個人,就只有一組對話;當有三個人時,就有三組對話,當四個人時,就有六組對話;當有五個人時,就有十組對話。依此類推,請問當有六個人時,會有幾組對話?[單選]
B.間接網路外部性
19.27)
Which of the following statements is true about the traditional tradeoff
between the richness and reach of a marketing message prior to the development
of the Web?
C) The
larger the audience reached, the less rich the message.
20.59)
All of the following were visions of e-commerce expressed during the early
years of e-commerce except:
D) fast
follower advantage.
21.58)
Which of the following is not a characteristic of a perfect competitive market?
D) It is
highly regulated.
22.65)
Which of the following is a characteristic of the Consolidation phase of
e-commerce?
C) brand
extension and strengthening becomes more important than creating new brands
23.78)
Which business application is associated with the technological development of
local area networks and client/server computing?
D)
workgroup automation (e.g., document sharing)
24.29)
The cost incurred by merchants to change product prices (i.e., the costs of
reentering prices into computer systems) is referred to as:
C) Menu
costs.
25.53)
All of the following can be considered a precursor to e-commerce except:
A) the
development of the smartphone.
26.下列何者不是電子商務的特性?[單選]
C.演算價值
27.14)
Which of the following statements about the Web is not true?
A) The
Web is the technology upon which the Internet is based.
28.77) Above
all, e-commerce is a ________ phenomenon.
A)
technology driven
29.阿騰最近想換一台電腦,開始上MOBILE01參考許多網友的意見來幫他做最好的決定,這是屬於電子商務的何種特性?[單選] 回答錯誤
A.豐富性
30.一套藉由企業內部網路快速建置及整合公司採購後勤、生產、行銷、人資、財務、研發等部門機能來提升企業作業流程的系統,指的是下列何者?[單選]
C.C2C
31.68)
Which of the following is an example of an e-commerce first mover that failed?
B) eToys
32.16)
Which of the following was the original "killer app" that made the
Internet commercially interesting and extraordinarily popular?
B) the
Web
33.22)
Which of the following features of e-commerce technology enables merchants to
market and sell "complex" goods and services to consumers via
marketing messages that can integrate video, audio, and text?
A)
richness
34.阿達今天到星巴克消費得很開心,回家立刻上網加入星巴克Facebook粉絲團並推薦了很多朋友加入,請問這屬於電子商務的哪個範疇?[單選] 回答錯誤
D.演算價值
35.消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬於電子商務構面中的哪一種?[單選] 回答錯誤
C.個人化
36.3. 有關電子商務的定義,下列哪些錯誤?(複選)
(A) 電子商務就是不用在網路上做生意
(C) 電子商務一定要透過網路線來傳遞
37.73)
The Reinvention period of e-commerce is as much a sociological phenomenon as it
is a technological or business phenomenon.
A.A
38.37)
Price transparency refers to the ease with which consumers can find out what
merchants pay for products.
B.B
39.36)
Universal standards make price discovery more costly, slower, and less
accurate.
B.B
40.74)
Price dispersion has been eliminated in e-commerce.
B.B
41.38)
Personalization involves targeting marketing messages to specific individuals
by adjusting the message based upon a consumer's preferences or past purchasing
behavior.
A.A
42.17) The
term e-commerce refers to the digital enabling of business processes both
inside and outside the firm.
B.B
43.19)
The Internet has shown similar growth patterns as other electronic technologies
of the past.
B.B
44.2) It
is likely that e-commerce will eventually impact nearly all commerce.
是非題 (2 分) 2分
A.A
45.C)72)
The emergence of mobile, social, and local e-commerce occurred during the
Consolidation period of e-commerce.
B.B
46.39)
E-commerce technologies provide a unique, many-to-many model of mass
communication.
A.A
47.80)
E-commerce poses special challenges to methods used in the past to protect
intellectual property rights.
A.A
48.84)
The information systems discipline spans the technical and behavioral
approaches to e-commerce.
A.A
49.18)
E-commerce and e-business systems blur together at the business firm boundary,
where internal business systems link up with suppliers or customers.
A.A
50.35)
Ubiquity increases the cognitive energy required to transact in a marketspace.
B.B
-----------------
-----------------
1.就一般而論,在電子商務交易市場中,下列何者交易金額最高? [單選]
C.B2B
2.21. 依據梅特卡夫定律(Metcalfe's Law),若網路上只有兩個人,就只有一組對話;當有三個人時,就有三組對話,當四個人時,就有六組對話;當有五個人時,就有十組對話。依此類推,請問當有六個人時,會有幾組對話?[單選]
B.間接網路外部性
3.68)
Which of the following is an example of an e-commerce first mover that failed?
B) eToys
4.7. 美兆健康管理中心在進行健康檢查前會寄送生活習慣檢查問卷表給即將前來健檢的顧客,以供往後分析顧客健康狀況之用,這屬於下列何種概念?(單選)
(B) 顧客關係管理
5.21) Which
of the following is not a unique feature of e-commerce technology?
C)
information asymmetry
6.阿光不小心弄壞了小仙的耳機,因而上PChome Online找尋賣家,請問PChome Online拍賣是屬於電子商務的哪一類?[單選]
C.金流
7.78)
Which business application is associated with the technological development of
local area networks and client/server computing?
D)
workgroup automation (e.g., document sharing)
8.1. 透過電腦網路進行購買、銷售、運送、產品、服務交換之過程,我們稱為?(單選)
(B) 電子商務
9.58)
Which of the following is not a characteristic of a perfect competitive market?
D) It is
highly regulated.
10.一套藉由企業內部網路快速建置及整合公司採購後勤、生產、行銷、人資、財務、研發等部門機能來提升企業作業流程的系統,指的是下列何者?[單選]
C.C2C
11.12)
Which of the following has not been the subject of concern about its increasing
market dominance in 2020-2021?
C)
Netflix
12.42)
Which type of e-commerce is distinguished by the type of technology used in the
transaction rather than by the nature of the market relationship?
C)
mobile e-commerce
13.29)
The cost incurred by merchants to change product prices (i.e., the costs of
reentering prices into computer systems) is referred to as:
C) Menu
costs.
14.在電子商務的構面中,廠商將產品送至消費者手上的過程,指的是下列何者?[單選]
D.顧客關係管理
15.44)
Business-to-consumer (B2C) e-commerce in the United States:
A) grew
at double-digit rates between 2010 and 2020.
16.64)
Which of the following is a characteristic of the Reinvention phase of
e-commerce?
D)
expansion of e-commerce to include services as well as goods
17.54)
________ was the first truly large-scale digitally enabled transaction system
in the B2C arena.
C) The
French Minitel
18.48)
All of the following are platforms for social e-commerce except:
C) Y
Combinator.
19.62)
The early years of e-commerce are considered:
C) a stunning
technological success as the Internet and the Web increased from a few thousand
to billions of e-commerce transactions per year.
20.70)
Which of the following refers to the displacement of market middlemen and the
creation of a new direct relationship between producers and consumers?
B)
disintermediation
21.27)
Which of the following statements is true about the traditional tradeoff
between the richness and reach of a marketing message prior to the development
of the Web?
C) The
larger the audience reached, the less rich the message.
22.33)
Which of the following refers to the complexity and content of a message?
A)
richness
23.31)
Which of the following is a physical place you visit in order to transact?
B)
marketplace
24.23)
Which of the following features of e-commerce technology allows users to
participate in the creation of online content?
D)
social technology
25.9.
amazon.com 透過資料庫以及相關資訊科技的幫助,推出推薦書單的服務,這是屬於何種理論?(單選)
(D) 個人佔有率
26.59)
All of the following were visions of e-commerce expressed during the early
years of e-commerce except:
D) fast
follower advantage.
27.根據Kalakota & Whinston
(1997年) 提出電子商務架構的概念,「Java」屬於 哪一種基礎架構?[單選]
D.多媒體內容及網路出版基礎架構
28.9) In
2020, about ________ of Internet users in the United States accessed the
Internet solely using a mobile device.
B) 21%
29.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]
C.金流
30.8. 電子商務可藉由許多的媒體與傳播管道與消費者進行溝通,以便更即時的獲得消費者的需求與購買資訊。請問這是屬於電子商務的哪個特性?[單選]
B.快速化
31.9. 在電子商務的構面中,廠商將產品送至消費者手上的過程,是指? [單選]
D.物流
32.4. 國內線上音樂提供者 KKBOX,其有別於一般傳統的實體商店賣 CD,而是在網路上直接付費點播下載,這是屬於電子商務的何種特性?(單選)
(A) 數位化
33.52)
Which of the following describes the basic web policy of large firms during the
Invention period?
D) Maintain
a basic, static website depicting the firm's brand.
34.57)
All of the following are examples of Web 2.0 sites and applications except:
D)
auction sites.
35.16)
Which of the following was the original "killer app" that made the
Internet commercially interesting and extraordinarily popular?
B.B) the
Web
36.3. 有關電子商務的定義,下列哪些錯誤?(複選)
(A) 電子商務就是不用在網路上做生意
(C) 電子商務一定要透過網路線來傳遞
37.C)72)
The emergence of mobile, social, and local e-commerce occurred during the
Consolidation period of e-commerce.
B.B
38.38)
Personalization involves targeting marketing messages to specific individuals
by adjusting the message based upon a consumer's preferences or past purchasing
behavior.
A.A
39.37)
Price transparency refers to the ease with which consumers can find out what
merchants pay for products.
B.B
40.2) It
is likely that e-commerce will eventually impact nearly all commerce.
A.A
41.84)
The information systems discipline spans the technical and behavioral
approaches to e-commerce.
A.A
42.19)
The Internet has shown similar growth patterns as other electronic technologies
of the past.
B.B
43.39)
E-commerce technologies provide a unique, many-to-many model of mass
communication.
A.A
44.73)
The Reinvention period of e-commerce is as much a sociological phenomenon as it
is a technological or business phenomenon.
A.A
45.80)
E-commerce poses special challenges to methods used in the past to protect
intellectual property rights.
A.A
46.74)
Price dispersion has been eliminated in e-commerce.
B.B
47.17)
The term e-commerce refers to the digital enabling of business processes both
inside and outside the firm.
B.B
48.18) E-commerce
and e-business systems blur together at the business firm boundary, where
internal business systems link up with suppliers or customers.
A.A
49.36)
Universal standards make price discovery more costly, slower, and less
accurate.
B.B
50.35)
Ubiquity increases the cognitive energy required to transact in a marketspace.
B.B
---------
---------
What
refers to the complexity and content of a message?
Richness
(T/F)
Price dispersion has been eliminated in e-commerce.
False
What is
not a platform for social e-commerce?
Y
Combinator
What is
NOT true regarding e-commerce today?
The
market middlemen disappeared.
What
best defines e-commerce?
Digitally
enabled commercial transactions between and among organizations and individuals
What is
not a major technology trend in e-commerce in 2020-2021?
Growth
of the Internet of Things slows down.
What is
a platform for B2B e-commerce?
Go2Paper
(T/F)
Price transparency refers to the ease with which consumers can find out what
merchants pay for products.
False
Analysts
estimate that by 2024, consumers will be spending around ________ in digital
transactions.
$1.8
trillion
Which of
the following statements is not true? (1)
Overall
transaction costs have dropped dramatically.
Which of
the following statements is not true? (2)
Economists
take a purely technical approach to e-commerce.
What was
NOT a visions of e-commerce expressed during the early years of e-commerce.
Fast
Follower Advantage
________
represents the total number of users or customers an e-commerce business can
obtain.
Reach
The
early years of e-commerce wasn't driven by:
An
emphasis on exploiting traditional distribution channels.
(T/F)
Universal standards make price discovery more costly, slower, and less
accurate.
False
(T/F)
M-commerce is the type of e-commerce that generates the most revenue.
False
________
was the first truly large-scale digitally enabled transaction system in the B2C
arena.
The
French Minitel
What
statement is true about the traditional tradeoff between the richness and reach
of a marketing message prior to the development of the Web?
The
larger the audience reached, the less rich the message.
What is
NOT a characteristic of a perfect competitive market?
It is
highly regulated.
What is
NOT an example of an on-demand service company?
Facebook
(T/F)
The term e-commerce refers to the digital enabling of business processes both
inside and outside the firm.
False
What is
NOT a major business trend in e-commerce in 2020-2021?
Retail
e-commerce revenues exceed B2B e-commerce revenues for the first time.
What is
a characteristic of the Consolidation phase of e-commerce?
Brand
extension and strengthening becomes more important than creating new brands.
What is
a feature of e-commerce technology that allows users to participate in the
creation of online content?
Social
Technology
(T/F)
E-commerce poses special challenges to methods used in the past to protect
intellectual property rights.
True
It is estimated
that by 2024, B2B e-commerce will generate ________ in revenues.
$9.8
trillion
What
canNOT be considered a precursor to e-commerce?
The
development of the smartphone.
What
best describes the early years of e-commerce?
They
were a technological success but a mixed business success.
What is
a characteristic of the Reinvention phase of e-commerce?
Expansion
of e-commerce to include services as well as goods.
E-commerce
is available just about everywhere and anytime. This is known as:
Ubiquity.
The text
identifies which year as the year e-commerce began?
1995.
(T/F)
The emergence of mobile, social, and local e-commerce occurred during the
Consolidation period of e-commerce.
False
What
feature of e-commerce technology enables merchants to market and sell
"complex" goods and services to consumers via marketing messages that
can integrate video, audio, and text?
Richness
What is
an example of e-business?
Amazon's
inventory control system.
What is
not true about the use of apps?
Users
still spend more time using mobile browsers than they do using mobile apps.
What is
NOT an example of Web 2.0 sites and applications?
Auction
sites.
What
refers to any disparity in relevant market information among parties in a
transaction?
Information
Assymetry
Which
company has not been the subject of concern about its increasing market
dominance in 2020-2021?
Netflix
(T/F) It
is likely that e-commerce will eventually impact nearly all commerce.
True
What term
can be considered synonymous with the term e-commerce?
Digital
commerce.
What
term refers to the practice of researching a product online before purchasing
it at a physical store?
Webrooming
The cost
incurred by merchants to change product prices (i.e., the costs of reentering
prices into computer systems) is referred to as:
Menu
Costs.
What
business application is associated with the technological development of local
area networks and client/server computing?
Workgroup
Automation (e.g., document sharing).
What is
a physical place you visit in order to transact called?
Marketplace
In 2019,
there were more than ________ Internet hosts worldwide.
1
billion.
What
describes the basic web policy of large firms during the Invention period?
Maintain
a basic, static website depicting the firm's brand.
In 2020,
about ________ of Internet users in the United States accessed the Internet
solely using a mobile device.
21%
What
features of e-commerce technology is related to the concept of network
externalities?
Universal
Standards.
What is
an important societal issue related to e-commerce?
Intellectual
Property.
Above
all, e-commerce is a ________ phenomenon.
Technology
driven.
What is
NOT a correct statement about e-commerce in the United States in 2020?
Social
e-commerce generated more revenue than mobile e-commerce.
What is
the best definition of transaction cost?
The cost
of participating in a market.
Unfair
competitive advantages occur when:
One
competitor has an advantage that others cannot purchase.
(T/F)
The Internet has shown similar growth patterns as other electronic technologies
of the past.
False
What is
a characteristic of e-commerce during the Invention period?
Disintermediation.
(T/F) E-commerce
technologies provide a unique, many-to-many model of mass communication.
True
What is
NOT a platform for C2C e-commerce.
Walmart.
Business-to-consumer
(B2C) e-commerce in the United States:
Grew at
double-digit rates between 2010 and 2020.
What is
an example of an e-commerce first mover that failed?
eToys.
(T/F)
Personalization involves targeting marketing messages to specific individuals
by adjusting the message based upon a consumer's preferences or past purchasing
behavior.
True
Which
type of e-commerce is distinguished by the type of technology used in the
transaction rather than by the nature of the market relationship?
Mobile e-commerce (aka: M-commerce).
What is
a leading platform for social e-commerce?
Facebook.
(T/F)
Ubiquity increases the cognitive energy required to transact in a marketspace.
False.
What was
the original "killer app" that made the Internet commercially
interesting and extraordinarily popular?
the Web.
What is
NOT a correct statement about the Web?
The Web
is the technology upon which the Internet is based.
The
early years of e-commerce are considered:
A
stunning technological success as the Internet and the Web increased from a few
thousand to billions of e-commerce transactions per year.
The
world's ONLINE population was estimated to be around ________ in 2020.
4
billion.
Interactivity
in the context of e-commerce provides what functionality?
The
enabling of two-way communication between consumer and merchant
(T/F) The
Reinvention period of e-commerce is as much a sociological phenomenon as it is
a technological or business phenomenon.
True.
What is
not a unique feature of e-commerce technology?
Information
Asymmetry.
(T/F)
E-commerce and e-business systems blur together at the business firm boundary,
where internal business systems link up with suppliers or customers.
True.
What is
NOT a true statement about the mobile platform?
Over 235
million individuals in the United States used tablet computer apps in 2020.
What is
NOT an element of friction-free commerce?
Transaction
costs are high.
(T/F)
The information systems discipline spans the technical and behavioral
approaches to e-commerce.
True.
What
refers to the displacement of market middlemen and the creation of a new direct
relationship between producers and consumers?
Disintermediation.
E-commerce
can be defined as:
A)
digitally enabled commercial transactions between and among organizations and
individuals.
Which of
the following is an example of e-business?
A)
Amazon's inventory control system
Which of
the following can be considered synonymous with the term e-commerce?
B)
digital commerce
Which of
the following is not a unique feature of e-commerce technology?
C)
information asymmetry
Which of
the following features of e-commerce technology enables merchants to market and
sell "complex" goods and services to consumers via marketing messages
that can integrate video, audio, and text?
A)
richness
Which of
the following features of e-commerce technology allows users to participate in
the creation of online content?
D)
social technology
Which of
the following is the best definition of transaction cost?
B) the
cost of participating in a market
The
world's online population was estimated to be around ________ in 2018.
B) 3.6
billion
Which of
the following features of e-commerce technology is related to the concept of
network externalities?
C)
universal standards
Which of
the following statements is true about the traditional tradeoff between the
richness and reach of a marketing message prior to the development of the Web?
C) The
larger the audience reached, the less rich the message.
Interactivity
in the context of e-commerce provides which of the following functionalities?
D) the
enabling of two-way communication between consumer and merchant
The
costs incurred by merchants in having to change product prices (such as the
costs of reentering prices into computer systems) are referred to as which of
the following?
C) menu
costs
Which of
the following refers to any disparity in relevant market information among
parties in a transaction?
A)
information asymmetry
Which of
the following is a physical place you visit in order to transact?
B)
marketplace
The
total number of users or customers an e-commerce business can obtain is a
measure of which of the following?
C) reach
Which of
the following refers to the complexity and content of a message?
A)
richness
E-commerce
is available just about everywhere and anytime. This is known as:
C)
ubiquity.
Which
type of e-commerce is distinguished by the type of technology used in the
transaction rather than by the nature of the market relationship?
C)
mobile e-commerce
Which of
the following is a leading platform for social e-commerce?
D)
Facebook
Business-to-consumer
(B2C) e-commerce in the United States:
A) grew
at double-digit rates between 2010 and 2018.
Which of
the following is not true about the use of apps?
B) Users
still spend less time using apps than they do using desktops or mobile
websites.
Which of
the following is an example of an on-demand service company?
B)
Airbnb
Which of
the following is a platform for B2B e-commerce?
D)
Go2Paper
All of
the following are platforms for C2C e-commerce except:
A)
Walmart
All of the
following are examples of social networks except:
C) Y
Combinator.
A)
social e-commerce generated more revenue than mobile e-commerce.
All of
the following statements about e-commerce in the United States in 2018 are true
except:
A)
social e-commerce generated more revenue than mobile e-commerce.
B)
mobile advertising accounted for over 70% of all digital advertising spending.
C)
on-demand service firms fueled the growth of local e-commerce.
D)
growth rates for retail e-commerce were higher in the Middle East than in the
United States.
B) 16%
In 2018,
about ________ of Americans accessed the Internet solely via a mobile device.
A) 8%
B) 16%
C) 28%
D) 34%
B)
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
Which of
the following is not a major business trend in e-commerce in 2018-2019?
A)
Mobile e-commerce continues to grow.
B)
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
C)
On-demand service companies garner multibillion-dollar valuations.
D)
Social e-commerce continues to grow.
D)
Growth of the Internet of Things slows down.
Which of
the following is not a major technology trend in e-commerce in 2018-2019?
A)
Mobile messaging services are now used by almost two-thirds of smartphone
users.
B) Firms
are turning to business analytics to make sense out of big data.
C) Smart
speakers provide an additional platform for e-commerce.
D)
Growth of the Internet of Things slows down.
C) concerns
about the U.S. Supreme Court ruling that online businesses do not need to
collect state sales tax.
All of
the following are major social trends in e-commerce in 2018-2019 except for:
A)
concerns about the flood of temporary, poorly paid jobs without benefits being
generated by on-demand service companies.
B)
concerns over commercial and governmental privacy invasion.
C)
concerns about the U.S. Supreme Court ruling that online businesses do not need
to collect state sales tax.
D)
concerns about the increasing market dominance of Facebook, Amazon, and Google.
B) Over
220 Americans used tablet computer apps in 2018.
Which of
the following statements about the mobile platform is not true?
A) Over
91% of Americans used a mobile device to access the Internet at least some of
the time in 2018.
B) Over
220 Americans used tablet computer apps in 2018.
C)
M-commerce purchases were expected to reach almost $280 billion in 2018.
D) The
time U.S. adults spend using mobile apps accounts for over 60% of total digital
minutes spent.
D)
Maintain a basic, static website depicting the firm's brand.
Which of
the following describes the basic web policy of large firms during the
Invention period?
A)
Integrate social networks and the mobile platform with website marketing.
B)
Emphasize the necessity for the Web to generate profits.
C) Use
the Web to sell complex goods and services online.
D)
Maintain a basic, static website depicting the firm's brand.
D) $7.3
trillion.
It is
estimated that by 2022, the size of the B2B market will reach:
A) $730
million.
B) $7.3
billion.
C) $730
billion.
D) $7.3
trillion.
A) The
Web is the technology upon which the Internet is based.
Which of
the following statements about the Web is not true?
A) The
Web is the technology upon which the Internet is based.
B) The
Web was the original "killer app."
C) The
Web provides access to pages written in Hypertext Markup Language.
D) The Web
is both a communications infrastructure and an information storage system.
D) 1
billion
In 2018,
there were more than ________ Internet hosts.
A) 1
million
B) 10
million
C) 100
million
D) 1
billion
A) the
development of the smartphone.
All of
the following can be considered a precursor to e-commerce except:
A) the
development of the smartphone.
B)
Baxter Healthcare's PC-based remote order entry system.
C) the
French Minitel.
D) the
development of Electronic Data Interchange standards.
C) The
French Minitel
________
was the first truly large-scale digitally enabled transaction system in the B2C
arena.
A) Telex
B) The
Baxter Healthcare system
C) The
French Minitel
D)
Eelectronic Data Interchange (EDI)
C) 1995
In which
year can e-commerce be said to have begun?
A) 1983
B) 1985
C) 1995
D) 2001
B)
inability to retain users.
All of
the following are issues facing Pinterest except:
A)
copyright infringement.
B)
inability to retain users.
C) spam.
D)
scams.
C)
disintermediation
Which of
the following is a characteristic of e-commerce during the Invention period?
A)
mobile technology
B)
earnings and profit emphasis
C)
disintermediation
D)
extensive government surveillance
D)
auction sites.
All of
the following are examples of Web 2.0 sites and applications except:
A)
photo-sharing sites.
B)
blogs.
C) wikis.
D) auction sites.
D) It is
highly regulated.
Which of
the following is not a characteristic of a perfect competitive market?
A)
Price, cost, and quality information are equally distributed.
B) A
nearly infinite set of suppliers compete against one another.
C)
Customers have access to all relevant information worldwide.
D) It is
highly regulated.
D) fast
follower advantage.
All of
the following were visions of e-commerce expressed during the early years of
e-commerce except:
A) a
nearly perfect information marketspace.
B)
friction-free commerce.
C)
disintermediation.
D) fast
follower advantage.
A) one
competitor has an advantage that others cannot purchase.
Unfair
competitive advantages occur when:
A) one
competitor has an advantage that others cannot purchase.
B)
market middlemen are displaced.
C)
information is equally distributed and transaction costs are low.
D) firms
are able to gather monopoly profits.
A) an
emphasis on exploiting traditional distribution channels.
The
early years of e-commerce were driven by all of the following factors except:
A) an
emphasis on exploiting traditional distribution channels.
B) a
huge infusion of venture capital funds.
C) an
emphasis on quickly achieving very high market visibility.
D)
visions of profiting from new technology.
C) a
stunning technological success as the Internet and the Web increased from a few
thousand to billions of e-commerce transactions per year.
The
early years of e-commerce are considered:
A) the
most promising time in history for the successful implementation of first mover
advantages.
B) an
economist's dream come true, where for a brief time, consumers had access to
all relevant market information and transaction costs plummeted.
C) a
stunning technological success as the Internet and the Web increased from a few
thousand to billions of e-commerce transactions per year.
D) a
dramatic business success as 85% of dot-coms formed since 1995 became
flourishing businesses.
A) They
were a technological success but a mixed business success.
Which of
the following best describes the early years of e-commerce?
A) They
were a technological success but a mixed business success.
B) They
were a technological success but a business failure.
C) They
were a technological failure but a business success.
D) They
were a mixed technological and business success.
D)
expansion of e-commerce to include services as well as goods
Which of
the following is a characteristic of the Reinvention phase of e-commerce?
A)
massive proliferation of dot-com start-ups
B)
widespread adoption of broadband networks
C) rapid
growth of search engine advertising
D)
expansion of e-commerce to include services as well as goods
C) brand
extension and strengthening becomes more important than creating new brands
Which of
the following is a characteristic of the Consolidation phase of e-commerce?
A)
predominance of pure online strategies
B)
emphasis on revenue growth versus profits
C) brand
extension and strengthening becomes more important than creating new brands
D) shift
to a technology-driven approach
D) The
market middlemen disappeared.
Which of
the following is not true regarding e-commerce today?
A)
Economists' visions of a friction-free market have not been realized.
B)
Consumers are less price-sensitive than expected.
C) There
remains considerable persistent price dispersion.
D) The
market middlemen disappeared.
C)
Overall transaction costs have dropped dramatically.
Which of
the following statements is not true?
A)
Information asymmetries are continually being introduced by merchants and
marketers.
B)
Intermediaries have not disappeared.
C)
Overall transaction costs have dropped dramatically.
D)
Brands remain very important in e-commerce.
B) eToys
Which of
the following is an example of an e-commerce first mover that failed?
A) Etsy
B) eToys
C) eBay
D)
E*Trade
D)
webrooming
Which of
the following refers to the practice of researching a product online before
purchasing it at a physical store?
A)
zooming
B)
grazing
C)
showrooming
D)
webrooming
B) The
Web
Which of
the following was the original "killer app" that made the Internet
commercially interesting and extraordinarily popular?
A)
e-commerce
B) The
Web
C)
social networks
D)
mobile apps
B)
disintermediation
Which of
the following refers to the displacement of market middlemen and the creation
of a new direct relationship between producers and consumers?
A)
network effect
B)
disintermediation
C)
friction-free commerce
D) first
mover advantage
A)
technology driven
Above
all, e-commerce is a ________ phenomenon.
A)
technology driven
B)
finance-driven
C)
sociological
D)
government-driven
D)
workgroup automation (e.g., document sharing)
Which
business application is associated with the technological development of local
area networks and client/server computing?
A)
transaction automation (e.g., payroll)
B)
desktop automation (e.g., word processing)
C)
industrial system automation (e.g., supply chain management)
D)
workgroup automation (e.g., document sharing)
D)
intellectual property
Which of
the following is an important societal issue related to e-commerce?
A)
consumer behavior
B) value
webs
C) cloud
computing
D)
intellectual property
B)
Economists take a purely technical approach to e-commerce.
Which of
the following statements is not true?
A) No
single academic perspective dominates research about e-commerce.
B)
Economists take a purely technical approach to e-commerce.
C) There
are two primary approaches to e-commerce: behavioral and technical.
D)
Management scientists are interested in e-commerce as an opportunity to study
how business firms can exploit the Internet to achieve more efficient business
operations.
Which of
the following is an example of C2C e-commerce?
craiglist
All of
the following are examples of Web 2.0 sites and applications except:
auction
sites
E-commerce
can be defined as:
the use
of the Internet, the Web, and mobile apps to transact business.
Interactivity
in the context of e-commerce provides which of the following functionalities?
the
enabling of two-way communication between consumer and merchant
Which of
the following is an example of an e-commerce first mover that failed?
eToys
Which of
the following is not a unique feature of e-commerce technology?
info
asymmetry
Which of
the following is not a characteristic of a perfect competitive market?
It's
highly regulated
Which of
the following is an example of an on-demand service company?
Airbnb
The
early years of e-commerce are considered:
a
stunning technological success as the Internet and the Web increased from a few
thousand to billions of e-commerce transactions per year.
Which of
the following statements about e-commerce, in the United States in 2017, is not
true?
Social
e-commerce generates more revenue than mobile e-commerce
Which of
the following is the best definition of transaction cost?
the cost
of participating in a market
All of the
following were visions of e-commerce expressed during the early years of
e-commerce except:
fast
follower advantage
In 2017,
almost ________ of Americans only used a mobile device to access the Internet.
15%
Which of
the following is not a major technology trend in e-commerce in 2017-2018?
Mobile
messaging becomes popular with users
Which of
the following best describes the early years of e-commerce?
They
were a technological success but a mixed business success
Which of
the following describes the basic web policy of large firms during the
Invention period?
Maintain
a basic, static Website.
Which of
the following refers to any disparity in relevant market information among
parties in a transaction?
info
asymmetry
The
world's online population was estimated to be around ________ in 2017.
3.5
billion
Which of
the following was the original "killer app" that made the Internet
commercially interesting and extraordinarily popular?
The Web
Above
all, e-commerce is a ________ phenomenon.
technology
driven
Which of
the following statements about the mobile platform is not true?
Size of
the mobile app audience greatly exceeds that of mobile web audience
Which of
the following is one of the three primary societal issues related to
e-commerce?
intellectual
property
Which of
the following features of e-commerce technology enables merchants to market and
sell "complex" goods and services to consumers via marketing messages
that can integrate video, audio, and text?
richness
許多人利用網路虛擬世界達成現實世界無法達成的目標,這是屬於宅經濟中
的何種特色?(單選)
(D) 快速消費
11. 關電子商務為以下何種過程?
(A) 透過網際網路進行購買、銷售或交換產品
15.
E-commerce is available just about everywhere and anytime. This is known as
________.
(C)
ubiquity
16.
E-commerce can be defined as:
(A) the use
of the Internet, the Web, and mobile apps to transact business.
17.
Which of the following is an example of e-business?
(A)
Amazon's inventory control system
19.
Which of the following is not a unique feature of e-commerce technology?
(C)
information asymmetry
20.
Which of the following is an example of social e-commerce?
(D)
Facebook
A
________ specifically details how you plan to find customers and to sell your
product.
market
strategy
Which of
the following companies uses a transaction fee revenue model?
E*Trade
Which of
the following refers to any disparity in relevant market information among
parties in a transaction?
information
asymmetry
Which of
the following is not considered a portal?
Amazon
Which of
the following is a leading platform for social e-commerce?
Facebook
E-commerce
is available just about everywhere and anytime. This is known as:
ubiquity
Which
element of the business model refers to the presence of substitute products in
the market?
competitive
environment
Slow
followers are sometimes more successful than first movers.
true
All of
the following primarily use an advertising revenue model except:
Walmart
A wealthy
individual who invests personal funds in a startup in exchange for an equity
share in the business is referred to as a(n):
angel
investor
In the
________ business model, a web-based business builds a digital environment in
which buyers and sellers can meet, display products, search for products, and
establish prices.
market
creator
The term
e-commerce refers to the digital enabling of business processes both inside and
outside the firm.
false
Which of
the following involves a company giving away a certain level of product or
service without charge, but then charging a fee for premium levels of the
product or service?
freemium
strategy
Personalization
involves targeting marketing messages to specific individuals by adjusting the
message based upon a consumer's preferences or past purchasing behavior.
true
Information
asymmetries enable some firms to have an edge over others.
true
M-commerce
is the type of e-commerce that generates the most revenue.
false
Which of
the following is an unfair competitive advantage?
brand
name
What is
the primary revenue model for an e-distributor?
sales
Which
type of investor typically becomes interested in a startup company after it has
begun generating revenue?
venture
capital investors
Which of
the following refers to the practice of researching a product online before
purchasing it at a physical store?
webrooming
________
and ________ are typically the most easily identifiable aspects of a company's
business model.
Value
proposition; revenue model
Which of
the following does not use a subscription revenue model?
Twitter
Which of
the following is a physical place you visit in order to transact?
marketplace
Which
element of the business model addresses what a firm provides that other firms
do not and cannot?
value proposition
Which of
the following is another name for a revenue model?
financial
model
In the
subscription revenue model, a company primarily generates income from the
display of ads.
false
Which of
the following refers to the complexity and content of a message?
richness
All of
the following are platforms for C2C e-commerce except:
Walmart
Organizations
that typically provide an array of services to startup companies along with a
small amount of funding are referred to as:
incubators
A
perfect market is one in which:
there
are no competitive advantages or asymmetries because all firms have equal
access to all the factors to production
________
represents the total number of users or customers an e-commerce business can
obtain.
reach
Which of
the following are Amazon's primary value propositions?
selection
and convenience
Which of
the following can be considered synonymous with the term e-commerce?
digital
commerce
Which
type of e-commerce is distinguished by the type of technology used in the
transaction rather than by the nature of the market relationship?
mobile
ecommerce
The
financial services, travel services, and job placement services industries
typically use the ________ business model.
transaction
broker
Which of
the following features of e-commerce technology allows users to participate in
the creation of online content?
social
technology
Which of
the following features of e-commerce technology enables merchants to market and
sell "complex" goods and services to consumers via marketing messages
that can integrate video, audio, and text?
richness
Which of
the following statements about the Web is not true?
The Web
is the technology upon which the Internet is based.
Grainger
is an example of which of the following business models?
e-distributor
第一章 電子商務的基本概念
1(B) 透過電腦網路來進行購買、銷售、運送、產品、服務交換之過程我們稱為?
A.網路行銷 B.電子商務
C.服務電子化 D.網路交易
2(D) 在顧客間、或供應商、顧客、或競爭者之間,透過網路進行交易而成的商務行為是指?
A.網路行銷 B.數位內容
C.服務電子化 C.電子商務
3(C) 下列何者不是電子商務的特性?
A.便利性 B.全球化
C.技術性 C.互動化
4(B) 維基百科是由網路使用者來決定其內容,這是屬於電子商務的何種特性?
A.豐富性 B.互動化
C.社群化 C.創新化
5(A) 國內線上音樂提供者KKBOX,有別於一般傳統的實體商店賣CD而在網路上直接付費點 播下載,這是屬於電子商務的何種特性?
A.數位化 B.互動化
C.標準化 D.創新化
6(A) 阿騰最近想換一臺電腦,開始上MOBILE01參考許多網有的意見,來幫他做最好的決 定,這是屬於電子商務的何種特性?
A.社群化 B.快速化
C.個人化 D.豐富性
7(C) 消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬於電子商務 構面中的哪一種?
A.商流 B.物流
C.金流 D.資訊流
8(C) 阿光不小心弄壞了小仙的耳機,因而上Pchome Online找尋賣家,請問Pchome Online拍 賣,是屬於電子商務的哪一類?
A.B2B B.B2C
C.C2C D.B2B2C
9(D) 在電子商務的構面中,「廠商將產品送至消費者手上的過程」,指的是下列何者?
A.金流
B.設計流
C.商流
D.物流
10(ABCD)
有關於電子商務,下列的敘述哪些正確?「復選」
A.應用科技來達成企業交易及工作流程的自動化
B.為因應公司、消費者、及管理階層的需求的工具,以便降低成本、提高品質並加速服 務
C.提供在網際網路上產品與資訊買賣以及其他線上服務的能力
D.透過電話及電腦網路等通訊媒介來傳送資訊、產品、服務及付款
11(C) 每天,透過Facebook可以看到朋友轉發的訊息,自己也可以轉發出去,這屬於電子商務 的哪個效益?
A.創造新商機 B.增加就業機會
C.快速傳播資訊 D.減少回復時間
第二章 電子商務的策略發展與商業模式
1(C) 在策略定位中,Michael Porter的價直鏈分析,是屬於哪一種分析?
A.任務環境 B.科技環境
C.企業內部環境 D.政治環境
2(C) 下列何者不是電子商務發展的定位時考慮到的評估因素?
A.企業目標 B.市場分析
C.價直鏈 D.風險探究
3(B) 安安是個忙碌的上班族,常常沒有時間到實體店面去買衣服,只好回加上AWASEBBA的 網站,在這裡她可以選擇自己的身材型態,透過虛擬人物試穿來感覺自己是不是適合該 服飾,請問AWASEBA的策略方向是屬於何種營運模式?
A.現有營運模式 B.創新營運模式
C.網路營運模式 D.修改營運模式
4(D) 企業在進行產品或是服務運作的過程時,常會注意到:企業的關鍵資源、對顧客的價直 主張、企業的關鍵流程、利潤公式,請問這些問題是屬於?
A.電子商務的本質 B.電子商務的特色
C.電子商務的經營尺度 D.商務模式的概念
5(B) 阿傑是個Apple的重度使用者,每天都會逛Apple的App Store搜尋最新的運用程式,請問 Apple Store 豐富的數位化內容,是屬於網路商業模式的哪種特性?
A.服務面 B.核心面
C.策略面 C.客訴面
6(D) 小仙是個愛網購的女生,每當想要買東西時,總會上愛合購,揪團買東西,請問愛合 購,是屬於何種網路商業模式?
A.虛擬商城 B.線上廣告
C.資訊分享 D.中介平臺
7(D) 下列何者非網路商業模式創新的條件?
A.新的產品或服務 B.新的構成要素
C.亮眼的業績表現 D.豐富的網站呈現
8(A) 請問:「Google提供搜索服務,透過關鍵字可以找到需要內容資訊、商家或產品」,符 合網路商業模式創新的哪個條件?
A.新的產品或服務 B.新的構成要素
C.亮眼的業績表現 D.豐富的網站呈現
9(B) 請問:「Amazon透過網路來銷售,產品選擇範圍廣,同時在倉庫配貨運送,後來更推出 網路商城,商家可以在商城開店,就像進駐百貨公司專櫃一樣」,符合網路商業模式創 新的哪個條件?
A.新的產品或服務 B.新的構成要素
C.亮眼的業績表現 D.豐富的網站呈現
10(ABCD)
請問下列哪些屬於網路商業創新模式的類型?
A.新的產品或服務 B.新的構成要素
C.亮眼的業績表現 D.豐富的網站呈現
11(B) 請問商業模式圖的核心為何?
A.目標客層 (Customer Segments,CS )
B.價直主張 (Value Propositions, VP )
C.通路
(Channels, CH )
D.顧客關係 (Customer Relatioships, CR )
第三章 電子商務的應用
1(D) 將傳統拍賣方式轉換倒網際網路上來進行,此模式稱為?
A.線上學習 B.線上團購
C.線上購物 D.線上拍賣
2(B) 企業架設內部網路、對夥伴使用電子採購模式以及商際網路連繫,這樣屬於哪一種概 念?
A.企業電子化 B.B2B電子商務
C.供應鏈管理 C.C2C電子商務
3(C) 台塑透過台塑網,提高台塑集團採購、工程發包、原料標售系統與庫存管理等作業效率
,進而提高台塑集團的競爭力,台塑網的發展屬於B2B電子商務發展的哪一個階段?
A.電子資料交換網路 B.基本的電子商務
C.電子交易市集 D.協同商務
4(D) 台塑網出現後可與兩岸相關企業進行交易行為,不用另外以電話或傳真進行通知,減少 採購人員的負擔,這是屬於交易平臺主要功能的哪一項?
A.提供交易管理 B.創造收益利潤
C.豐富的比價機制 D.簡化買賣流程
5(A)
eBay 在2009年與外貿協會合作,將臺灣具特色的食品企業引進中國大陸,利用金流系統 PayPal ,共同推銷臺灣商品,藉此協助臺灣的中小企業廠商能夠與全球市場接軌,進而 得到更大的發展空間,這種概念與下列何者最相近?
A.e-Market Place B.企業資源規劃
C.供應鏈管理 D.顧客關係管理
6(B)
P&G與Wal-Mart建立分享資訊機制,讓P&G每天由Wal-mart蒐集銷售資訊,藉此管理在 Wal-Mart的存貨,請問這是屬於協同商務四大領域中的哪一種?
A.設計協同商務 B.行銷與銷售協同商務
C.採購協同商務 D.規劃與預測協同商務
7(B) 貴婦奈奈在PTT上針對各種議題發表自己的看法,請問,這種模式是屬於C2C商務模式的 哪一種?
A.交易模式 B.分享模式
C.拍賣模式 D.社群模式
8(D) 阿證最近發現CoCo都可茶飲廣告:「只要來店消費就會給予一組序號,憑著序號再到 Facebook 按讚,就有機會獲得賽德克‧巴萊電影票乙張。」 請問這屬於C2C網路交易模式 效益的哪一項?
A.流動性 B.方便性
C.透明性 D.社群性
9(B) 虛擬社群互動的基礎可分為四大類,下列何者不屬於之?
A.興趣
B.性別
C0幻想
D.交易
第四章 電子商務的金流與安全機制
1(ABCD) 電子交易中的參與者,主要有哪些?
A.認證中心 B.公正第三者
C.收單銀行 D.發行銀行
2(A) 下列何者不是電子付款系統的特性?
A.不具有貨幣價值 B.可轉換性
C.完整性 D.易使用性
3(D) 下列何者不屬於網路信用卡交易的參與者?
A.持卡人 B.網路商店
C.收單銀行 D.警察局
4(B) 下列何者不屬於代幣式付款系統?
A.電子現金 B.信用卡
C.智慧卡 D.儲值卡
5(D) 關於行動支付機制,手機中保護卡片資訊的晶片,稱之為SE,可以放在手機的三個地 方,下列何者有誤?
A.手機本身的硬體 B.手機插入一張SD記憶卡
C.手機上的SIM卡 D.手機上的電池
6(ABD) 下列關於Google Wallet 服務的敘述何者正確?
A.Google是以軟體搭配NFC晶片來模擬硬體的SE元件
B.手機需具有NFC的功能
C.卡片完全不會被盜用
D.要有支援 Paypass 的POS機
7(ABCD) 下列有關Apple Pay 服務的敘述何者正確?
A.以隨機編碼的序號 (token) 來進行交易
B.稱為 tokenization
C.每支手機可以放入多張信用卡
D.信用卡資料放在 Passbook 的 APP 中
8(B) 下列何者不是網路服務安全所要的保護的?
A.資料
B.滿意度
C.資源
D.身分
9(BC) 有關防火牆基本防禦目的,下列哪些正確?
A.限制外部人員離開 B.防止攻擊者接近電腦
C.限制外部人員進入 D.可以防範內賊
10(ABC) 有關防火牆的功能敘述,下列哪些正確?
A.防火牆可以監視活動
B.防火牆可以集中管理
C.防火牆可以網路把關
D.防火牆可以徹底解決問題
第五章 電子商務的應用技術發展
1(B) 下列何者非數位匯流的概念?
B.經由郵局寄送信件
2(ABCD) 數位匯流可以包括哪四種不同的產業
A.IT產業 B.電信產業
C.消費性電子產業 D.娛樂產業
3(A)
Amazon.com 提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一概念?
A.網路交易模式
4(ABC) 第三方支付包掛下列哪些特點?
A.靈活的支付模式 B.嚴格的監督機制
C.保障的獨立機構
5(C) 讓使用者透過網路來通話、訊息傳遞、資訊來往或分享影像的系統,是只下列何者?
C.即時通訊
6(ABCD) 下列何者屬於級時通訊?
A.MSN B.Whatsapp
C.WeChat D.LINE
7(B) 請問下列何者非程現式廣告的概念?
B.又稱關鍵字廣告
8(D) 我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術式下列何者?
D.影音串流
9(ABC) 影音串流的三大平臺式指哪三個?
A.Windows Media Player B.Real Player
C.QuickTime Player
10(ABCD)
社群往站的商業模式包括哪些?
A.廣告收入模式 B.使用者收費模式
C.導購模式 D.遊戲模式
11(B) 適地性服務( Location Based Service,LBS )就屬於環境感知所延伸出的應用,請問此服務較符合下列何者應用?
B.行動商務
第六章 電子商務倫理與社會議題
1(BCD) 在電子商務領域中,智慧財產權主要包括下列哪些?
B.著作權 C.專利權
D.商標權
2(D) 網路蟑螂行為主要侵犯哪一種權力?
D.網域名稱權
3(BCD) 電子商務消費者保護網領的基本原則包刮下列哪些?
B.交易安全原則 C.網路資訊揭露原則
D.隱私權保護原則
4(ABCD) 下列哪些是屬於網路犯罪?
A.網路販賣盜版光碟 B.網路販賣贓物
B.入侵他人網站 D.主動故意散布電腦病毒
5(BD) 為尊重軟體智慧財產權,下列哪些是正確的觀念?
B.可合法暫時性重製 D.應購買合法版權的軟體
6(A) 智慧財產權法,想要保的是下列何者?
A.人類腦力辛勤創作的結晶
7(D) 「任何能用來識別、找出、或聯絡個人的資料」稱為?
D.隱私權
8(D)
Mason 等等學者提出「資訊技術之道德課題的架構內容」,將資訊倫理的道德議題分為四大類,不包括下列何者?
D.使用權
9(A) 在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為什麼?
A.駭客
10(C) 下列何者不屬於常見的盜版行為
第七章 企業電子化
1.(A) 下列何者非企業電子化的主要應用範圍? [單選]
A. 六個標準差 B. SCM
C. CRM D. ERP
2.(B) 開發工業自從引進了這個系統以後,清楚整合工廠、
上、下游的供應商、企業內部的營運流程、零售商與顧
客,因而提升整個生產鏈的競爭力,請問是哪一套系統?
A. 企業資源規劃
B. 供應鏈管理
C. 顧客關係管理
D. 企業流程再造
3.(A) 下列何者不屬於顧客關係管理範疇?
A. 透過系統的完整規劃與分配達成對組織資源的有效運用
B. 透過電子化的系統,來提升企業與顧客關係的方法
C. 藉由科技來整合資源,並發掘出顧客的可能需求
D. 先以建立忠誠且互利的顧客關係為發展目標
4.(D) 小駱是個很認真的保險業務員,每當拜訪舊客戶時,總
會拿出客戶從前留下的資料,加以研讀,藉此他可以提
供最符合客戶需求的保險建議,這是屬於下列何種概念?
A. 企業資源規劃
B. 知識管理
C. 商業智慧
D. 顧客關係管理
5.(D) 中華汽車為了提高公司的競爭力,導入一套系統,這系
統可以建立個人知識平臺,並與工作管理系統進行結合
,經由工作社群網路來建立不同的知識社群,進而發展
出團隊的作業模式與規範,請問這是屬於哪一套系統?
A. 企業資源管理
B. 顧客關係管理
C. 商業智慧
D. 知識管理
6.(C) 超級市場主管常常會將消費者的消費習慣以線上分析處
理工作分析,最後再透過決策支援系統訂出最佳化的銷
售策略,這是屬於下列哪一個概念的應用?
A. 企業資源管理
B. 知識管理
C. 商業智慧
7.(D) 企業主管在思考電子化系統時,會考慮到員工當中會操
作電腦的人數、以及要如何安排課程,以培育員工使用
新的資訊科技系統,這類的問題較接近哪些面向?
A. 財務面
B. 流程面
C. 資訊面
D. 人員面
8.(B) 當執行企業電子化時,想到整個作業流程都必須改變,
為了防止新舊系統整合的問題,需設立幾個檢核點來確
保過程沒有偏差,這類的問題較接近哪個面向?
A. 財務面
B. 流程面
C. 資訊面
E. 人員面
9.(C) NOVA 曾在2000年開始進入電子化的經營,但沒考慮
到當時的網路連線速度,造成使用者點選網頁時需花費
很久的時間,再加上添購電子化設備昂貴,最後導致成
效不如預期而受編,由此可知,NOVA沒有考慮到什麼
問題?
A. 網路使用的安全性
B. 相關廠商的配合性
C. 基礎設備的完整性
D. 目標市場的廣泛性
10.(D) 下列何者不屬於電子化導入之外部環境評估?
A. 網路使用的安全性
B. 相關廠商的配合性
C. 基礎設備的完整性
D. 消費市場的區隔性
11.(B) ERP具備四個重要的特性,不包括下列何者?
A. 資料的整合
B. 市場的整合
C. 最佳化實務
D. 模組化軟體
12.(A) 下列何者不屬於ERP的模組?
A. 知識管理模組
B. 物料管理模組
C. 生產規劃系統
D. 財務會計系統
第八章 供應鏈管理
1.(C) 供應鏈管理具有四種特性,下列敘述何者錯誤? [單選]
A. 協同整合 B. 減少長邊效應
C. 核心業務外包 D. 即時最佳化
2.(D) 美國供應鏈協會(Supply Chain
Council, SCC) 提出的供
應鏈管理操作參考模型指出,供應鏈管理的商業流程順
序為: [單選]
D. 規劃 (Plan)、資源 (Resource)、製造 (Make)、
、運送 (Deliver) 和回收 (Return)
3.(A) 供應鏈管理是透過什麼的協助,來讓供應鏈成員間能有
效整合,減少供應鏈體系資源的浪費與重複,並藉由緊
密的結合來提升供應鏈的績效與服務水準,以增加各企
業的競爭力? [單選]
A. 資訊科技 B. 物流管理
C. 運籌管理 D. 行銷管理
4.(A) Zara在全球有數個趨勢紀錄與預測的機構,以掌握衣服
流行的趨勢變化。其將資料上傳至總部後,設計中心、
生產中心、工廠等機構可從該資料庫中存取所需的資
訊,以壓縮生產的製程時間。請問這是屬於供應鏈管理
的何種特色?[單選]
A. 減少長鞭效應 B. 協同整合
C. 非核心業務外包 D. 洞察消費需求
5.(C) Zara的經營總部在西班牙,產品設計後在歐洲鄰近國家
進行生產,只有少數的量會送至亞洲地區生產,藉此為
持生產效率。請問這是屬於供應鏈管理的何種特色?[單選]
A. 減少長鞭效應 B. 協同整合
C. 非核心業務外包 D. 洞察消費需求
6.(B) 供應鏈管理的發長流程為: [單選]
B. 單一企業階段→物流管理階段→運籌管理階段→供應
鏈管理階段
7.(D) 這個時期主要是以顧客需求為基礎,來整合企業生產的
活動,包括:需求預測、配送、存貨管理、產品包裝
等,以管控產品的生產過程。請問這是供應鏈管理發展
的哪一個時期? [單選]
A. 供應鏈管理階段 B. 單一企業階段
C. 物流管理階段 D. 運籌管理階段
8.(A) 推式基礎的供應鏈流程為:[單選]
A. 零售商依據以往顧客訂單來預測需求→製造商依據以
往零售商訂單來預測需求→顧客下單→零售商下單→出貨
9.(A) 訂單變動量越往上變化越大,因而無法做出精確的出貨
預測,我們可以稱這個問題為? [單選]
A. 長鞭效應 B. 風險鏈條效應
C. 短板效應 D. 漣波效應
10.(D) 造成長鞭效應的現象原因有? [單選]
A. 被誇大的訂單 B. 批次訂購的行為
C. 價格變動的預期 D. 以上皆是
第九章 顧客關係管理
1:(B) 顧客關係管理是透過下列何種循環來執行?
A 策略 搜集 互動 區隔
B 搜集 區隔 策略 互動
C 互動 策略 搜集 區隔
D 區隔 搜集 策略 互動
2:(C)下列何者為顧客關係管理主要的行銷模式?
A 營業額 獲利數字為衡量績效指標
B 顧客是可以取代的
C 盡量將每一件商品賣給每一位顧客.以取得顧客對企業的終身價值及最大效益
D 以部門為行銷分界點.致使行銷 .業務.客服部門接收到不同的資訊
3:(D)以下哪些可稱為忠誠顧客?
A 使用後非常滿意者
B 再次購買者
C 不但自己購買還推薦他人
D 以上皆是
4:(B)阿忠在使用Google的時候.發現Google會根據他上次搜尋關鍵字來提供建議.這是屬於顧客關係管理精神架構的哪個?
A 獲取新顧客
B 建立顧客關係
C 推薦他人
D 獲利利潤
5:(C)下列那一個屬於資料搜集技術?
A 線上分析處理
B 決策支援系統
C 電話客服中心
D 以上皆是
6:(A)資料儲存的中心.透過特定的主題來進行資料處理.藉此搜集相關資訊提供高階主管分析決策時使用。這是屬於下列何種概念?
A 資料倉儲
B 資料超市
C 資料庫
D 知識庫
7:(C)手機與電池.香煙與打火機,是屬於資料採擷中何種模式的應用?
A 分類
B 群聚/分群
C 聯合性分析
D 順序
8:(D)美兆健康管理事業.在健檢時總會針對不同客戶.提出不同的營養建議,健檢結束後.還會給予專屬個人的健康促進書。請問這是屬於建立顧客關係管理的哪個步驟?
A 確認顧客何在
B 對顧客進行區隔
C 與顧客進行互動
D 提供客製化的服務
9:(C)下列何者不是顧客關係管理的關鍵成功因素?
A 整合內部的資訊
B 強化溝通的管道
C 上下遊廠商配合度
D 處理變革的抗拒
10: (A) 巨量資料是一套協助企業大量搜集.匯整.分析資料的技術.企業會運用各種模式與策略.按照使用者的偏好.關聯性與產品種類等來擬定方案.以驗證原先擬定的發展方針之正確性.以上是屬於哪一個階段?
A 分析
B 獲取
C 組織
D 決策
11: (D) 發發發大賣場自從有了新的顧客關係管理系統後.當有促銷活動的時候.會根據以往顧客消費習慣來決定是否寄發DM.也因為這樣.新一季的營業額上升了5%.上列敘述中.不包含何種顧客關係管理帶來的效益?
A 增加收益
B 減少行銷活動
C 降低成本
D 推薦他人
第十章
知識管理與e-learning
1: (A) 指企業記錄下所有能夠觀察到的事情.從網路使用者進入網頁的網址.點選的項目.停留時間.消費的狀況等.都透過程式進行記錄.並存放在數據庫中.作為後續分析的基本素材。指的是?
A 數據
B 資訊
C 技術
D 知識
2:(C) 先設定某些分析的模式.再利用統計.分析.彙整等動作.以區分出有意義的資訊。是屬於資訊分析工具的哪一種?
A分類
B文字化
C 計算
D 精縮
3:(D) 意指資料的整理.彙整分析後的資訊.找出適合使用的部分.並且加入提要以供索引使用。是屬於資訊分析的工具的哪一種?
A 分類
B 文字化
C 計算
D 精縮
4:(B) 下列何者不是知識管理的本質?
A知識資訊化
B 知識數據化
C 只是分享化
D 知識價值化
5: (A) 知識的開發.整理.利用之過程.能發掘出新的知識.以創造出更高的價值.是屬於知識管理本質的哪一個?
A知識價值化
B 知識分享化
C知識數據化
D知識資訊化
6:(C)有關知識型產業敘述何者錯誤?
A結合企業內.外部所有的資源
B 透過網路來與上下游合作夥伴.顧客進行互動.以補強企業的知識庫藏
C 又稱為精實產業
D 知識管理模式為共同開發
7:(B) 知識管理的程序為
A 知識的吸收→知識的累積→知識的創造→知識的擴散
B知識的吸收→知識的創造→知識的累積→知識的擴散
C知識的創造→知識的累積→知識的吸收→知識的擴散
D知識的擴散→知識的累積→知識的吸收→知識的創造
8:(B) 主要是透過經驗所獲得.較無法訴諸語言.需要透過適當的方式來進行分享(外顯示).並透過知識庫來儲存與分享。而此點也是知識創造過程中.最為關鍵的一步。指的是?
A 創造觀念
B 分享內隱知識
C 確認觀念
D 跨層次的知識擴展
9: (A) 組織成員間內隱知識的移轉.透過經驗分享來傳遞彼此的內隱知識.例如:心智模式與技術技巧的分享。為知識創造模式中的?
A 共同化
B 內化
C 結合
D 內化
10: (D) 與邊做邊學息息相關.學習者可透過指導者的口語指導.經驗分享等外顯示模式來學習.並經由討論與移轉指導者的內隱知識後.將外知識轉化為專屬自己的內隱知識.即可成為有價值的知識.為知識創造模式中的?
A共同化
B外化
C結合
D內化
11:(D) 數位學習的基本要件為何?
A網路化
B資訊化
C遠距學習化
D以上皆是
12:(C) 下列何者為數位學習的特點?
A即時性的訓練較難達成
B 制式教材
C 資訊擷取速度快.無時間限制
D眾人集合於同一點的學習方式
13:(C) 翻轉教室的概念不包括下列何者?
A先將專業知識錄製成影片
B以專業知識為影片的分段
C 影片主要是課後複習使用
D師生面對面學習是解決問題
第十一章
行動商務
1:(D) 下列何者為行動商務模式之特性?
A 異變性
B 不可儲存性
C分享性
D互動性
2:(C)下列何者不是行動商務之成功因素?
A便利性
B使用性
C炫耀性
D豐富性
3:(B) 第一代行動通訊為?
A數位式
B類比式
C高速封包存取系統
D分碼多重存取系統
4: (B) 第2.5代GPRS行動通訊其傳輸速度可達?
A 56Kbps
B
150Kbps
C
256Kbps
D 2M
5: (D) 第三代行動通訊其傳輸速度可達?
A 1M
B
512kbps
C
256kbpa
D 2M
6: (D) 無線網路的技術規格以?
A 802.12
B 802.10
C 801.11
D 802.11為主
7:(C) 下列有關無線射頻辨識系統描述何者有誤?
A 是一種非接觸式的系統
B 簡稱RFID
C 適合長距離使用
D 辨識電子標籤的速率每秒可超過600個
8:(D) 無線射頻辨識系統(RFID)包刮?
A電子標籤
B 讀取器
C天線
D以上皆是
9:(D) 下列何者不是行動商務的商務模式特性?
A隨處性
B個人性
C互動性
D匿名性
10:(ABCD) 下列哪一項是屬於B2C行動商務領域?
A 行動廣告
B 行動學習
C 行動金融服務
D行動簡訊
第十二章
網路行銷
1:(D)有關AIDMA模式.何者有誤?
A I是指Interest誘發興趣
B D是指Desire
C M是指Memory記憶
D 兩個A都是指ACtion行動
2:(ABCD) 網路行銷在電腦.網路雨資訊科技的協助下.帶來那些新的思維?
A 可讓企業進行更為長期的行銷規劃
B 著默的重點也不只是銷售.可以同時兼顧溝通與銷售等導向
C 藉由網路能有效整合上下游產業鏈夥伴.創造出更強的競爭優勢
D 有更多的區域方式.多元市場與行銷模式
3:(C) AISAS模式中第二個S代表何種行為?
A Search搜尋
B sell銷售
C share分享
D survey調查
4: (ABCD) 有關傳統行銷與網路行銷的比較.下列那些正確?
A 傳統行銷:費時.花費大.印刷郵遞成本高
B 網路行銷:即時.花費小.數位式目錄成本低
C 傳統行銷:單向.客戶被動接受
D 網路行銷:雙向互動式.客戶主動選取
5: (ABCD) 下列哪些屬於網路行銷的方式?
A 病毒式行銷
B 電子信件行銷
C互動式廣告行銷
D部落格行銷
6: (ABCD) 有關網路行銷的方式.下列哪些正確?
A 病毒式行銷(Viral marketing)是利用口碑傳播的原理.透過網路使用者彼此進行傳遞
B電子信件行銷(email marketing)是一種利用電子信件將行銷資訊傳遞給目標客群的模式
C互動式廣告(Interactive
Advertising)是利用網路互動媒體.行動裝置來達到跟消費者互動的效果
D 部落格行銷的模式是利用個人網頁來進行行銷活動
7:
(ABCD) 電子信件行銷的優點有那些?
A 時效性高
B 較低的行銷成本
C 可將資訊傳遞給許多的潛在顧客
D 可以進行追蹤
8:(A) 下列互動式廣告的描述何者有誤?
A 很難增加銷售量
B 互動式廣告成為企業常用的廣告模式
C 通常可以利用圖片.文字.超連結.Flash 動畫.聲音/視頻短片等技術
D 利用網路.互動媒體.行動裝置來達到跟消費者互動的效果
9:(AB) 部落格行銷包刮下列何者?
A 部落客撰文
B 專屬部落格行銷
C 互動模式廣告
D 社群行銷模式
10:(ABC) 下列哪些屬於知名的SEM廠商?
A Google
AdWords
B 雅虎搜尋行銷
C 微軟 adCenter
D AWS
第十三章 社群行銷
1.(B) 人與人之間的社會關係,通常可利用網路分析圖來進行探究,請問這是描述下列哪些概念?[單選]
B. 社會網路
2.(ABCD)
下列哪些社會網路的描述是正確的?[複選]
A. 社會網路是人與人之間的社會關係
B. 社會網路的模式可以分為無方向性連結與方向性連結兩種
C. 社會網路的結構須具備角色、關係與連結
D. 社會網路個體,可包括:個人、企業、組織等
3.(B) 人和人之間的關係是指下列何者?[單選]
B. 社會網路
4.(AB) 社群行銷又可稱為下列哪些名稱?[複選]
A. 社會網路行銷 B.社會媒體行銷
5.(B) 下列何者只須分析的社會網路個體,可包括:個人、企業、組織、或任何的物件等概念?[單選]
B. 節點 (node)
6.(ABCD)
一般常見的社群網路服務包括哪些?[複選]
A. YouTube B. Facebook
C. Twitter D. Line
7.(B) 社群中個別角色之間因某種因素而成的是指哪些概念?
[單選]
B. 關係
8.(ABC) 社會網路的結構須具備哪些概念?[複選]
A. 角色 B. 關係
C. 連結
9.(B) 下列何者不包括在SoLoMo中?[單選]
B. Sonet
10.(ABCD)
CAMS的概念包括哪些?[複選]
A. 雲端運算 (Cloud)
B. 資料分析 (Analysis)
C. 行動應用 (Mobile)
D. 社交媒體 (Social-media)
第十四章 網路廣告
1.(BCD) 下列哪些網路廣告的描述是正確的?[複選]
B. 網路廣告可提供更為互動的模式,將資訊傳遞給消費者
C. 網路廣告可提供影音、聲光、互動、與主動偵測消費者需求之模式
D. 費用收取的方式較為多元,企業可以選取較有成效的方式
2.(BCD) 有關網路廣告的特性,下列哪些正確?[複選]
B. 透過網路廣告,消費者可與產品產生互動的關係
C. 網路可提供廣告業者方便蒐集使用者的資訊
D. 網路廣告可以及時更換新的廣告
3.(D) 「廣告商依網路廣告被點選的次數來計價」是指?[單選]
D. Cost Per Click
4.(BCD) 下列哪些是網路廣告的特性?[複選]
B. 及時更新 C. 提高互動
D. 資訊回饋
5.(ABCD)
下列哪些是網路廣告的收費模式?[複選]
A. CPM計價
B. CPC計價
C. 收益定價 D. 定時定價
6.(B) 當使用者點選連結之後,會彈出另一個廣告視窗,用以播放廣告訊息,是屬於哪一類網路廣告?[單選]
B. 插播廣告
7.(A) 下列何者不屬於廣路廣告的類型?[單選]
A. 購物臺廣告
8.(B) 「以消費者透過網路廣告連結到網路後,實際交易的金額來支付廣告費用」此為網路廣告的何種收費方式?[單
選]
B. 收益定價
9.(A) 「在傳統的文字廣告中加入聲光影音的效果,甚至可透過Flash來進行。」請問這是指?[單選]
A. 多媒體廣告
10.(D) 電子郵件廣告包括?[單選]
A. 廣告贊助式的電子郵件
B. 贊助討論區與電子新聞報
C. 電子傳單
D. 以上皆是
11.(B) 利用虛擬實境的方式,來讓消費者有親身體驗產品、服務或品牌的經驗屬於哪一種廣告類型?[單選]
B. 互動式廣告
12.(C) 在手機遊戲上的廣告屬於哪一種廣告類型?[單選]
C. 行動廣告
第十五章 協同消費
1.(D) 透過網路讓使用者彼此進行資源交換是指下列何種概念?[單選]
D. 協同消費
2.(C) 協同消費的關鍵在於下列何者?[單選]
C. 使用者的可信度
3.(D) 透過租賃服務,來提供高價商品、奢侈品牌、限量商品等給有需要的使用者選購,這是下列何種概念?[單選]
D. 協同消費
4.(D)
Airbnb提供網路使用者只要擁有可以出租的房子或家中的空房,就能租給來自世界各地的旅客,是下列何種概念?[單選]
D.協同式生活
5.(D) 請問下列何者非協同消費的別稱?[單選]
D. Owned product
6.(ABC) 請問協同消費的類型包括下列哪些?[複選]
A. 產品服務系統 B. 市場在流通
C. 協同式生活
7.(A) 請問:Ubike依照不同時間區段收取租借的費用,這是
協同消費的哪個類型?[單選]
A. 產品服務系統
8.(B) 請問二手產品銷售的概念是指協同消費的哪個模式?[單選]
B. 市場在流通
9.(C) 透過平臺讓使用者共同分享與交易無形的資源是指協同消費的哪個模式?[單選]
B. 協同式生活
10.(A) 請問協同消費的核心為何種概念?[單選]
A. 分享
第十六章 物聯網
1.(D) 請問下列敘述:建構在網路、電信等資訊媒介,讓許多植入感應器的物件能夠互連互通的網路模式,指的是哪個概念?[單選]
B. 物聯網
2.(ACD) 請問物聯網的發展可分為哪三個維度?[複選]
A. 時間 C. 地點
D. 物件
3.(ABC) 請問物聯網涵蓋哪三大範疇?[複選]
A. 人與人 B. 物件與物件
C. 人與物件
4.(ABCD)
請問Vodafone 針對物聯網的四大預測包括哪些?
A. 在車用以及工業用的領域加速發展
B. 結合巨量資料 (Big Data) 讓服務更聰明
C. 更快速的連線
D. 更完整的規範
5.(D) 請問下列何者非物聯網的關鍵技術?[單選]
D. 行動通訊設備
6.(A) 請問由感應器 (Reader) 和標籤 (Tag) 所組成的系統是指下列何者?[單選]
A. 射頻識別技術
7.(C) 請問將軟體結合硬體裝置的應用,舉凡行動電話、遊樂器、數位家電等,哪個技術使其具備接收網路訊息與處理資訊的能力?[單選]
C. 嵌入式智慧技術
8.(D) 請問Google 的智慧加庭較偏向下列何者應用?[單選]
D. 物聯網
9.(D) 羊毛出在狗身上,豬來買單是只下列何者商業模式?「單選」
D.數位匯流
10.(A)下列何者非物聯網重要的商業模式之ㄧ?「單選」
A.平臺的使用人數
The
world's online population was estimated to be around ________ in 2020.
4
billion
Which of
the following is not a unique feature of e-commerce technology?
information
asymmetry
Which of
the following is the best definition of transaction cost?
the cost
of participating in a market
The
Internet has shown similar growth patterns as other electronic technologies of
the past.
False
Which of
the following is another name for a revenue model?
financial
model
Which of
the following is not a major business trend in e-commerce in 2020-2021?
Retail
e-commerce revenues exceed B2B e-commerce revenues for the first time.
Which of
the following best defines e-commerce?
digitally
enabled commercial transactions between and among organizations and individuals
Which of
the following can be considered synonymous with the term e-commerce?
digital
commerce
Which of
the following features of e-commerce technology enables merchants to market and
sell "complex" goods and services to consumers via marketing messages
that can integrate video, audio, and text?
richness
Which of
the following is not a key element of an elevator pitch?
legal
structure
All of
the following can be considered examples of the market creator business model
except:
Twitter.
Which of
the following statements about Foursquare is not true?
The
growth in Foursquare's revenue has been driven primarily by significant
increases in the numbers of users of its Swarm app.
Which
element of the business model addresses what a firm provides that other firms
do not and cannot?
value
proposition
All of
the following can be considered a direct competitor of Priceline except:
ESPN.
Which of
the following uses a subscription-based sales revenue model?
Dollar
Shave Club
Which of
the following is an unfair competitive advantage?
brand
name
First
movers often fail because:
they
lack complementary resources needed to sustain their advantages.
Which
element of the business model refers to the presence of substitute products in
the market?
competitive
environment
Which of
the following uses a subscription revenue model for books?
Amazon
Kindle Unlimited
The
Transport Layer of TCP/IP is responsible for which of the following?
providing
communication with the application by acknowledging and sequencing the packets
to and from the application
Which of
the following is not a basic type of cloud computing service?
FiOS
During
which period of time did the Institutionalization phase of Internet development
take place?
1975-1995
Which of
the following statements about cloud computing is not true?
A public
cloud is typically used by companies with stringent privacy and security
requirements.
Which of
the following is a set of rules for transferring data?
protocol
Which of
the following was the original purpose of the Internet?
to link
large mainframe computers on different college campuses
Which of
the following are specialized computers that transmit message parcels along
available Internet communication paths and on to their destinations?
routers
Which of
the following protocols enables the exchange of routing information among
different autonomous systems on the Internet?
BGP
The
Internet Layer of TCP/IP is responsible for which of the following?
addressing,
packaging, and routing messages
Which of
the following is the core communications protocol for the Internet?
TCP/IP
The
process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the
destination point is called:
packet
switching.
Which of
the following protocols is used to send mail to a server?
SMTP
Which of
the following is rarely used today, due to security concerns.
Telnet
Which of
the following are central directories that list all domain names currently in
use for specific domains?
root
servers
Which of
the following verifies that the business objectives of the system are in fact
working?
acceptance
testing
Which of
the following details the actual hardware components to be used in a system?
physical
design
The
process of comparing a website with that of its competitors in terms of
response speed, quality of layout, and design is known as:
benchmarking.
Which of
the following are the two main components of a systems design?
logical
design and physical design
A multi-tier
architecture includes a web and database server.
False
What are
the two most important management challenges in building a successful
e-commerce presence?
developing
a clear understanding of business objectives and knowing how to choose the
right technology to achieve those objectives
The cost
of hardware, software, and telecommunications services needed to build a
website have ________ over the last decade.
decreased
dramatically
Most of
the time required to maintain an e-commerce site is spent on:
general
administration and making changes and enhancements to the system.
A
template test is a form of which type of testing?
A/B
testing
Which of
the following involves testing a site's program modules one at a time?
unit
testing
Confidentiality
is sometimes confused with:
privacy.
________
is the ability to ensure that an e-commerce site continues to function as
intended.
Availability
WannaCry
is an example of ransomware.
True
________
is the ability to ensure that e-commerce participants do not deny their online
actions.
Nonrepudiation
Typically,
the more security measures added to an e-commerce site, the slower and more
difficult it becomes to use.
True
According
to Ponemon Institute's 2019 survey, which of the following was not among the
causes of the costliest cybercrimes?
botnets
Which of
the following is an example of an online privacy violation?
your
online purchasing history being sold to other merchants without your consent
Malware
that comes with a downloaded file requested by a user is called a:
drive-by
download.
________
is the ability to identify the person or entity with whom you are dealing on
the Internet.
Authenticity
A) digitally
enabled commercial transactions between and among organizations and
individuals.
E-commerce
can be defined as:
A)
digitally enabled commercial transactions between and among organizations and
individuals.
B) the
use of digital technologies in a firm's daily activities.
C) the
digital enablement of transactions and processes within an organization.
D) any
electronically based organizational activity that supports a firm's market
exchanges.
A)
Amazon's inventory control system
Which of
the following is an example of e-business?
A)
Amazon's inventory control system
B) the
Amazon.com website
C) an
Amazon mobile app
D)
Amazon's Pinterest page
B)
digital commerce
Which of
the following can be considered synonymous with the term e-commerce?
A)
e-business
B)
digital commerce
C) the
Internet
D) the
Web
C)
information asymmetry
Which of
the following is not a unique feature of e-commerce technology?
A)
interactivity
B)
social technology
C)
information asymmetry
D)
richness
A)
richness
Which of
the following features of e-commerce technology enables merchants to market and
sell "complex" goods and services to consumers via marketing messages
that can integrate video, audio, and text?
A)
richness
B)
ubiquity
C)
information density
D) personalization
D)
social technology
Which of
the following features of e-commerce technology allows users to participate in
the creation of online content?
A)
ubiquity
B)
global reach
C)
information density
D)
social technology
B) the
cost of participating in a market
Which of
the following is the best definition of transaction cost?
B) the
cost of participating in a market
B) 3.6
billion
The
world's online population was estimated to be around ________ in 2018.
A) 360
million
B) 3.6
billion
C) 36
billion
D) 360
billion
C)
universal standards
Which of
the following features of e-commerce technology is related to the concept of
network externalities?
A)
richness
B)
interactivity
C)
universal standards
D)
information density
C) The
larger the audience reached, the less rich the message.
Which of
the following statements is true about the traditional tradeoff between the
richness and reach of a marketing message prior to the development of the Web?
A)
Marketing messages had little richness.
B) The
smaller the audience reached, the less rich the message.
C) The
larger the audience reached, the less rich the message.
D)
Richness was unrelated to reach.
D) the enabling
of two-way communication between consumer and merchant
Interactivity
in the context of e-commerce provides which of the following functionalities?
A) the
ability to physically touch and manipulate a product
B)
complexity and content of a message
C) the
ability of consumers to create and distribute content
D) the
enabling of two-way communication between consumer and merchant
C) menu
costs
The
costs incurred by merchants in having to change product prices (such as the
costs of reentering prices into computer systems) are referred to as which of
the following?
A)
subscription costs
B) fixed
costs
C) menu
costs
D)
variable costs
A)
information asymmetry
Which of
the following refers to any disparity in relevant market information among
parties in a transaction?
A)
information asymmetry
B)
unfair competitive advantage
C)
imperfect competition
D)
dynamic pricing
B)
marketplace
Which of
the following is a physical place you visit in order to transact?
A)
marketspace
B)
marketplace
C)
social network
D) the
Internet
C) reach
The
total number of users or customers an e-commerce business can obtain is a
measure of which of the following?
A)
ubiquity
B)
interactivity
C) reach
D)
information density
A)
richness
Which of
the following refers to the complexity and content of a message?
A)
richness
B) reach
C)
information density
D)
interactivity
C)
ubiquity.
E-commerce
is available just about everywhere and anytime. This is known as:
A)
richness.
B)
information density.
C)
ubiquity.
D)
reach.
C)
mobile e-commerce
Which
type of e-commerce is distinguished by the type of technology used in the
transaction rather than by the nature of the market relationship?
A)
consumer-to-consumer (C2C)
B) social e-commerce
C) mobile e-commerce
D)
business-to-business (B2B)
D)
Facebook
Which of
the following is a leading platform for social e-commerce?
A)
Amazon
B) eBay
C)
Wikipedia
D)
Facebook
A) grew
at double-digit rates between 2010 and 2018.
Business-to-consumer
(B2C) e-commerce in the United States:
A) grew
at double-digit rates between 2010 and 2018.
B) has
less revenue than C2C e-commerce.
C) now
constitutes over 50% of the overall U.S. retail market.
D) is growing
more slowly as it confronts its own fundamental limitations.
B) Users
still spend less time using apps than they do using desktops or mobile
websites.
Which of
the following is not true about the use of apps?
A) Users
spend nearly 90% of their smartphone app minutes using their top five apps.
B) Users
still spend less time using apps than they do using desktops or mobile
websites.
C) Apps
are easier to control and monetize than websites.
D) Users
typically use about 20 different apps per month.
B)
Airbnb
Which of
the following is an example of an on-demand service company?
A)
YouTube
B)
Airbnb
C)
Tumblr
D)
Facebook
D)
Go2Paper
Which of
the following is a platform for B2B e-commerce?
A)
Airbnb
B)
Facebook
C)
Groupon
D)
Go2Paper
A)
Walmart
All of
the following are platforms for C2C e-commerce except:
A)
Walmart
B)
Facebook Marketplace
C)
Craigslist
D) Etsy
C) Y
Combinator.
All of
the following are examples of social networks except:
A)
Instagram.
B)
Twitter.
C) Y
Combinator.
D)
Pinterest.
A) social
e-commerce generated more revenue than mobile e-commerce.
All of
the following statements about e-commerce in the United States in 2018 are true
except:
A)
social e-commerce generated more revenue than mobile e-commerce.
B)
mobile advertising accounted for over 70% of all digital advertising spending.
C)
on-demand service firms fueled the growth of local e-commerce.
D)
growth rates for retail e-commerce were higher in the Middle East than in the
United States.
B) 16%
In 2018,
about ________ of Americans accessed the Internet solely via a mobile device.
A) 8%
B) 16%
C) 28%
D) 34%
B)
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
Which of
the following is not a major business trend in e-commerce in 2018-2019?
A)
Mobile e-commerce continues to grow.
B)
Retail e-commerce revenues exceed B2B e-commerce revenues for the first time.
C)
On-demand service companies garner multibillion-dollar valuations.
D)
Social e-commerce continues to grow.
D)
Growth of the Internet of Things slows down.
Which of
the following is not a major technology trend in e-commerce in 2018-2019?
A)
Mobile messaging services are now used by almost two-thirds of smartphone
users.
B) Firms
are turning to business analytics to make sense out of big data.
C) Smart
speakers provide an additional platform for e-commerce.
D)
Growth of the Internet of Things slows down.
C) concerns
about the U.S. Supreme Court ruling that online businesses do not need to
collect state sales tax.
All of
the following are major social trends in e-commerce in 2018-2019 except for:
A)
concerns about the flood of temporary, poorly paid jobs without benefits being
generated by on-demand service companies.
B)
concerns over commercial and governmental privacy invasion.
C)
concerns about the U.S. Supreme Court ruling that online businesses do not need
to collect state sales tax.
D)
concerns about the increasing market dominance of Facebook, Amazon, and Google.
B) Over
220 Americans used tablet computer apps in 2018.
Which of
the following statements about the mobile platform is not true?
A) Over
91% of Americans used a mobile device to access the Internet at least some of
the time in 2018.
B) Over
220 Americans used tablet computer apps in 2018.
C)
M-commerce purchases were expected to reach almost $280 billion in 2018.
D) The
time U.S. adults spend using mobile apps accounts for over 60% of total digital
minutes spent.
D)
Maintain a basic, static website depicting the firm's brand.
Which of
the following describes the basic web policy of large firms during the
Invention period?
A)
Integrate social networks and the mobile platform with website marketing.
B)
Emphasize the necessity for the Web to generate profits.
C) Use
the Web to sell complex goods and services online.
D)
Maintain a basic, static website depicting the firm's brand.
D) $7.3
trillion.
It is
estimated that by 2022, the size of the B2B market will reach:
A) $730
million.
B) $7.3
billion.
C) $730
billion.
D) $7.3
trillion.
A) The
Web is the technology upon which the Internet is based.
Which of
the following statements about the Web is not true?
A) The
Web is the technology upon which the Internet is based.
B) The
Web was the original "killer app."
C) The
Web provides access to pages written in Hypertext Markup Language.
D) The Web
is both a communications infrastructure and an information storage system.
D) 1
billion
In 2018,
there were more than ________ Internet hosts.
A) 1
million
B) 10
million
C) 100
million
D) 1
billion
A) the
development of the smartphone.
All of
the following can be considered a precursor to e-commerce except:
A) the
development of the smartphone.
B)
Baxter Healthcare's PC-based remote order entry system.
C) the
French Minitel.
D) the
development of Electronic Data Interchange standards.
C) The
French Minitel
________
was the first truly large-scale digitally enabled transaction system in the B2C
arena.
A) Telex
B) The
Baxter Healthcare system
C) The
French Minitel
D)
Eelectronic Data Interchange (EDI)
C) 1995
In which
year can e-commerce be said to have begun?
A) 1983
B) 1985
C) 1995
D) 2001
B)
inability to retain users.
All of
the following are issues facing Pinterest except:
A)
copyright infringement.
B)
inability to retain users.
C) spam.
D)
scams.
C)
disintermediation
Which of
the following is a characteristic of e-commerce during the Invention period?
A)
mobile technology
B)
earnings and profit emphasis
C)
disintermediation
D)
extensive government surveillance
D)
auction sites.
All of
the following are examples of Web 2.0 sites and applications except:
A)
photo-sharing sites.
B)
blogs.
C) wikis.
D) auction sites.
D) It is
highly regulated.
Which of
the following is not a characteristic of a perfect competitive market?
A)
Price, cost, and quality information are equally distributed.
B) A
nearly infinite set of suppliers compete against one another.
C)
Customers have access to all relevant information worldwide.
D) It is
highly regulated.
D) fast
follower advantage.
All of
the following were visions of e-commerce expressed during the early years of
e-commerce except:
A) a
nearly perfect information marketspace.
B)
friction-free commerce.
C)
disintermediation.
D) fast
follower advantage.
A) one
competitor has an advantage that others cannot purchase.
Unfair
competitive advantages occur when:
A) one
competitor has an advantage that others cannot purchase.
B)
market middlemen are displaced.
C)
information is equally distributed and transaction costs are low.
D) firms
are able to gather monopoly profits.
A) an
emphasis on exploiting traditional distribution channels.
The
early years of e-commerce were driven by all of the following factors except:
A) an
emphasis on exploiting traditional distribution channels.
B) a
huge infusion of venture capital funds.
C) an
emphasis on quickly achieving very high market visibility.
D)
visions of profiting from new technology.
C) a
stunning technological success as the Internet and the Web increased from a few
thousand to billions of e-commerce transactions per year.
The
early years of e-commerce are considered:
A) the
most promising time in history for the successful implementation of first mover
advantages.
B) an
economist's dream come true, where for a brief time, consumers had access to
all relevant market information and transaction costs plummeted.
C) a
stunning technological success as the Internet and the Web increased from a few
thousand to billions of e-commerce transactions per year.
D) a
dramatic business success as 85% of dot-coms formed since 1995 became
flourishing businesses.
A) They
were a technological success but a mixed business success.
Which of
the following best describes the early years of e-commerce?
A) They
were a technological success but a mixed business success.
B) They
were a technological success but a business failure.
C) They
were a technological failure but a business success.
D) They
were a mixed technological and business success.
D)
expansion of e-commerce to include services as well as goods
Which of
the following is a characteristic of the Reinvention phase of e-commerce?
A)
massive proliferation of dot-com start-ups
B)
widespread adoption of broadband networks
C) rapid
growth of search engine advertising
D)
expansion of e-commerce to include services as well as goods
C) brand
extension and strengthening becomes more important than creating new brands
Which of
the following is a characteristic of the Consolidation phase of e-commerce?
A) predominance
of pure online strategies
B)
emphasis on revenue growth versus profits
C) brand
extension and strengthening becomes more important than creating new brands
D) shift
to a technology-driven approach
D) The
market middlemen disappeared.
Which of
the following is not true regarding e-commerce today?
A)
Economists' visions of a friction-free market have not been realized.
B)
Consumers are less price-sensitive than expected.
C) There
remains considerable persistent price dispersion.
D) The
market middlemen disappeared.
C)
Overall transaction costs have dropped dramatically.
Which of
the following statements is not true?
A)
Information asymmetries are continually being introduced by merchants and
marketers.
B)
Intermediaries have not disappeared.
C)
Overall transaction costs have dropped dramatically.
D)
Brands remain very important in e-commerce.
B) eToys
Which of
the following is an example of an e-commerce first mover that failed?
A) Etsy
B) eToys
C) eBay
D)
E*Trade
D)
webrooming
Which of
the following refers to the practice of researching a product online before
purchasing it at a physical store?
A)
zooming
B)
grazing
C)
showrooming
D)
webrooming
B) The
Web
Which of
the following was the original "killer app" that made the Internet
commercially interesting and extraordinarily popular?
A)
e-commerce
B) The
Web
C)
social networks
D)
mobile apps
B)
disintermediation
Which of
the following refers to the displacement of market middlemen and the creation
of a new direct relationship between producers and consumers?
A)
network effect
B)
disintermediation
C)
friction-free commerce
D) first
mover advantage
A)
technology driven
Above
all, e-commerce is a ________ phenomenon.
A)
technology driven
B)
finance-driven
C)
sociological
D)
government-driven
D)
workgroup automation (e.g., document sharing)
Which
business application is associated with the technological development of local
area networks and client/server computing?
A)
transaction automation (e.g., payroll)
B)
desktop automation (e.g., word processing)
C)
industrial system automation (e.g., supply chain management)
D)
workgroup automation (e.g., document sharing)
D)
intellectual property
Which of
the following is an important societal issue related to e-commerce?
A)
consumer behavior
B) value
webs
C) cloud
computing
D)
intellectual property
B)
Economists take a purely technical approach to e-commerce.
Which of
the following statements is not true?
A) No single
academic perspective dominates research about e-commerce.
B)
Economists take a purely technical approach to e-commerce.
C) There
are two primary approaches to e-commerce: behavioral and technical.
D)
Management scientists are interested in e-commerce as an opportunity to study
how business firms can exploit the Internet to achieve more efficient business
operations.
1.52)
All of the following are business models employed in the online music industry
except:
B)
peer-to-peer streaming.
2.10)
Which of the following is an example of the affiliate revenue model?
D)
MyPoints
3.54) In
the ________ business model, a web-based business builds a digital environment
in which buyers and sellers can meet, display products, search for products,
and establish prices.
A)
market creator
4.37. 將企業分為主要活動與支援活動,藉此找出企業的核心能力,幫助企業決定資源的配置,這是何種理論?[單選]
C.價值鏈分析
5.3)
Which element of the business model addresses what a firm provides that other
firms do not and cannot?
D) value
proposition
6.16) A
perfect market is one in which:
A) there
are no competitive advantages or asymmetries because all firms have equal
access to all the factors to production.
7.7.
7-11 在網路上架設一個官方網站,以提供消費者最新資訊、活動介紹等服務,若以電子商務光譜的概念來看,7-11 的策略方向是屬於?(單選) 回答錯誤
(D) 修改營運模式
8.1)
________ and ________ are typically the most easily identifiable aspects of a
company's business model.
B) Value
proposition; revenue model
9.73)
________ technologies are technologies that enable the incremental improvement
of products and services.
A)
Sustaining
10.17)
Organizations that typically provide an array of services to startup companies
along with a small amount of funding are referred to as:
C)
incubators.
11.63)
The Seam is an example of a(n):
C)
industry consortium.
12.36.lativ希望成為網路休閒服飾的領導品牌,由此可見這家企業有明確的企業願景,請問這是屬於策略發展的哪個階段?[單選] 回答錯誤
B.策略起始
13.23. 企業在進行產品或是服務運作的過程時,常會注意到:「企業的關鍵資源?對顧客的價值主張?企業的關鍵流程?利潤公式?」請問以上這些問題是屬於?[單選]
D.商務模式的概念
14.17. 網站藉由提供訪客內容、服務或產品資訊,也提供一個廣告場所,然後向廣告主收取費用,是屬於哪一種收益模式?[單選]
A.廣告收益模式
15.11) Which
of the following involves a company giving away a certain level of product or
service without charge, but then charging a fee for premium levels of the
product or service?
C)
freemium strategy
16.74)
Innovative entrepreneurs and their business firms that destroy existing
business models are referred to as:
C)
disruptors.
17.21. 下列何者不是電子商務發展的定位時考慮到的評估因素?[單選]
C.價值鏈
18.33. 在電子商務的交易模式中,若由賣方彼此競價,出價最低者就贏得與買方的商務交易,這是屬於?[單選]
D.逆拍賣式價格
19.20. 在策略定位中,Michael Porter的價值鏈分析,是屬於哪一種分析?[單選]
C.企業內部環境
20.43)
Which of the following is not a variation of the e-tailer business model?
C)
market creator
21.71)
If you wished to leverage the ubiquitous nature of the Web to differentiate
your product, you would:
A)
enable individual customization of the product by consumers.
22.57)
All of the following are examples of business-to-business (B2B) business models
except:
D)
portals.
23.18. 網站藉由提供內容或服務給會員,然後向這些會員收取訂閱費用,是屬於哪一種收益模式?[單選]
B.訂閱收益模式
24.19. 網站藉由促成或執行交易而向會員或廠商收取手續費用,是屬於哪一種收益模式?[單選]
C.手續費收益模式
25.41. 君君是amazon.com的會員,他每次使用amazon.com買書的時候,總會有建議書單在螢幕左下角出現,請問amazon.com提供的這種服務是屬於網路商業模式的哪種特性?[單選] 回答錯誤
C.策略面
26.15)
All of the following can be considered a direct or indirect competitor of
Amazon except:
D)
Priceline.
27.50) The
basic value proposition of community providers is:
A) they
offer a fast, convenient one-stop site where users can focus on their most
important concerns and interests.
28.58)
What is the primary revenue model for an e-distributor?
A) sales
29.31)
Which of the following types of crowdfunding involves people making
contributions to others with no expectation of any return?
A)
donor-based crowdfunding
30.69)
Which of the following is not a primary activity in a firm value chain?
B)
finance/accounting
31.27)
________ is defined by a company using its competitive advantage to gain in
surrounding markets.
C)
Leverage
32.8)
Stickiness is an important attribute for which of the following revenue models?
A)
advertising revenue model
33.44)
Which of the following is an example of a company using the content provider
model?
B)
Netflix
34.8. 誠品書局在網路上建立商城,希望能把實體的顧客送到線上,也把線上的顧客送到實體商店。在實虛整合的四個尺度中,誠品書局考慮到了?(單選)
(A) 品牌
35.5)
Which of the following are Amazon's primary value propositions?
B)
selection and convenience
36.80)
E-commerce has increased price competition in many markets.
A.A
37.55)
On-demand service companies are characterized by the free sharing of resources
between the company and consumers. 回答錯誤
A.A
38.79)
Interactivity that enables product customization alters industry structure by
decreasing the threat of substitutes.
A.A
39.36)
In the subscription revenue model, a company primarily generates income from
the display of ads.
B.B
40.34)
Information asymmetries enable some firms to have an edge over others.
A.A
41.81)
Social technologies change industry structure by weakening powerful sales
channels and shifts bargaining power to consumers.
B.B
42.75) The
term unfit fitness refers to a situation in which employees of a firm have the
wrong skills for the current environment.
A.A
43.76)
Scale economies are efficiencies that result from increasing the size of the
business.
A.A
44.32) A
value proposition defines how a company's product or service will generate
revenue for the firm.
B.B
45.37)
GoFundMe is a prominent example of a rewards-based crowdfunding site.
B.B
46.77) A
company's strong linkages with its customers increase switching costs.
A.A
47.65)
SaaS and PaaS providers can typically provide services at lower costs through
scale economies.
A.A
48.35)
Slow followers are sometimes more successful than first movers.
A.A
49.33)
Real markets are imperfect.
A.A
50.78)
The Internet's universal standards have changed industry structure by
increasing barriers to entry and decreasing competition within an industry.
B.B
-----
51) Tier
1 ISPs provide Internet access to consumers and businesses.
FALSE
54)
Which of the following is not a concern about IoT?
A) the
falling cost of sensors
B)
interoperability
C)
security
D)
privacy
Answer:
A
55) What
type of Internet access technology are Google and Facebook hoping to use to
provide Internet access to remote parts of the world?
A)
Bluetooth
B)
drones
C) WLANs
D) EDI
Answer:
B
56)
Which of the following statements about fiber-optic cable is not true?
A) It
transmits more data at faster speeds than coaxial or twisted pair cable.
B) It is
thinner and lighter than coaxial or twisted pair cable.
C) Most
U.S. homes have fiber connections.
D)
Long-haul fiber optic networks are typically owned by firms referred to as Tier
I ISPs.
Answer:
C
57) The
major technologies used with wireless local area networks are:
A) Wi-Fi
and Bluetooth.
B) Wi-Fi
and WiMax.
C)
Bluetooth and 3G.
D) WiMax
and 3G.
Answer:
A
58)
Which of the following IEEE standards provide for high-speed short-range Wi-Fi?
A)
802.11ad
B)
802.11ay
C)
802.11ah
D)
802.11af
Answer:
A
59) All
of the following are involved in the effort to create standards for IoT except:
A)
AllSeen Alliance.
B)
Industrial Internet Consortium.
C) Open
Connectivity Foundation.
D) W3C
Answer:
D
60) All of
the following either currently, or have plans to, offer Internet access via
satellite except:
A)
Facebook
B) Dish
C)
Microsoft
D)
Boeing
Answer:
C
61)
Microsoft's pilot program to provide broadband Internet access to rural areas
uses which of the following technologies?
A)
satellites
B)
drones
C)
unused, low-powered television channels
D) high
altitude balloon
Answer:
C
62) The
United States has the world's highest average Internet connection speed.
FALSE
63)
WLAN-based Internet access derives from the same technological foundations as
telephone - based wireless Internet access.
FALSE
64) The
Internet of Things (IoT) is based on sensors that can collect data and connect
to the Internet.
TRUE
67) The
first web browser to make it possible to view documents on the Web with colored
background, images, and animations was:
A)
Netscape Navigator.
B)
Mosaic.
C) Mozilla.
D) Internet Explorer.
Answer:
B
68) In
the address http://www.company.com/clients.html, which of the following is the
top-level domain?
A) .com
B)
company.com
C) www
D) http
Answer:
A
69) You
could expect to find all of the following services in a web server software
package except:
A)
security services.
B) FTP.
C)
search engine.
D) an
RSS aggregator.
Answer:
D
70) Which
of the following was the most popular web browser as of August 2018?
A)
Internet Explorer
B)
Safari
C)
Chrome
D)
Firefox
Answer:
C
71) The
concept behind document formatting had its roots in which of the following?
A) XML
B) SGML
C) HTML
D) GML
Answer:
D
72) All
of the following statements about HTML5 are true except:
A) HTML5
has become the de facto web page development standard.
B) HTML5
is an important tool for both response web design and adaptive web delivery.
C) HTML5
apps work just like web pages.
D) HTML5
stores page content into mobile device hardware rather loading into the browser
from a web server.
Answer:
D
73) HTML
defines the structure of a web page.
TRUE
75)
Cortana is a type of:
A)
intelligent digital assistant.
B)
widget.
C) gadget.
D)
social network
Answer:
A
76)
Which of the following enables Internet users to communicate with each other,
although not in real time?
A)
mobile messaging
B)
online forum
C) SMS
messaging
D) VoIP
Answer:
B
77)
Which of the following is not a mobile messaging application?
A) Kik
B)
WhatsApp
C) Viber
D)
Feedly
Answer:
D
78) A(n)
________ allows users to easily add and edit content on a web page.
A) wiki
B)
podcast
C) blog
D) RSS
feed
Answer:
A
79) The
protocol that enables the transmission of voice and other forms of audio
communication over the Internet is called:
A) VoIP.
B) IPTP.
C) VTP.
D) IP.
Answer:
A
82)
Google Cardboard is an example of which of the following?
A)
virtual reality
B)
artificial intelligence
C)
augmented reality
D) chatbot
Answer:
A
83) All
of the following statements about mobile apps are true except:
A)
mobile apps have usurped television as the most popular entertainment medium.
B) iOS
apps are cross-platform, open-source applications.
C) over
200 billion apps have been downloaded from the Apple App Store.
D)
almost all the top 100 brands have a presence in at least one of the major app
stores.
Answer:
B
84)
Which of the following is a programming language introduced by Apple
specifically for developing iOS applications?
A)
Objective-C
B) C
C) C++
D) Swift
Answer:
D
85)
Applications for Android operating system-based smartphones are typically
written in which of the following?
A) Swift
B) Java
C)
ActiveX
D)
ColdFusion
Answer:
B
-----
1.26. 「amazon.com 透過網路來銷售,產品選擇範圍廣,同時在倉庫配貨運送,後來更推出網路商城,商家可以在商城開店,就像進駐百貨公司專櫃一樣」,請問上述符合網路商業模式創新的哪個條件?[單選] 回答錯誤
C.亮眼的業績表現
2.30. 藉由蒐集關於消費者及其消費習慣的資訊,並將其販賣給那些需要得知顧客情報的企業以獲取利潤,是屬於哪一種收益模式?[單選]
D.商情媒介收益模式
3.21)
Which of the following is an unfair competitive advantage?
A) brand
name
4.12) Which
of the following factors is not a significant influence on a company's
competitive environment?
C) the
availability of supportive organizational structures
5.24)
Which type of investor typically becomes interested in a startup company after
it has begun generating revenue?
D)
venture capital investors
6.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]
B.目錄式價格
7.1. 網站藉由銷售商品、資訊或服務給消費者而從中賺取價差,這是屬於下列哪一種收益模式?(單選)
(D) 銷售收益模式
8.70) A
________ is a networked business ecosystem that coordinates a firm's suppliers,
distributors, and delivery firms with its own production needs using an
Internet-based supply chain management system.
C) value
web
9.62)
Over the past decade, the number of exchanges has:
B)
diminished sharply.
10.9)
Which of the following companies uses a transaction fee revenue model?
B)
E*Trade
11.17. 網站藉由提供訪客內容、服務或產品資訊,也提供一個廣告場所,然後向廣告主收取費用,是屬於哪一種收益模式?[單選]
A.廣告收益模式
12.23. 企業在進行產品或是服務運作的過程時,常會注意到:「企業的關鍵資源?對顧客的價值主張?企業的關鍵流程?利潤公式?」請問以上這些問題是屬於?[單選]
D.商務模式的概念
13.2. 下列何者是對電子商務的正確認知?[單選]
D.電子商務科技
14.74)
Innovative entrepreneurs and their business firms that destroy existing
business models are referred to as:
C)
disruptors.
15.31)
Which of the following types of crowdfunding involves people making
contributions to others with no expectation of any return?
A)
donor-based crowdfunding
16.3)
Which element of the business model addresses what a firm provides that other
firms do not and cannot?
D) value
proposition
17.21. 下列何者不是電子商務發展的定位時考慮到的評估因素?[單選]
C.價值鏈
18.8)
Stickiness is an important attribute for which of the following revenue models?
A)
advertising revenue model
19.24.阿傑是個Apple的重度使用者,每天都會逛Apple的App Store搜尋最新的應用程式,請問App Store豐富的數位化內容是屬於網路商業模式的哪種特性? [單選]
B.核心面
20.25. 小仙是個愛網購的女生,每當想要買東西時,總會上愛合購揪團買東西,請問愛合購是屬於何種網路商業模式?[單選]
D.中介平台
21.22)
Which of the following gives a business model the most credibility with outside
investors?
A) the
firm's management team
22.59)
Grainger is an example of which of the following business models?
C)
e-distributor
23.8. 下列何者不屬於Porter 的產業五力?[單選] 回答錯誤
D.銷售收益模式
24.57)
All of the following are examples of business-to-business (B2B) business models
except:
D)
portals.
25.19. 網站藉由促成或執行交易而向會員或廠商收取手續費用,是屬於哪一種收益模式?[單選]
C.手續費收益模式
26.43)
Which of the following is not a variation of the e-tailer business model?
C)
market creator
27.45)
Which of the following is not an example of the bricks-and-clicks e-tailing
business model?
C.C)
Bluefly
28.49)
Portals primarily generate revenue in all of the following ways except:
C) sales
of goods.
29.44)
Which of the following is an example of a company using the content provider
model?
B)
Netflix
30.47)
All of the following primarily use an advertising revenue model except:
D)
Walmart.
31.58)
What is the primary revenue model for an e-distributor?
A) sales
32.42)
Which of the following is not a community provider?
C) Blue
Nile
33.72) A
strategy designed to compete within a narrow market or product segment is
called a ________ strategy.
D) focus
34.2. 下列何者是對電子商務的正確認知?[單選] 回答錯誤
D.電子商業 (e-Business) 乃是徹底的改變
35.61)
Which of the following may offer its customers value chain management software?
B)
e-procurement companies
36.55)
On-demand service companies are characterized by the free sharing of resources
between the company and consumers.
是非題 (2 分) 2分
A.A
37.75)
The term unfit fitness refers to a situation in which employees of a firm have
the wrong skills for the current environment.
是非題 (2 分) 2分
A.A
38.77) A
company's strong linkages with its customers increase switching costs.
是非題 (2 分) 2分
A.A
39.81) Social
technologies change industry structure by weakening powerful sales channels and
shifts bargaining power to consumers.
是非題 (2 分) 2分
B.B
40.36)
In the subscription revenue model, a company primarily generates income from
the display of ads.
B.B
41.79)
Interactivity that enables product customization alters industry structure by
decreasing the threat of substitutes.
是非題 (2 分) 2分
A.A
42.80)
E-commerce has increased price competition in many markets.
A.A
43.37)
GoFundMe is a prominent example of a rewards-based crowdfunding site.
B.B
44.78)
The Internet's universal standards have changed industry structure by
increasing barriers to entry and decreasing competition within an industry.
B.B
45.65) SaaS
and PaaS providers can typically provide services at lower costs through scale
economies.
A.A
46.76)
Scale economies are efficiencies that result from increasing the size of the
business.
A.A
47.33)
Real markets are imperfect.
A.A
48.32) A
value proposition defines how a company's product or service will generate
revenue for the firm.
B.B
49.35)
Slow followers are sometimes more successful than first movers.
A.A
50.34)
Information asymmetries enable some firms to have an edge over others.
A.A
----------------
1.21)
Which of the following is an unfair competitive advantage?
C) sales
of goods.
3.8. 下列何者不屬於Porter 的產業五力?[單選]
D.銷售收益模式
4.38. 秀秀經營了一家時尚精品店,最近想在網路上建立商城,以搶攻網購商機,這時她想起數位時代編輯部對實體商店跨入網路經營時,提出的幾個問題,請問是哪幾個?[單選] 回答錯誤
C.使用者滿意度
5.60)
Ariba Supplier Network is an example of a(n):
C)
e-procurement firm.
6.14)
The existence of many competitors in any one market segment may indicate:
B) the
market is saturated.
7.28. 網站扮演市場製造者的角色,將買賣雙方聚集起來,並從交易中抽取用,是屬於哪一種收益模式?[單選]
C.經紀模式
8.2. 下列何者是對電子商務的正確認知?[單選]
D.電子商務科技
9.63)
The Seam is an example of a(n):
C)
industry consortium.
10.74)
Innovative entrepreneurs and their business firms that destroy existing
business models are referred to as:
C)
disruptors.
11.58) What
is the primary revenue model for an e-distributor?
A) sales
12.72) A
strategy designed to compete within a narrow market or product segment is
called a ________ strategy.
D) focus
13.43)
Which of the following is not a variation of the e-tailer business model?
C)
market creator
14.46)
In general, the key to becoming a successful content provider is to:
A) own
the content being provided.
15.48)
Which of the following is not considered a portal?
C)
Amazon
16.31)
Which of the following types of crowdfunding involves people making
contributions to others with no expectation of any return?
A)
donor-based crowdfunding
17.29. 網站藉由為合作夥伴介紹生意收取介紹費,或為其帶來任何銷售結果而收取某部分收益,是屬於哪一種收益模式?[單選]
C.合作收益模式
18.11)
Which of the following involves a company giving away a certain level of
product or service without charge, but then charging a fee for premium levels
of the product or service?
C)
freemium strategy
19.17)
Organizations that typically provide an array of services to startup companies
along with a small amount of funding are referred to as:
C)
incubators.
20.42)
Which of the following is not a community provider?
C) Blue
Nile
21.45)
Which of the following is not an example of the bricks-and-clicks e-tailing
business model?
C)
Bluefly
22.68)
Which of the following features of e-commerce technology changes industry
structure by lowering barriers to entry but greatly expands the market at the
same time?
A)
global reach
23.36.lativ希望成為網路休閒服飾的領導品牌,由此可見這家企業有明確的企業願景,請問這是屬於策略發展的哪個階段?[單選]
B.策略起始
24.10) Which
of the following is an example of the affiliate revenue model?
D)
MyPoints
25.40. 有些網路商城在消費過後,總會請顧客填寫意見表,此舉是屬於DeLone &
MeLean (2004年) 提出的哪種概念?[單選] 回答錯誤
C.策略面
26.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]
B.目錄式價格
27.7.
7-11 在網路上架設一個官方網站,以提供消費者最新資訊、活動介紹等服務,若以電子商務光譜的概念來看,7-11 的策略方向是屬於?(單選)
D.(D) 修改營運模式
28.3)
Which element of the business model addresses what a firm provides that other
firms do not and cannot?
D) value
proposition
29.20. 在策略定位中,Michael Porter的價值鏈分析,是屬於哪一種分析?[單選]
C.企業內部環境
30.69)
Which of the following is not a primary activity in a firm value chain?
B)
finance/accounting
31.67) A
________ refers to a competitive strategy in which firms attempt to achieve
lower business process costs.
A)
strategy of cost competition
32.25)
Which of the following is another name for a revenue model?
C)
financial model
33.24)
Which type of investor typically becomes interested in a startup company after
it has begun generating revenue?
D)
venture capital investors
34.15)
All of the following can be considered a direct or indirect competitor of
Amazon except:
D)
Priceline.
35.7)
Which of the following does not use a subscription revenue model?
D)
Twitter
36.81)
Social technologies change industry structure by weakening powerful sales
channels and shifts bargaining power to consumers.
B.B
37.79)
Interactivity that enables product customization alters industry structure by
decreasing the threat of substitutes. 回答錯誤
A.A
38.34)
Information asymmetries enable some firms to have an edge over others.
A.A
39.36)
In the subscription revenue model, a company primarily generates income from
the display of ads.
B.B
40.77) A
company's strong linkages with its customers increase switching costs.
A.A
41.35)
Slow followers are sometimes more successful than first movers.
A.A
42.75)
The term unfit fitness refers to a situation in which employees of a firm have
the wrong skills for the current environment.
A.A
43.76)
Scale economies are efficiencies that result from increasing the size of the
business.
A.A
44.37)
GoFundMe is a prominent example of a rewards-based crowdfunding site.
B.B
45.55)
On-demand service companies are characterized by the free sharing of resources
between the company and consumers.
A.A
46.32) A
value proposition defines how a company's product or service will generate
revenue for the firm.
是
B.B
47.65)
SaaS and PaaS providers can typically provide services at lower costs through
scale economies.
A.A
48.80)
E-commerce has increased price competition in many markets.
A.A
49.78)
The Internet's universal standards have changed industry structure by
increasing barriers to entry and decreasing competition within an industry.
B.B
50.33)
Real markets are imperfect.
A.A
------
------
1.28. 網站扮演市場製造者的角色,將買賣雙方聚集起來,並從交易中抽取用,是屬於哪一種收益模式?[單選] 回答錯誤
C.經紀模式
2.20. 在策略定位中,Michael Porter的價值鏈分析,是屬於哪一種分析?[單選]
C.企業內部環境
3.6) A firm's
________ describes how a firm will produce a superior return on invested
capital.
B)
revenue model
4.7.
7-11 在網路上架設一個官方網站,以提供消費者最新資訊、活動介紹等服務,若以電子商務光譜的概念來看,7-11 的策略方向是屬於?(單選)
(D) 修改營運模式
5.22. 安安是個忙碌的上班族,常沒有時間到實體店面去買衣服,只好回家上AWASEBA網站,在此她可選擇自己的身材型態,透過虛擬人物試穿來感覺是不是適合該服飾,請問AWASEBA的策略方向是屬於何種營運模式?[單選]
B.創新營運模式
6.25. 小仙是個愛網購的女生,每當想要買東西時,總會上愛合購揪團買東西,請問愛合購是屬於何種網路商業模式?[單選]
D.中介平台
7.50)
The basic value proposition of community providers is:
A) they
offer a fast, convenient one-stop site where users can focus on their most
important concerns and interests.
8.44)
Which of the following is an example of a company using the content provider
model?
B)
Netflix
9.52)
All of the following are business models employed in the online music industry
except:
B)
peer-to-peer streaming.
10.60)
Ariba Supplier Network is an example of a(n):
C)
e-procurement firm.
11.21)
Which of the following is an unfair competitive advantage?
A) brand
name
12.29)
Which of the following is not a key element of an elevator pitch?
C) legal
structure
13.2)
Which of the following uses a subscription revenue model for books?
B)
Amazon Kindle Unlimited
14.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]
B.目錄式價格
15.26)
All of the following can be considered examples of the market creator business
model except:
D)
Twitter.
16.61)
Which of the following may offer its customers value chain management software?
B)
e-procurement companies
17.15) All
of the following can be considered a direct or indirect competitor of Amazon
except:
D)
Priceline.
18.28) A
wealthy individual who invests personal funds in a startup in exchange for an
equity share in the business is referred to as a(n):
B) angel
investor.
19.29. 網站藉由為合作夥伴介紹生意收取介紹費,或為其帶來任何銷售結果而收取某部分收益,是屬於哪一種收益模式?[單選]
C.合作收益模式
20.4)
Which element of the business model refers to the presence of substitute
products in the market?
B)
competitive environment
21.24.阿傑是個Apple的重度使用者,每天都會逛Apple的App Store搜尋最新的應用程式,請問App Store豐富的數位化內容是屬於網路商業模式的哪種特性? [單選]
B.核心面
22.13)
All of the following can be considered a direct competitor of Priceline except:
D) ESPN.
23.36.lativ希望成為網路休閒服飾的領導品牌,由此可見這家企業有明確的企業願景,請問這是屬於策略發展的哪個階段?[單選]
B.策略起始
24.20)
All of the following may lead to a competitive advantage except:
C) fewer
products.
25.57)
All of the following are examples of business-to-business (B2B) business models
except:
D)
portals.
26.17. 網站藉由提供訪客內容、服務或產品資訊,也提供一個廣告場所,然後向廣告主收取費用,是屬於哪一種收益模式?[單選]
A.廣告收益模式
27.3)
Which element of the business model addresses what a firm provides that other
firms do not and cannot?
D) value
proposition
28.30. 藉由蒐集關於消費者及其消費習慣的資訊,並將其販賣給那些需要得知顧客情報的企業以獲取利潤,是屬於哪一種收益模式?[單選]
D.商情媒介收益模式
29.30)
First movers often fail because:
B) they
lack complementary resources needed to sustain their advantages.
30.39. 斌斌顧問公司衡量一家網路商城成不成功,常會由網站流量、消費者停留長度、購買數量等面向來看,這些衡量方法是屬於DeLone &
MeLean (2004年)提出的哪種概念?[單選] 回答錯誤
A.使用性
31.8. 下列何者不屬於Porter 的產業五力?[單選]
D.電子商務科技
32.54) In
the ________ business model, a web-based business builds a digital environment
in which buyers and sellers can meet, display products, search for products,
and establish prices.
A)
market creator
33.51)
eBay uses all of the following business models except:
C)
content provider.
34.45)
Which of the following is not an example of the bricks-and-clicks e-tailing
business model?
C)
Bluefly
35.46)
In general, the key to becoming a successful content provider is to:
A) own
the content being provided.
36.79)
Interactivity that enables product customization alters industry structure by
decreasing the threat of substitutes.
A.A
37.34)
Information asymmetries enable some firms to have an edge over others.
A.A
38.78)
The Internet's universal standards have changed industry structure by
increasing barriers to entry and decreasing competition within an industry.
B.B
39.33)
Real markets are imperfect.
A.A
40.80)
E-commerce has increased price competition in many markets.
A.A
41.36)
In the subscription revenue model, a company primarily generates income from
the display of ads.
B.B
42.35)
Slow followers are sometimes more successful than first movers.
A.A
43.32) A
value proposition defines how a company's product or service will generate
revenue for the firm.
B.B
44.55)
On-demand service companies are characterized by the free sharing of resources
between the company and consumers.
A.A
45.37) GoFundMe
is a prominent example of a rewards-based crowdfunding site.
B.B
46.65)
SaaS and PaaS providers can typically provide services at lower costs through
scale economies.
A.A
47.75)
The term unfit fitness refers to a situation in which employees of a firm have
the wrong skills for the current environment.
A.A
48.77) A
company's strong linkages with its customers increase switching costs.
A.A
49.81)
Social technologies change industry structure by weakening powerful sales
channels and shifts bargaining power to consumers.
B.B
50.76)
Scale economies are efficiencies that result from increasing the size of the
business.
A.A
---------------
43. 透過iPhone就能夠到App Stores下載軟體,使得每一支iPhone都具有獨特的個人風格,而可依照自己的想法與需求轉變成遊戲機、事務機等,創造出獨特性與特殊性。請問Apple掌握到了網路商業模式的哪種特性?[單選] 回答錯誤
A.只要動手架設網站,其他的都會水到渠成
--------------
1)
________ and ________ are typically the most easily identifiable aspects of a
company's business model.
B) Value
proposition; revenue model
3) Which
element of the business model addresses what a firm provides that other firms
cannot?
D) value
proposition
4) Which
element of the business model refers to the presence of substitute products in
the market?
B)
competitive environment
5) Which
of the following represent Amazon's primary value proposition(s)?
B)
selection and convenience
6) A
firm's ________ describes how a firm will produce a return on invested capital.
B)
revenue model
7) Which
of the following is an example of the subscription revenue model?
A)
Scribd
8)
Stickiness is an important attribute for which of the following revenue models?
A)
advertising revenue model
9) Which
of the following companies use a transaction fee revenue model?
B)
E*Trade
10) Which
of the following is an example of the affiliate revenue model?
D)
MyPoints
11)
Which of the following involves a company giving away a certain level of
product or services without charge, but then charging a fee for premium levels
of the product or service?
C)
freemium strategy
12)
Which of the following is not a significant influence on a company's
competitive environment?
C) the
availability of supportive organizational structures
13) All
of the following would be considered a direct competitor of Priceline except:
D) ESPN.
14) The
existence of many competitors in any one market segment may indicate:
B) the
market is saturated.
15) All
of the following can be considered a direct or indirect competitor of Amazon
except:
D)
Priceline.
16) A
perfect market is one in which:
A) there
are no competitive advantages or asymmetries because all firms have equal
access to all the factors to production.
17)
Organizations that typically provide an array of services to start-up companies
along with a small amount of funding are referred to as:
C)
incubators.
18) A
________ specifically details how you plan to find customers and sell your
product.
D)
market strategy
19)
Which of the following was not able to successfully implement a freemium
business model?
D)
Baremetrics
20) All
of the following may lead to a competitive advantage except:
C) fewer
products.
21)
Which of the following is an unfair competitive advantage?
A) brand
name
22)
Which of the following gives a business model the most credibility with outside
investors?
A) the
firm's management team
23)
Which of the following statements about Foursquare is not true?
D) In
2016, Foursquare decided to refocus its effort on developing a
subscription-based revenue model.
24) Which
type of investor typically becomes interested in a start-up company after it
has begun generating revenue?
D)
venture capital investors
25)
Which of the following is another name for a revenue model?
C)
financial model
26) All
of the following use a social network marketing strategy except:
D)
Amazon.
27) The
use of a company's competitive advantage to penetrate surrounding markets is
known as ________.
C)
leverage
28) A
wealthy individual who invests personal funds in a start-up in exchange for an
equity share in the business is referred to as a(n) ________.
B) angel
investor
29)
Which of the following is not a key element of an elevator pitch?
C) legal
structure
40)
Which of the following is not a community provider?
C) Blue
Nile
42) An
example of a company using the content provider model is:
B)
Rhapsody.
43)
Which of the following is not an example of the bricks-and-clicks e-tailing
business model?
C)
Bluefly
45) In
general, the key to becoming a successful content provider is to:
A) own
the content being provided.
47) All
of the following use an advertising revenue model except:
D)
Amazon.
48)
Which of the following is not considered a portal?
C)
Amazon
49)
Portals primarily generate revenue in all of the following ways except:
C) sales
of goods.
50) The
basic value proposition of community providers is:
A) they
offer a fast, convenient one-stop site where users can focus on their most
important concerns and interests.
51) eBay
uses all of the following business models except:
C)
content provider.
52) All
of the following are business models employed in the online music industry
except:
B)
peer-to-peer streaming.
53) The
financial services, travel services, and job placement services industries
typically use the ________ business model.
B)
transaction broker
54) In
the ________ business model, a web-based business builds a digital environment
in which buyers and sellers can meet, display products, search for products,
and establish prices.
A)
market creator
57) All
of the following are examples of business-to-business (B2B) business models
except:
D)
portals.
58) What
is the primary revenue model for an e-distributor?
A) sales
59)
Amazon is an example of which of the following business models?
C)
e-distributor
60)
________ create and sell access to digital markets.
C)
E-procurement firms
61)
Which of the following may offer its customers value chain management software?
B)
e-procurement companies
62) Over
the past decade, the number of exchanges has:
B)
diminished sharply.
63)
TheSeam is an example of a(n):
C)
industry consortium.
64) A
________ marketplace supplies products and services of interest to particular
industries.
D)
vertical
67)
Which business strategy involves implementing a new, more efficient set of
business processes that other firms cannot yet obtain?
A)
strategy of cost competition
68)
Which of the following features of e-commerce technology changes industry
structure by lowering barriers to entry but greatly expands the market at the
same time?
A)
global reach
69)
Which of the following is not a primary activity in a firm value chain?
B)
finance/accounting
70) A ________
is a networked business ecosystem that coordinates a firm's suppliers,
distributors, and delivery firms with its own production needs using an
Internet-based supply chain management system.
C) value
web
71) If
you wished to leverage the ubiquitous nature of the Web to differentiate your
product, you would:
A)
enable individual customization of the product by consumers.
72) A
strategy designed to compete within a narrow market or product segment is
called a ________ strategy.
D) focus
73)
________ technologies are technologies that enable the incremental improvement
of products and services.
A)
Sustaining
74)
Innovative entrepreneurs and their business firms that destroy existing
business models are referred to as ________.
C)
disruptors
-----
1)
________ and ________ are typically the most easily identifiable aspects of a
company's business model.
A)
Market strategy; market opportunity
B) Value
proposition; revenue model
C)
Competitive advantage; competitive environment
D)
Revenue model; market opportunity
Answer:
B
2) Which
of the following uses a subscription revenue model for books?
A)
Spotify
B)
Amazon Kindle Unlimited
C)
Rhapsody
D)
Pandora
Answer:
B
3) Which
element of the business model addresses what a firm provides that other firms
do not and cannot?
A)
competitive environment
B)
competitive advantage
C)
market strategy
D) value
proposition
Answer:
D
4) Which
element of the business model refers to the presence of substitute products in
the market?
A) value
proposition
B)
competitive environment
C)
competitive advantage
D)
market opportunity
Answer:
B
5) Which
of the following are Amazon's primary value propositions?
A)
personalization and customization
B)
selection and convenience
C)
reduction of price discovery cost
D)
management of product delivery
Answer:
B
6) A
firm's ________ describes how a firm will produce a superior return on invested
capital.
A) value
proposition
B)
revenue model
C)
market strategy
D)
competitive advantage
Answer:
B
7) Which
of the following does not use a subscription revenue model?
A) Apple
Music
B)
eHarmony
C)
Ancestry
D)
Twitter
Answer:
D
8)
Stickiness is an important attribute for which of the following revenue models?
A)
advertising revenue model
B)
subscription revenue model
C)
transaction fee revenue model
D)
affiliate revenue model
Answer:
A
9) Which
of the following companies uses a transaction fee revenue model?
A) Yahoo
B)
E*Trade
C)
Twitter
D)
Birchbox
Answer:
B
10)
Which of the following is an example of the affiliate revenue model?
A)
Scribd
B) eBay
C) L.L.
Bean
D)
MyPoints
Answer:
D
11)
Which of the following involves a company giving away a certain level of
product or service without charge, but then charging a fee for premium levels
of the product or service?
A)
advertising revenue model
B)
subscription revenue model
C)
freemium strategy
D)
premium strategy
Answer:
C
12)
Which of the following factors is not a significant influence on a company's
competitive environment?
A) how
many competitors are active
B) what
the market share of each competitor is
C) the
availability of supportive organizational structures
D) how
competitors price their products
Answer:
C
13) All
of the following can be considered a direct competitor of Priceline except:
A)
Travelocity.
B)
Expedia.
C)
Orbitz.
D) ESPN.
Answer:
D
14) The existence
of many competitors in any one market segment may indicate:
A) an
untapped market niche.
B) the
market is saturated.
C) no
one firm has differentiated itself within that market.
D) a
market that has already been tried without success.
Answer:
B
15) All
of the following can be considered a direct or indirect competitor of Amazon
except:
A) eBay.
B)
Apple's iTunes Store.
C)
Walmart.
D)
Priceline.
Answer:
D
16) A
perfect market is one in which:
A) there
are no competitive advantages or asymmetries because all firms have equal
access to all the factors to production.
B) one
firm develops an advantage based on a factor of production that other firms
cannot purchase.
C) one
participant in the market has more resources than the others.
D)
competition is at a minimum, as each niche market within an industry is served
by the company with the greatest competitive advantage.
Answer:
A
17)
Organizations that typically provide an array of services to startup companies
along with a small amount of funding are referred to as:
A) angel
investors.
B)
crowdfunders.
C)
incubators.
D)
venture capital investors.
Answer:
C
18) A
________ specifically details how you plan to find customers and to sell your
product.
A) sales
analysis
B)
business plan
C) competitive
strategy
D)
market strategy
Answer:
D
19)
Which of the following is not a community provider?
A)
LinkedIn
B)
Facebook
C) Blue
Nile
D)
Pinterest
Answer:
C
20)
Which of the following is not a variation of the e-tailer business model?
A)
bricks-and-clicks
B)
virtual merchant
C)
market creator
D)
manufacturer-direct
Answer:
C
21)
Which of the following is an example of a company using the content provider
model?
A)
Priceline
B)
Netflix
C) Dell
D) eBay
Answer:
B
22)
Which of the following is not an example of the bricks-and-clicks e-tailing
business model?
A)
Walmart
B)
Target
C)
Bluefly
D)
Staples
Answer:
C
23) In 2018,
the overall retail market in the United States was estimated to be about:
A) $53
trillion.
B) $5.3
trillion.
C) $530
billion.
D) $53
billion.
Answer:
B
24) In
general, the key to becoming a successful content provider is to:
A) own
the content being provided.
B) own
the technology by which content is created, presented, and distributed.
C)
provide online content for free.
D)
provide other services as well as online content.
Answer:
A
25)
Which of the following uses a subscription-based sales revenue model?
A) Yahoo
B) eBay
C)
MyPoints
D)
Dollar Shave Club
Answer:
D
26) All
of the following may lead to a competitive advantage except:
A) less
expensive suppliers.
B)
better employees.
C) fewer
products.
D)
superior products.
Answer:
C
27)
Which of the following is an unfair competitive advantage?
A) brand
name
B)
access to global markets
C) lower
product prices
D)
superior technology
Answer:
A
28) Which
of the following gives a business model the most credibility with outside
investors?
A) the
firm's management team
B) the
firm's value proposition
C) the
firm's market opportunity
D) the
firm's market strategy
Answer:
A
29)
Which of the following statements about Foursquare is not true?
A)
Foursquare combines a social network business model with location-based
technology.
B)
Foursquare initially struggled to find profitability.
C) The
growth in Foursquare's revenue since 2015 has been driven primarily by
significant increases in the numbers of users of its Swarm app.
D)
Foursquare's users are typically amenable to having their location tracked and
their data collected, since tracking users' location is the express purpose of
the app.
Answer:
C
30)
Which type of investor typically becomes interested in a startup company after
it has begun generating revenue?
A)
incubators
B) angel
investors
C)
crowdfunders
D)
venture capital investors
Answer:
D
31)
Which of the following is another name for a revenue model?
A)
business model
B)
business strategy
C)
financial model
D)
financial statements
Answer:
C
32) All
of the following can be considered examples of the market creator business
model except:
A) eBay.
B)
Priceline.
C) Uber.
D)
Twitter.
Answer:
D
33) ________
is defined by company using its competitive advantage to gain in surrounding
markets.
A)
Market strategy
B)
Differentiation
C)
Leverage
D) Focus
Answer:
C
34) A
wealthy individual who invests personal funds in a startup in exchange for an
equity share in the business is referred to as a(n):
A)
incubator.
B) angel
investor.
C)
venture capital investor.
D)
crowdfunder
Answer:
B
35)
Which of the following is not a key element of an elevator pitch?
A) exit
strategy
B)
growth metrics
C) legal
structure
D)
market opportunity
Answer:
C
36) A
value proposition defines how a company's product or service will generate
revenue for the firm.
FALSE
37) Real
markets are imperfect.
TRUE
38)
Information asymmetries enable some firms to have an edge over others.
TRUE
39) Slow
followers are sometimes more successful than first movers.
TRUE
40) In
the subscription revenue model, a company primarily generates income from the
display of ads.
FALSE
41) The Jumpstart
Our Business Startups (JOBS) Act, and issuance of enabling regulations by the
Securities and Exchange Commission, allows a start-up company to use
crowdfunding to solicit investors to invest in small and early-stage startups.
TRUE
46)
First movers often fail because:
A) their
competitive advantage is unfair.
B) they
lack complementary resources needed to sustain their advantages.
C) they
are operating in a perfect market.
D) they
fail to leverage their competitive assets.
Answer:
B
47) All
of the following use an advertising revenue model except:
A)
Facebook.
B)
Yahoo.
C)
Google.
D)
Walmart.
Answer:
D
48)
Which of the following is not considered a portal?
A) Yahoo
B) MSN
C)
Amazon
D) AOL
Answer:
C
49)
Portals primarily generate revenue in all of the following ways except:
A)
charging advertisers for ad placement.
B)
collecting transaction fees.
C) sales
of goods.
D)
charging subscription fees.
Answer:
C
50) The
basic value proposition of community providers is:
A) they
offer a fast, convenient one-stop site where users can focus on their most
important concerns and interests.
B) they
offer consumers valuable, convenient, time-saving, and low-cost alternatives to
traditional service providers.
C) they create
a digital electronic environment for buyers and sellers to meet, agree on a
price, and transact.
D) they
increase customers' productivity by helping them get things done faster and
more cheaply.
Answer:
A
51) eBay
uses all of the following business models except:
A) B2C
market creator.
B) C2C
market creator.
C) content provider.
D) e-commerce infrastructure provider.
Answer:
C
52) All
of the following are business models employed in the online music industry
except:
A)
subscription.
B)
peer-to-peer streaming.
C)
download-and-own.
D) cloud
streaming.
Answer:
B
53) The
financial services, travel services, and job placement services industries
typically use the ________ business model.
A)
community provider
B)
transaction broker
C)
market creator
D)
e-tailer
Answer:
B
54) In
the ________ business model, a web-based business builds a digital environment
in which buyers and sellers can meet, display products, search for products,
and establish prices.
A)
market creator
B)
community provider
C)
e-tailer
D)
portal
Answer:
A
55)
On-demand service companies are characterized by the free sharing of resources
between the company and consumers
TRUE
57) All of
the following are examples of business-to-business (B2B) business models
except:
A) e-distributors.
B) e-procurement.
C) exchanges.
D)
portals.
Answer:
D
58) What
is the primary revenue model for an e-distributor?
A) sales
B)
transaction fee
C)
advertising
D)
subscription
Answer:
A
59)
Amazon Business is an example of which of the following business models?
A) B2B
service provider
B)
exchange
C)
e-distributor
D)
industry consortia
Answer:
C
60)
Ariba is an example of a(n)________.
A)
e-distributor
B)
portal
C)
e-procurement firm
D)
Industry consortium
Answer:
C
61)
Which of the following may offer its customers value chain management software?
A)
e-distributors
B)
e-procurement companies
C)
exchanges
D)
community providers
Answer:
B
62) Over
the past decade, the number of exchanges has:
A)
greatly increased.
B)
diminished sharply.
C)
stayed about the same.
D)
increased slowly but steadily.
Answer:
B
63) The
Seam is an example of a(n):
A)
private industrial network.
B)
exchange.
C)
industry consortium.
D)
e-distributor.
Answer:
C
64) A
________ marketplace supplies products and services of interest to particular
industries.
A)
perfect
B)
differentiated
C)
horizontal
D)
vertical
Answer:
D
65) SaaS
and PaaS providers can typically provide services at lower costs through scale
economies.
TRUE
67) A
________ refers to a competitive strategy in which firms attempt to achieve
lower business process costs.
A)
strategy of cost competition
B) scope
strategy
C)
customer intimacy strategy
D)
focus/market niche strategy
Answer:
A
68)
Which of the following features of e-commerce technology changes industry
structure by lowering barriers to entry but greatly expands the market at the
same time?
A)
global reach
B)
richness
C)
interactivity
D) personalization
Answer:
A
69)
Which of the following is not a primary activity in a firm value chain?
A)
outbound logistics
B)
finance/accounting
C)
operations
D)
after-sales service
Answer:
B
70) A
________ is a networked business ecosystem that coordinates a firm's suppliers,
distributors, and delivery firms with its own production needs using an
Internet-based supply chain management system.
A) value
chain
B) value
system
C) value
web
D)
business strategy
Answer:
C
71) If
you wished to leverage the ubiquitous nature of the Web to differentiate your
product, you would:
A)
enable individual customization of the product by consumers.
B)
implement a strategy of commoditization.
C) adopt
a strategy of cost competition.
D)
develop a scope strategy to compete within a narrower market segment.
Answer:
A
72) A
strategy designed to compete within a narrow market or product segment is
called a ________ strategy.
A) scope
B)
differentiation
C)
commoditization
D) focus
Answer:
D
73) ________
technologies are technologies that enable the incremental improvement of
products and services.
A)
Sustaining
B)
Differentiating
C)
Disruptive
D)
Commodity
Answer:
A
74)
Innovative entrepreneurs and their business firms that destroy existing
business models are referred to as:
A)
crowdfunders.
B)
venture capitalists.
C)
disruptors.
D) angel
investors.
Answer:
C
75) The
term unfit fitness refers to a situation in which employees of a firm have the
wrong skills for the current environment.
TRUE
76)
Scale economies are efficiencies that result from increasing the size of the
business.
TRUE
77) A
company's strong linkages with its customers increase switching costs.
TRUE
78) The
Internet's universal standard have changed industry structure by increasing
barriers to entry and decreasing competition within an industry.
FALSE
79)
Interactivity that enables product customization alters industry structure by
decreasing the threat of substitutes.
TRUE
80)
E-commerce has increased price competition in many markets.
TRUE
81)
Social technologies change industry structure by weakening powerful sales
channels and shifts bargaining power to consumers.
FALSE
________
and ________ are typically the most easily identifiable aspects of a company's
business model.
A)
Market strategy; market opportunity
B) Value
proposition; revenue model
C) Value
proposition; competitive environment
D)
Revenue model; market strategy
B
All of the
following are using a subscription revenue model for music except:
A)
Spotify.
B)
Scribd.
C)
Rhapsody.
D)
Pandora.
B
Which
element of the business model addresses what a firm provides that other firms
do not and cannot?
A)
revenue model
B)
competitive advantage
C)
market strategy
D) value
proposition
D
Which
element of the business model refers to the presence of substitute products in
the market?
A) value
proposition
B)
competitive environment
C)
competitive advantage
D)
market strategy
B
Which of
the following are Amazon's primary value propositions?
A)
personalization and customization
B)
selection and convenience
C)
reduction of price discovery cost
D)
management of product delivery
B
A firm's
________ describes how a firm will produce a superior return on invested
capital.
A) value
proposition
B)
revenue model
C)
market strategy
D)
competitive advantage
B
Which of
the following is an example of the subscription revenue model?
A)
eHarmony
B) eBay
C)
E*Trade
D)
Twitter
A
Stickiness
is an important attribute for which of the following revenue models?
A)
advertising revenue model
B)
subscription revenue model
C)
transaction fee revenue model
D) sales
revenue model
A
Which of
the following companies uses a transaction fee revenue model?
A) Yahoo
B)
E*Trade
C)
Twitter
D) Sears
B
Which of
the following is an example of the affiliate revenue model?
A)
Scribd
B) eBay
C) L.L.
Bean
D)
MyPoints
D
Which of
the following involves a company giving away a certain level of product or
services without charge, but then charging a fee for premium levels of the
product or service?
A)
advertising revenue model
B)
subscription revenue model
C)
freemium strategy
D)
transaction fee revenue model
C
Which of
the following factors is not a significant influence on a company's competitive
environment?
A) how
many competitors are active
B) what
the market share of each competitor is
C) the
availability of supportive organizational structures
D) how
competitors price their products
C
Which of
the following would be considered an indirect competitor of Priceline?
A)
Travelocity
B)
Expedia
C)
Orbitz
D)
TripAdvisor
B
The
existence of a large number of competitors in any one market segment may
indicate:
A) an
untapped market niche.
B) the
market is saturated.
C) no
one firm has differentiated itself within that market.
D) a
market that has already been tried without success.
B
All of
the following can be considered a direct or indirect competitor of Amazon
except:
A) eBay.
B)
Apple's iTunes Store.
C)
Walmart.
D)
Starbucks.
D
A
perfect market is one in which:
A) there
are no competitive advantages or asymmetries because all firms have equal
access to all the factors to production.
B) one firm
develops an advantage based on a factor of production that other firms cannot
purchase.
C) one
participant in the market has more resources than the others.
D)
competition is at a minimum, as each niche market within an industry is served
by the company with the greatest competitive advantage.
A
Organizations
that typically provide an array of services to start-up companies along with a
small amount of funding are referred to as:
A) angel
investors.
B)
crowdfunders.
C)
incubators.
D)
venture capital investors.
C
A
________ specifically details how you plan to find customers and to sell your
product.
A) sales
analysis
B)
business plan
C)
competitive strategy
D)
market strategy
D
Which of
the following is not a community provider?
A)
LinkedIn
B)
Facebook
C)
Priceline
D)
Pinterest
C
Which of
the following is not a variation of the e-tailer business model?
A)
bricks-and-clicks
B)
virtual merchant
C)
market creator
D)
manufacturer-direct
C
An example
of a company using the content provider model is:
A)
Priceline.
B)
Rhapsody.
C) Dell.
D) eBay.
B
Which of
the following is not an example of the bricks-and-clicks e-tailing business
model?
A)
Walmart
B) Sears
C)
Bluefly
D)
Staples
C
The
overall retail market in the United States in 2015 was estimated at about:
A) $48
trillion.
B) $4.8
trillion.
C) $480
billion.
D) $48
billion.
B
In
general, the key to becoming a successful content provider is to:
A) own
the content being provided.
B) own
the technology by which content is created, presented, and distributed.
C)
provide online content for free.
D)
provide other services as well as online content.
A
Which of
the following was not able to successfully implement a freemium business model?
A)
Pandora
B)
Dropbox
C)
LinkedIn
D) Ning
D
All of
the following may lead to a competitive advantage except:
A) less
expensive suppliers.
B)
better employees.
C) fewer
products.
D)
superior products.
C
Which of
the following is an unfair competitive advantage?
A) brand
name
B)
access to global markets
C) lower
product prices
D)
superior technology
A
Which of
the following gives a business model the most credibility with outside
investors?
A) the
firm's management team
B) the
firm's value proposition
C) the
firm's market opportunity
D) the
firm's market strategy
A
Which of
the following statements about Foursquare is not true?
A)
Foursquare combines a social network business model with location-based
technology.
B)
Foursquare began operating without a revenue model.
C)
Foursquare's business model faces significant intellectual property concerns.
D)
Foursquare has been able to command a high valuation from venture capital
investors despite unimpressive revenue and profits.
C
Which
type of investor typically becomes interested in a start-up company after it
has begun generating revenue?
A)
incubators
B) angel
investors
C)
crowdfunders
D)
venture capital investors
D
Which of
the following is another name for a revenue model?
A)
business model
B)
business strategy
C)
financial model
D)
financial statements
C
All of
the following use a social network marketing strategy except:
A)
Twitter.
B)
YouTube.
C)
Pinterest.
D)
Amazon.
D
The use
by a company of its competitive advantage to achieve more advantage in
surrounding markets is known as ________.
A)
market strategy
B)
differentiation
C)
leverage
D) focus
C
A
wealthy individual who invests personal funds in a start-up in exchange for an
equity stock in the business is referred to as a(n) ________.
A)
incubator
B) angel
investor
C)
venture capital investor
D)
crowdfunder
B
Which of
the following is not a key element of an elevator pitch?
A) exit
strategy
B) growth
metrics
C) legal
structure
D)
market opportunity
C
The
business model of e-tailers is quite similar to that of:
A)
e-distributors.
B)
transaction brokers.
C)
exchanges.
D)
service providers.
A
All of
the following use an advertising revenue model except:
A)
Twitter.
B)
Yahoo.
C)
Google.
D)
Amazon.
D
Which of
the following is not considered a portal?
A) Yahoo
B) MSN
C)
Amazon
D) AOL
C
Portals
primarily generate revenue in all of the following ways except:
A)
charging advertisers for ad placement.
B)
collecting transaction fees.
C) sales
of goods.
D)
charging subscription fees.
C
The
basic value proposition of community providers is:
A) they offer
a fast, convenient one-stop site where users can focus on their most important
concerns and interests.
B) they
offer consumers valuable, convenient, time-saving, and low cost alternatives to
traditional service providers.
C) they
create a digital electronic environment for buyers and sellers to meet, agree
on a price, and transact.
D) they
increase customers' productivity by helping them get things done faster and
more cheaply.
A
eBay
uses all of the following business models except:
A) B2C
market creator.
B) C2C
market creator.
C) content provider.
D) e-commerce infrastructure provider.
C
All of
the following are business models employed in the online music industry except:
A)
subscription.
B)
peer-to-peer streaming.
C)
download-and-own.
D) cloud
streaming.
B
The
financial services, travel services, and job placement services industries
typically use the ________ business model.
A)
community provider
B)
transaction broker
C)
market creator
D)
e-tailer
B
In the
________ business model, a Web-based business builds a digital environment in
which buyers and sellers can meet, display products, search for products, and
establish prices.
A)
market creator
B)
community provider
C)
e-tailer
D)
portal
A
All of the
following are examples of business-to-business (B2B) business models except:
A) e-distributors.
B) e-procurement.
C) exchanges.
D)
e-tailers.
D
What is
the primary revenue model for an e-distributor?
A) sales
B)
transaction fee
C)
advertising
D)
subscription
A
________
create and sell access to digital markets.
A)
E-distributors
B)
Portals
C)
E-procurement firms
D)
Market creators
C
Which of
the following may offer its customers value chain management software?
A)
e-distributors
B)
e-procurement companies
C)
exchanges
D)
community providers
B
Over the
past decade, the number of exchanges has:
A)
greatly increased.
B)
diminished sharply.
C)
stayed about the same.
D)
increased slowly but steadily.
B
SupplyOn
is an example of a(n):
A) private
industrial network.
B)
exchange.
C)
industry consortium.
D)
e-distributor.
C
A
________ marketplace supplies products and services of interest to particular
industries.
A)
perfect
B)
differentiated
C)
horizontal
D)
vertical
D
Which
business strategy involves implementing a new, more efficient set of business
processes that other firms cannot yet obtain?
A)
strategy of cost competition
B) scope
strategy
C)
customer intimacy strategy
D)
focus/market niche strategy
A
Which of
the following features of e-commerce technology changes industry structure by
lowering barriers to entry but greatly expands the market at the same time?
A)
global reach
B)
richness
C)
interactivity
D)
personalization
A
Which of
the following is not a primary activity in a firm value chain?
A)
outbound logistics
B)
finance/accounting
C)
operations
D)
after-sales service
B
A
________ is a networked business ecosystem that coordinates a firm's suppliers,
distributors, and delivery firms with its own production needs using an
Internet-based supply chain management system.
A) value
chain
B) value
system
C) value
web
D)
business strategy
C
If you
wished to leverage the ubiquitous nature of the Web to differentiate your
product, you would:
A)
enable individual customization of the product by consumers.
B)
implement a strategy of commoditization.
C) adopt
a strategy of cost competition.
D)
develop a scope strategy to compete within a narrower market segment.
A
A
strategy designed to compete within a narrow market or product segment is
called a ________ strategy.
A) scope
B)
differentiation
C) cost
D) focus
D
Innovative
entrepreneurs and their business firms that destroy existing business models
are referred to as ________.
A)
crowdfunders
B)
venture capitalists
C)
disruptors
D) angel
investors
C
Which of
the following best defines e-commerce?
A)
Digitally enabled commercial transactions between and among organizations and
individuals
B) The
use of digital technologies in a firm's daily activities
C) The
digital enablement of transactions and processes within an organization
D) Any electronically
based organizational activity that supports a firm's market exchanges
Digitally
enabled commercial transactions between and among organizations and individuals
Which of
the following is an example of e-business?
A)
Amazon's inventory control system
B) The
Amazon.com website
C) An
Amazon mobile app
D)
Amazon's Pinterest page
Amazon's
inventory control system
Which of
the following is not true about the use of apps?
A) Users
spend nearly 90% of their smartphone app minutes using their top five apps
B) Users
still spend more time using mobile browsers than they do using mobile apps
C) Apps
are easier to control and monetize than websites
D) Users
typically use about 20 different apps per month
Users
still spend more time using mobile browsers than they do using mobile apps
Which of
the following is not a major technology trend in e-commerce in 2020-2021?
A) Cloud
computing enables content stored on Internet-based servers to be accessed by
consumer devices such as smartphones
B) Firms
are tuning to business analytics to make sense out of big data
C) Smart
speakers provide an additional platform for e-commerce
D)
Growth of the Internet of Things slow down
Growth
of the Internet of Things slow down
Which of
the following has not been the subject of concern about its increasing market
dominance in 2020-2021?
A)
Amazon
B)
Google
C)
Netflix
D)
Facebook
Netflix
Which of
the following statements about the Web is not true?
A) The
Web is the technology upon which the Internet is based
B) The Web
was the original "killer app"
C) The
Web provides access to pages written in HTML
D) The
Web is both a communications infrastructure and information storage system
The Web
is the technology upon which the Internet is based
Which of
the following was the original "killer app" that made the Internet
commercially interesting and extraordinarily popular?
A)
E-commerce
B) The
Web
C)
Social networks
D)
Mobile apps
The Web
The term
e-commerce refers to the digital enabling of business processes both inside and
outside the firm
FALSE
E-commerce
and e-business systems blur together at the business firm boundary, where
internal business systems link up with suppliers or customers
TRUE
"Exchange
of value" is the key factor in determining if a transaction is
"commerce"?
TRUE
Which of
the following is not a unique feature of e-commerce technology?
A)
Interactivity
B)
Social technology
C)
Information asymmetry
D)
Richness
Information
asymmetry
Which of
the following features of e-commerce technology is related to the concept of
network externalities?
A)
Richness
B)
Interactivity
C)
Universal standards
D)
Information density
Universal
standards
Reach
represents the total number users or customers an e-commerce business can
obtain
TRUE
Ubiquity
increases the cognitive energy required to transact in a marketplace
FALSE
Universal
standards make price discovery more costly, slower, and less accurate
FALSE
The
early years of e-commerce were driven by all of the following factors except:
A) An
emphasis on exploiting traditional distribution channels
B) A
huge infusion of venture capital funds
C) An
emphasis on quickly achieving very high market visibility
D)
Visions of profiting form new technology
An
emphasis on exploiting traditional distribution channels
Which of
the following is a characteristic of the Reinvention phase of e-commerce?
A)
Massive proliferation of dot-com start-ups
B)
Widespread adoption of broadband networks
C) Rapid
growth of search engine advertising
D)
Expansion of e-commerce to include services as well as goods
Expansion
of e-commerce to include services as well as goods
Which of
the following is an example of an e-commerce first mover that failed?
A) Etsy
B) eToys
C) eBay
D)
eTrade
eToys
The
Reinvention period of e-commerce is as much a sociological phenomenon as it is
a technological or business phenomenon
TRUE
___ and
___ are typically the most easily identifiable aspects of a company's business
model
A)
Market strategy; market opportunity
B) Value
proposition; revenue model
C)
Competitive advantage; competitive environment
D)
Revenue model; market opportunity
Value
proposition; revenue model
Which of
the following uses a subscription revenue model for books?
A)
Spotify
B)
Amazon Kindle Unlimited
C)
eHarmony
D) Market
opportunity
Amazon
Kindle Unlimited
Which
element of the business model refers to the presence of substitute products in
the market?
A) Value
proposition
B)
Competitive environment
C)
Competitive advantage
D)
Market opportunity
Competitive
advantage
A firm's
___ describes how a firm will produce a superior return on invested capital
A) Value
proposition
B)
Revenue model
C)
Market strategy
D)
Competitive advantage
Revenue
model
Which of
the following does not use a subscription revenue model?
A) Apple
Music
B)
eHarmony
C)
Ancestry
D)
Twitter
Twitter
Which of
the following factors is not significant influence on a company's competitive
environment?
A) How
many competitors are active
B) What
market share of each competitor is
C) The availability
of supportive organizational structures
D) How
competitors' price their products
The
availability of supportive organizational structures
All of
the following can be considered a direct competitor of Priceline except:
A)
Travelocity
B)
Expedia
C)
Orbitz
D) ESPN
ESPN
A
perfect market is one in which:
A) There
are no competitive advantages or asymmetries because all firms have equal
access to all factors of production
B) One
firm develops an advantage based on a factor of production that other firms
cannot purchase
C) One
participant in the market has resources than others
D)
Competition is at a minimum, as each niche market within an industry is served
by the company advantage
There
are no competitive advantages or asymmetries because all firms have equal
access to all factors of production
Which of
the following gives a business model the most credibility with outside
investors?
A) The
firm's management team
B) The
firm's value proposition
C) The
firm's opportunity
D)
Regulation crowdfunding
The
firm's management team
Which of
the following types of crowdfunding involves people making contributions to
others with no expectation of any return?
A)
Donor-based crowdfunding
B)
Rewards-based crowdfunding
C)
Equity crowdfunding
D)
Regulation crowdfunding
Donor-based
crowdfunding
In
general, the key to becoming a successful content provider is to:
A) Own
the content being provided
B) Own the
technology by which content is created, presented, and distributed
C)
Provide online content for free
D)
Provide other services as well as online content
Own the
content being provided
Portals
primarily generate revenue in all of the following way except:
A)
Charging advertisers for ad placement
B)
Collecting transaction fees
C) Sales
of goods
D)
Charging subscription fees
Sales of
goods
In the
___ business model, a web-based business builds a digital environment in which
buyers and sellers can meet, display products, search for products, and
establish prices
A)
Market creator
B)
Community provider
C)
E-tailer
D)
Portal
Market
creator
Grainier
is an example of which of the following business models?
A)
E-distributors
B)
E-procurement companies
C)
Exchanges
D)
Community providers
E-distributor
Which of
the following may offer its customers value chain management software?
A)
E-distributors
B)
E-procurement companies
C)
Exchanges
D)
Community providers
E-procurement
companies
If you
wished to leverage the ubiquitous nature of the Web to differentiate your
product, you would:
A)
Enable individual customization of the product by consumers
B)
Implement a strategy of commoditization
C) Adopt
a strategy
D)
Develop a scope strategy
Enable individual
customization of the product by consumers
GoFundMe
is a prominent example of rewards-based crowdfunding site
FALSE
On-demand
service companies are characterized by the free sharing of resources between
the company and consumers
TRUE
Scale
economies are efficiencies that result from increasing the size of the business
TRUE
The
internet's universal standards have changed industry structure by increasing
barriers to entry and decreasing competition within an industry
FALSE
Which of
the following e-commerce technology dimensions creates greater opportunities
for cyber bullying?
A)
Information density
B)
Interactivity
C)
Social technology
D)
Ubiquity
Social
technology
Which
ethical principle emphasizes putting oneself into the place of others and
thinking of oneself as the object of the decision?
A) The
Golden Rule
B)
Universalism
C)
Collective Utilitarian Principle
D) The
Social Contract Theory
The
Golden Rule
Which
ethical principle asks you to assume that virtually all tangible and intangible
objects are owned by someone else unless there is a specific declaration
otherwise?
A) The
Golden Rule
B)
Slippery Slope
C) The
Social Contract Rule
D) No
Free Lunch
No Free
Lunch
Which ethical
principle states that if an action cannot be taken repeatedly, then it's not
right to take at all?
A)
Universalism
B)
Slippery Slope
C) The
Social Contract Rule
D) The
Golden Rule
Slippery
Slope
Which
ethical principle tells you that it is wise to assume perfect information
markets?
A) The
Golden Rule
B) The
New York Times Test
C) The
Collective Utilitarian Principle
D) The
Social Contract Theory
The New
York Times Test
Which of
the following basic ethical concepts plays an important role in defining
privacy?
A)
Responsibility
B)
Accountability
C)
Liability
D) Due
Process
Due
Process
The
online retail sector of the retail industry is most similar to the ___ sector
A)
Specialty stores
B)
General merchandise
C) Mail
order/telephone order (MOTO)
D)
Consumer durables
Mail
order/telephone order (MOTO)
Which of
the following is not one of the seven major segments of the retail industry?
A)
Electronic and computer
B)
Specialty stores
C)
Gasoline and fuel
D) Food
beverage
Electronics
and computers
All of
the following were parts of the vision during the early days of e-commerce
except the belief that:
A) New,
"first-mover" middlemen, with expertise in e-commerce, would force
traditional intermediaries out of business
B)
Online consumers were rational and cost-driven
C) Entry
costs to the online retail market would be much less than those needed to
establish a physical storefront
D) The
cost of acquiring customers would be much lower
New,
"first-mover" middlemen, with expertise in e-commerce, would force
traditional intermediaries out of business
All of
the following have introduced social commerce functionality, such as buy
buttons, shoppable ads, and marketplaces except:
A)
Facebook
B)
Pinterest
C)
Instagram
D)
Tumblr
Tumblr
All of
the following are advantages of online retail except:
A) Lower
supply chain costs
B) Lower
cost of distribution
C)
Ability to change prices
D)
Faster delivery of goods
Faster
delivery of goods
Which of
the following is not one of the methods used by traditional retailers to
develop omni-channel integration?
A)
Online catalog
B)
Online order, in-store pickup
C)
Online supply-push
D)
Online promotions for offline purchases
Online
supply-push
Apart
from Amazon, the top online retail firms in terms of online sales are all
primarily ___ firms
A)
Manufacturer-direct
B)
Omni-channel
C)
Web-only
D)
Catalog merchant
Omni-channel
Consumers
are primarily price-driven when shopping on the Internet
FALSE
Online retailing
provides an example of the powerful role that intermediaries continue to play
in retail trade
TRUE
Which of
the following statements about millennials is not true?
A)
Millennials are more likely to have read a book in the past 12 months than
older adults
B)
Millennials overwhelmingly prefer e-books to printed books
C)
Almost two-thirds of millennials view digital videos daily
D)
Millennials are much more to use streaming services such as Netflix, Hulu, and
Amazon than older adults
Millennials
overwhelmingly prefer e-books to printed books
All of
the following are examples of technology convergence except:
A) The
iPad
B)
Amazon Books Publishing
C) Apple
TV
D)
Smartphones
Amazon
Books Publishing
Which of
the following occurs first int he processes of content convergence related to
books?
A) Media
integration
B) Media
migration
C) Media
transformation
D) Media
maturity
Media
migration
The
merger of media enterprises into powerful, synergistic combinations that can
cross-market content on many different platforms is referred to as:
A)
Aggregation
B)
Repackaging
C) Media
transformation
D)
Industry convergence
Industry
convergence
DRM
refers to a combination of ___ for protecting digital content
A)
Hardware and software methods
B) Technical
and legal means
C) User
and publisher agreements
D) Local
and remote policies
Technical
and legal means
The
COVID-19 pandemic has resulted in an increase in advertising revenue for online
content providers
FALSE
What is
a node?
A) A
type of cryptocurrency
B)
Blockchain
C) A
computer on a Blockchain network
D) An
exchange
A
computer on a Blockchain network
Where do
you store your cryptocurrency?
A) Bank
account
B)
Floppy Disk
C)
Wallet
D) In
your pocket
Wallet
Where is
the LEAST SAFE place to keep your cryptocurrency?
A) In
your pocket
B) On an
exchange
C) On a
hot wallet
D) At
your work desk
On an
exchange
What is
a blockchain?
A) A
distributed ledger on a peer to peer network
B) A
type on cryptocurrency
C) An
exchange
D) A centralized
ledger
A
distributed ledger on a peer to peer network
What is
the purpose of a nonce?
A)
Follows nouns
B) A
hash function
C)
Prevents double spending
D) Sends
information to the blockchain network
Sends
information to the blockchain network
What
incentivizes the miners to give correct validation of transactions?
A) A
nonce
B) A
famous block that hard coded a hash of the Book of Genesis onto the blockchain
C) The
first block after each block halving
D) The
2nd transaction in a Blockchain
A nonce
What is
a genesis block?
A) The
first block of a Blockchain
B) A
famous block that hard coded a hash of the Book of Genesis onto the blockchain
C) The
first block after each block halving
D) The
2nd transaction of a Blockchain
The
first block of a Blockchain
What is
an UTXO?
A)
United Transaction Office
B)
United Texan Xerox Organization
C)
Unspent Transaction Output
D) Union
of Texas Operations
Unspent
Transaction Output
What is
a hash function?
A) A
fork
B) UTXO
C) Takes
an input of any length and returns a fixed-length string of numbers and letters
D) Gas
Takes an
input of any length and returns a fixed-length string of numbers and letters
Blockchain
is the same as Bitcoin
FALSE
Once
records are submitted on a blockchain, can they be altered?
A) Yes-
the parties can go back in and alter them at any time
B) Yes-
but only within a certain time frame
C) No-
they cannot be altered
No- they
cannot be altered
1)
________ and ________ are typically the most easily identifiable aspects of a
company's business model.
A)
Market strategy; market opportunity
B) Value
proposition; revenue model
C)
Competitive advantage; competitive environment
D)
Revenue model; market opportunity
Answer:
B
2) Which
of the following uses a subscription revenue model for books?
A)
Spotify
B)
Amazon Kindle Unlimited
C)
Rhapsody
D)
Pandora
Answer:
B
3) Which
element of the business model addresses what a firm provides that other firms
do not and cannot?
A)
competitive environment
B)
competitive advantage
C)
market strategy
D) value
proposition
Answer:
D
4) Which
element of the business model refers to the presence of substitute products in
the market?
A) value
proposition
B)
competitive environment
C)
competitive advantage
D)
market opportunity
Answer:
B
5) Which
of the following are Amazon's primary value propositions?
A)
personalization and customization
B)
selection and convenience
C)
reduction of price discovery cost
D)
management of product delivery
Answer:
B
6) A
firm's ________ describes how a firm will produce a superior return on invested
capital.
A) value
proposition
B)
revenue model
C)
market strategy
D)
competitive advantage
Answer:
B
7) Which
of the following does not use a subscription revenue model?
A) Apple
Music
B)
eHarmony
C)
Ancestry
D)
Twitter
Answer:
D
8)
Stickiness is an important attribute for which of the following revenue models?
A)
advertising revenue model
B)
subscription revenue model
C)
transaction fee revenue model
D)
affiliate revenue model
Answer:
A
9) Which
of the following companies uses a transaction fee revenue model?
A) Yahoo
B)
E*Trade
C)
Twitter
D)
Birchbox
Answer:
B
10)
Which of the following is an example of the affiliate revenue model?
A)
Scribd
B) eBay
C) L.L.
Bean
D)
MyPoints
Answer:
D
11)
Which of the following involves a company giving away a certain level of
product or service without charge, but then charging a fee for premium levels
of the product or service?
A)
advertising revenue model
B)
subscription revenue model
C)
freemium strategy
D)
premium strategy
Answer:
C
12)
Which of the following factors is not a significant influence on a company's
competitive environment?
A) how
many competitors are active
B) what
the market share of each competitor is
C) the
availability of supportive organizational structures
D) how
competitors price their products
Answer:
C
13) All
of the following can be considered a direct competitor of Priceline except:
A)
Travelocity.
B)
Expedia.
C)
Orbitz.
D) ESPN.
Answer:
D
14) The existence
of many competitors in any one market segment may indicate:
A) an
untapped market niche.
B) the
market is saturated.
C) no
one firm has differentiated itself within that market.
D) a
market that has already been tried without success.
Answer:
B
15) All
of the following can be considered a direct or indirect competitor of Amazon
except:
A) eBay.
B)
Apple's iTunes Store.
C)
Walmart.
D)
Priceline.
Answer:
D
16) A
perfect market is one in which:
A) there
are no competitive advantages or asymmetries because all firms have equal
access to all the factors to production.
B) one
firm develops an advantage based on a factor of production that other firms
cannot purchase.
C) one
participant in the market has more resources than the others.
D)
competition is at a minimum, as each niche market within an industry is served
by the company with the greatest competitive advantage.
Answer:
A
17)
Organizations that typically provide an array of services to startup companies
along with a small amount of funding are referred to as:
A) angel
investors.
B)
crowdfunders.
C)
incubators.
D)
venture capital investors.
Answer:
C
18) A ________
specifically details how you plan to find customers and to sell your product.
A) sales
analysis
B)
business plan
C)
competitive strategy
D)
market strategy
Answer:
D
19)
Which of the following is not a community provider?
A)
LinkedIn
B)
Facebook
C) Blue
Nile
D)
Pinterest
Answer:
C
20)
Which of the following is not a variation of the e-tailer business model?
A)
bricks-and-clicks
B)
virtual merchant
C)
market creator
D)
manufacturer-direct
Answer:
C
21)
Which of the following is an example of a company using the content provider
model?
A)
Priceline
B)
Netflix
C) Dell
D) eBay
Answer:
B
22)
Which of the following is not an example of the bricks-and-clicks e-tailing
business model?
A)
Walmart
B)
Target
C)
Bluefly
D)
Staples
Answer:
C
23) In 2018,
the overall retail market in the United States was estimated to be about:
A) $53
trillion.
B) $5.3
trillion.
C) $530
billion.
D) $53
billion.
Answer:
B
24) In
general, the key to becoming a successful content provider is to:
A) own
the content being provided.
B) own
the technology by which content is created, presented, and distributed.
C)
provide online content for free.
D)
provide other services as well as online content.
Answer:
A
25)
Which of the following uses a subscription-based sales revenue model?
A) Yahoo
B) eBay
C)
MyPoints
D)
Dollar Shave Club
Answer:
D
26) All
of the following may lead to a competitive advantage except:
A) less
expensive suppliers.
B)
better employees.
C) fewer
products.
D)
superior products.
Answer:
C
27)
Which of the following is an unfair competitive advantage?
A) brand
name
B)
access to global markets
C) lower
product prices
D)
superior technology
Answer:
A
28) Which
of the following gives a business model the most credibility with outside
investors?
A) the
firm's management team
B) the
firm's value proposition
C) the
firm's market opportunity
D) the
firm's market strategy
Answer:
A
29)
Which of the following statements about Foursquare is not true?
A)
Foursquare combines a social network business model with location-based
technology.
B)
Foursquare initially struggled to find profitability.
C) The
growth in Foursquare's revenue since 2015 has been driven primarily by
significant increases in the numbers of users of its Swarm app.
D)
Foursquare's users are typically amenable to having their location tracked and
their data collected, since tracking users' location is the express purpose of
the app.
Answer:
C
30)
Which type of investor typically becomes interested in a startup company after
it has begun generating revenue?
A)
incubators
B) angel
investors
C)
crowdfunders
D)
venture capital investors
Answer:
D
31)
Which of the following is another name for a revenue model?
A)
business model
B)
business strategy
C)
financial model
D)
financial statements
Answer:
C
32) All
of the following can be considered examples of the market creator business
model except:
A) eBay.
B)
Priceline.
C) Uber.
D)
Twitter.
Answer:
D
33) ________
is defined by company using its competitive advantage to gain in surrounding
markets.
A)
Market strategy
B)
Differentiation
C)
Leverage
D) Focus
Answer:
C
34) A
wealthy individual who invests personal funds in a startup in exchange for an
equity share in the business is referred to as a(n):
A)
incubator.
B) angel
investor.
C)
venture capital investor.
D)
crowdfunder
Answer:
B
35)
Which of the following is not a key element of an elevator pitch?
A) exit
strategy
B)
growth metrics
C) legal
structure
D)
market opportunity
Answer:
C
36) A
value proposition defines how a company's product or service will generate
revenue for the firm.
FALSE
37) Real
markets are imperfect.
TRUE
38)
Information asymmetries enable some firms to have an edge over others.
TRUE
39) Slow
followers are sometimes more successful than first movers.
TRUE
40) In
the subscription revenue model, a company primarily generates income from the
display of ads.
FALSE
41) The Jumpstart
Our Business Startups (JOBS) Act, and issuance of enabling regulations by the
Securities and Exchange Commission, allows a start-up company to use
crowdfunding to solicit investors to invest in small and early-stage startups.
TRUE
46)
First movers often fail because:
A) their
competitive advantage is unfair.
B) they
lack complementary resources needed to sustain their advantages.
C) they
are operating in a perfect market.
D) they
fail to leverage their competitive assets.
Answer:
B
47) All
of the following primarily use an advertising revenue model except:
A)
Facebook.
B)
Yahoo.
C)
Google.
D)
Walmart.
Answer:
D
48)
Which of the following is not considered a portal?
A) Yahoo
B) MSN
C)
Amazon
D) AOL
Answer:
C
49)
Portals primarily generate revenue in all of the following ways except:
A)
charging advertisers for ad placement.
B)
collecting transaction fees.
C) sales
of goods.
D)
charging subscription fees.
Answer:
C
50) The
basic value proposition of community providers is:
A) they offer
a fast, convenient one-stop site where users can focus on their most important
concerns and interests.
B) they
offer consumers valuable, convenient, time-saving, and low-cost alternatives to
traditional service providers.
C) they
create a digital electronic environment for buyers and sellers to meet, agree
on a price, and transact.
D) they
increase customers' productivity by helping them get things done faster and
more cheaply.
Answer:
A
51) eBay
uses all of the following business models except:
A) B2C
market creator.
B) C2C
market creator.
C) content provider.
D) e-commerce infrastructure provider.
Answer:
C
52) All
of the following are business models employed in the online music industry
except:
A)
subscription.
B)
peer-to-peer streaming.
C)
download-and-own.
D) cloud
streaming.
Answer:
B
53) The
financial services, travel services, and job placement services industries
typically use the ________ business model.
A)
community provider
B)
transaction broker
C)
market creator
D)
e-tailer
Answer:
B
54) In
the ________ business model, a web-based business builds a digital environment
in which buyers and sellers can meet, display products, search for products,
and establish prices.
A)
market creator
B)
community provider
C)
e-tailer
D)
portal
Answer:
A
55)
On-demand service companies are characterized by the free sharing of resources
between the company and consumers
TRUE
57) All
of the following are examples of business-to-business (B2B) business models
except:
A) e-distributors.
B) e-procurement.
C) exchanges.
D)
portals.
Answer:
D
58) What
is the primary revenue model for an e-distributor?
A) sales
B)
transaction fee
C)
advertising
D)
subscription
Answer:
A
59)
Amazon Business is an example of which of the following business models?
A) B2B
service provider
B)
exchange
C)
e-distributor
D)
industry consortia
Answer:
C
60)
Ariba is an example of a(n)________.
A)
e-distributor
B)
portal
C)
e-procurement firm
D)
Industry consortium
Answer:
C
61)
Which of the following may offer its customers value chain management software?
A)
e-distributors
B)
e-procurement companies
C)
exchanges
D)
community providers
Answer:
B
62) Over
the past decade, the number of exchanges has:
A)
greatly increased.
B)
diminished sharply.
C)
stayed about the same.
D) increased
slowly but steadily.
Answer:
B
63) The
Seam is an example of a(n):
A)
private industrial network.
B)
exchange.
C)
industry consortium.
D)
e-distributor.
Answer:
C
64) A
________ marketplace supplies products and services of interest to particular
industries.
A)
perfect
B)
differentiated
C)
horizontal
D)
vertical
Answer:
D
65) SaaS
and PaaS providers can typically provide services at lower costs through scale
economies.
TRUE
67) A
________ refers to a competitive strategy in which firms attempt to achieve
lower business process costs.
A)
strategy of cost competition
B) scope
strategy
C)
customer intimacy strategy
D)
focus/market niche strategy
Answer:
A
68) Which
of the following features of e-commerce technology changes industry structure
by lowering barriers to entry but greatly expands the market at the same time?
A)
global reach
B)
richness
C)
interactivity
D)
personalization
Answer:
A
69)
Which of the following is not a primary activity in a firm value chain?
A)
outbound logistics
B)
finance/accounting
C)
operations
D)
after-sales service
Answer:
B
70) A
________ is a networked business ecosystem that coordinates a firm's suppliers,
distributors, and delivery firms with its own production needs using an
Internet-based supply chain management system.
A) value
chain
B) value
system
C) value
web
D)
business strategy
Answer:
C
71) If
you wished to leverage the ubiquitous nature of the Web to differentiate your
product, you would:
A)
enable individual customization of the product by consumers.
B)
implement a strategy of commoditization.
C) adopt
a strategy of cost competition.
D)
develop a scope strategy to compete within a narrower market segment.
Answer:
A
72) A
strategy designed to compete within a narrow market or product segment is
called a ________ strategy.
A) scope
B)
differentiation
C)
commoditization
D) focus
Answer:
D
73) ________
technologies are technologies that enable the incremental improvement of
products and services.
A)
Sustaining
B)
Differentiating
C)
Disruptive
D)
Commodity
Answer:
A
74)
Innovative entrepreneurs and their business firms that destroy existing
business models are referred to as:
A)
crowdfunders.
B)
venture capitalists.
C)
disruptors.
D) angel
investors.
Answer:
C
75) The
term unfit fitness refers to a situation in which employees of a firm have the
wrong skills for the current environment.
TRUE
76)
Scale economies are efficiencies that result from increasing the size of the
business.
TRUE
77) A
company's strong linkages with its customers increase switching costs.
TRUE
78) The
Internet's universal standard have changed industry structure by increasing
barriers to entry and decreasing competition within an industry.
FALSE
79)
Interactivity that enables product customization alters industry structure by
decreasing the threat of substitutes.
TRUE
80)
E-commerce has increased price competition in many markets.
TRUE
81)
Social technologies change industry structure by weakening powerful sales
channels and shifts bargaining power to consumers.
FALSE
B) Value
proposition; revenue model
________
and ________ are typically the most easily identifiable aspects of a company's
business model.
A)
Market strategy; market opportunity
B) Value
proposition; revenue model
C)
Competitive advantage; competitive environment
D)
Revenue model; market opportunity
B)
Amazon Kindle Unlimited
Which of
the following uses a subscription revenue model for books?
A)
Spotify
B)
Amazon Kindle Unlimited
C)
Rhapsody
D)
Pandora
D) value
proposition
Which
element of the business model addresses what a firm provides that other firms
do not and cannot?
A)
competitive environment
B)
competitive advantage
C)
market strategy
D) value
proposition
B)
competitive environment
Which
element of the business model refers to the presence of substitute products in
the market?
A) value
proposition
B)
competitive environment
C)
competitive advantage
D)
market opportunity
B)
selection and convenience
Which of
the following are Amazon's primary value propositions?
A)
personalization and customization
B)
selection and convenience
C)
reduction of price discovery cost
D)
management of product delivery
B)
revenue model
A firm's
________ describes how a firm will produce a superior return on invested
capital.
A) value
proposition
B)
revenue model
C)
market strategy
D)
competitive advantage
D)
Twitter
Which of
the following does not use a subscription revenue model?
A) Apple
Music
B)
eHarmony
C)
Ancestry
D)
Twitter
A)
advertising revenue model
Stickiness
is an important attribute for which of the following revenue models?
A)
advertising revenue model
B)
subscription revenue model
C)
transaction fee revenue model
D)
affiliate revenue model
B)
E*Trade
Which of
the following companies uses a transaction fee revenue model?
A) Yahoo
B)
E*Trade
C)
Twitter
D)
Birchbox
D)
MyPoints
Which of
the following is an example of the affiliate revenue model?
A)
Scribd
B) eBay
C) L.L.
Bean
D)
MyPoints
C)
freemium strategy
Which of
the following involves a company giving away a certain level of product or service
without charge, but then charging a fee for premium levels of the product or
service?
A)
advertising revenue model
B)
subscription revenue model
C)
freemium strategy
D)
premium strategy
C) the
availability of supportive organizational structures
Which of
the following factors is not a significant influence on a company's competitive
environment?
A) how
many competitors are active
B) what
the market share of each competitor is
C) the
availability of supportive organizational structures
D) how
competitors price their products
D) ESPN.
All of
the following can be considered a direct competitor of Priceline except:
A)
Travelocity.
B)
Expedia.
C)
Orbitz.
D) ESPN.
B) the
market is saturated.
The
existence of many competitors in any one market segment may indicate:
A) an
untapped market niche.
B) the
market is saturated.
C) no
one firm has differentiated itself within that market.
D) a
market that has already been tried without success.
D)
Priceline.
All of
the following can be considered a direct or indirect competitor of Amazon
except:
A) eBay.
B)
Apple's iTunes Store.
C)
Walmart.
D)
Priceline.
A) there
are no competitive advantages or asymmetries because all firms have equal
access to all the factors to production.
A perfect
market is one in which:
A) there
are no competitive advantages or asymmetries because all firms have equal
access to all the factors to production.
B) one
firm develops an advantage based on a factor of production that other firms
cannot purchase.
C) one
participant in the market has more resources than the others.
D)
competition is at a minimum, as each niche market within an industry is served
by the company with the greatest competitive advantage.
C)
incubators.
Organizations
that typically provide an array of services to startup companies along with a
small amount of funding are referred to as:
A) angel
investors.
B)
crowdfunders.
C)
incubators.
D)
venture capital investors.
D)
market strategy
A
________ specifically details how you plan to find customers and to sell your
product.
A) sales
analysis
B)
business plan
C)
competitive strategy
D)
market strategy
C) Blue
Nile
Which of
the following is not a community provider?
A)
LinkedIn
B)
Facebook
C) Blue
Nile
D)
Pinterest
C)
market creator
Which of
the following is not a variation of the e-tailer business model?
A)
bricks-and-clicks
B)
virtual merchant
C)
market creator
D)
manufacturer-direct
B)
Netflix
Which of
the following is an example of a company using the content provider model?
A)
Priceline
B)
Netflix
C) Dell
D) eBay
C)
Bluefly
Which of
the following is not an example of the bricks-and-clicks e-tailing business
model?
A)
Walmart
B)
Target
C)
Bluefly
D)
Staples
B) $5.3
trillion.
In 2018,
the overall retail market in the United States was estimated to be about:
A) $53
trillion.
B) $5.3
trillion.
C) $530
billion.
D) $53
billion.
A) own
the content being provided.
In
general, the key to becoming a successful content provider is to:
A) own
the content being provided.
B) own
the technology by which content is created, presented, and distributed.
C)
provide online content for free.
D)
provide other services as well as online content.
D)
Dollar Shave Club
Which of
the following uses a subscription-based sales revenue model?
A) Yahoo
B) eBay
C)
MyPoints
D)
Dollar Shave Club
C) fewer
products.
All of
the following may lead to a competitive advantage except:
A) less
expensive suppliers.
B) better
employees.
C) fewer
products.
D)
superior products.
A) brand
name
Which of
the following is an unfair competitive advantage?
A) brand
name
B)
access to global markets
C) lower
product prices
D)
superior technology
A) the
firm's management team
Which of
the following gives a business model the most credibility with outside
investors?
A) the
firm's management team
B) the
firm's value proposition
C) the
firm's market opportunity
D) the
firm's market strategy
C) The
growth in Foursquare's revenue since 2015 has been driven primarily by
significant increases in the numbers of users of its Swarm app.
Which of
the following statements about Foursquare is not true?
A)
Foursquare combines a social network business model with location-based
technology.
B)
Foursquare initially struggled to find profitability.
C) The
growth in Foursquare's revenue since 2015 has been driven primarily by
significant increases in the numbers of users of its Swarm app.
D)
Foursquare's users are typically amenable to having their location tracked and
their data collected, since tracking users' location is the express purpose of
the app.
D)
venture capital investors
Which
type of investor typically becomes interested in a startup company after it has
begun generating revenue?
A) incubators
B) angel
investors
C)
crowdfunders
D)
venture capital investors
C)
financial model
Which of
the following is another name for a revenue model?
A)
business model
B)
business strategy
C)
financial model
D)
financial statements
D)
Twitter.
All of
the following can be considered examples of the market creator business model
except:
A) eBay.
B)
Priceline.
C) Uber.
D)
Twitter.
C)
Leverage
________
is defined by company using its competitive advantage to gain in surrounding
markets.
A)
Market strategy
B)
Differentiation
C)
Leverage
D) Focus
B) angel
investor.
A
wealthy individual who invests personal funds in a startup in exchange for an
equity share in the business is referred to as a(n):
A)
incubator.
B) angel
investor.
C)
venture capital investor.
D)
crowdfunder.
C) legal
structure
Which of
the following is not a key element of an elevator pitch?
A) exit
strategy
B)
growth metrics
C) legal
structure
D)
market opportunity
B) they lack
complementary resources needed to sustain their advantages.
First
movers often fail because:
A) their
competitive advantage is unfair.
B) they
lack complementary resources needed to sustain their advantages.
C) they
are operating in a perfect market.
D) they
fail to leverage their competitive assets.
D)
Walmart.
All of
the following use an advertising revenue model except:
A)
Facebook.
B)
Yahoo.
C)
Google.
D)
Walmart.
C)
Amazon
Which of
the following is not considered a portal?
A) Yahoo
B) MSN
C)
Amazon
D) AOL
C) sales
of goods.
Portals
primarily generate revenue in all of the following ways except:
A)
charging advertisers for ad placement.
B)
collecting transaction fees.
C) sales
of goods.
D)
charging subscription fees.
A) they offer
a fast, convenient one-stop site where users can focus on their most important
concerns and interests.
The
basic value proposition of community providers is:
A) they
offer a fast, convenient one-stop site where users can focus on their most
important concerns and interests.
B) they
offer consumers valuable, convenient, time-saving, and low-cost alternatives to
traditional service providers.
C) they
create a digital electronic environment for buyers and sellers to meet, agree
on a price, and transact.
D) they
increase customers' productivity by helping them get things done faster and
more cheaply.
C)
content provider.
eBay
uses all of the following business models except:
A) B2C
market creator.
B) C2C
market creator.
C) content provider.
D) e-commerce infrastructure provider.
B)
peer-to-peer streaming.
All of
the following are business models employed in the online music industry except:
A)
subscription.
B)
peer-to-peer streaming.
C)
download-and-own.
D) cloud
streaming.
B)
transaction broker
The
financial services, travel services, and job placement services industries
typically use the ________ business model.
A)
community provider
B)
transaction broker
C)
market creator
D)
e-tailer
A)
market creator
In the
________ business model, a web-based business builds a digital environment in
which buyers and sellers can meet, display products, search for products, and
establish prices.
A)
market creator
B)
community provider
C)
e-tailer
D)
portal
D)
portals.
All of the
following are examples of business-to-business (B2B) business models except:
A) e-distributors.
B) e-procurement.
C) exchanges.
D)
portals.
A) sales
What is
the primary revenue model for an e-distributor?
A) sales
B)
transaction fee
C)
advertising
D)
subscription
C)
e-distributor
Amazon
Business is an example of which of the following business models?
A) B2B
service provider
B)
exchange
C)
e-distributor
D)
industry consortia
C)
e-procurement firm
Ariba is
an example of a(n)________.
A)
e-distributor
B)
portal
C)
e-procurement firm
D)
Industry consortium
B)
e-procurement companies
Which of
the following may offer its customers value chain management software?
A)
e-distributors
B)
e-procurement companies
C)
exchanges
D) community
providers
B)
diminished sharply.
Over the
past decade, the number of exchanges has:
A)
greatly increased.
B)
diminished sharply.
C)
stayed about the same.
D)
increased slowly but steadily.
C)
industry consortium.
The Seam
is an example of a(n):
A)
private industrial network.
B)
exchange.
C)
industry consortium.
D)
e-distributor.
D)
vertical
A
________ marketplace supplies products and services of interest to particular
industries.
A)
perfect
B)
differentiated
C)
horizontal
D)
vertical
A)
strategy of cost competition
A
________ refers to a competitive strategy in which firms attempt to achieve
lower business process costs.
A)
strategy of cost competition
B) scope
strategy
C)
customer intimacy strategy
D)
focus/market niche strategy
A)
global reach
Which of
the following features of e-commerce technology changes industry structure by
lowering barriers to entry but greatly expands the market at the same time?
A)
global reach
B)
richness
C)
interactivity
D)
personalization
B) finance/accounting
Which of
the following is not a primary activity in a firm value chain?
A)
outbound logistics
B)
finance/accounting
C)
operations
D)
after-sales service
C) value
web
A
________ is a networked business ecosystem that coordinates a firm's suppliers,
distributors, and delivery firms with its own production needs using an
Internet-based supply chain management system.
A) value
chain
B) value
system
C) value
web
D)
business strategy
A)
enable individual customization of the product by consumers.
If you
wished to leverage the ubiquitous nature of the Web to differentiate your
product, you would:
A)
enable individual customization of the product by consumers.
B)
implement a strategy of commoditization.
C) adopt
a strategy of cost competition.
D)
develop a scope strategy to compete within a narrower market segment.
D) focus
A
strategy designed to compete within a narrow market or product segment is
called a ________ strategy.
A) scope
B)
differentiation
C)
commoditization
D) focus
A)
Sustaining
________
technologies are technologies that enable the incremental improvement of
products and services.
A)
Sustaining
B)
Differentiating
C)
Disruptive
D)
Commodity
C)
disruptors.
Innovative
entrepreneurs and their business firms that destroy existing business models
are referred to as:
A)
crowdfunders.
B)
venture capitalists.
C)
disruptors.
D) angel
investors.
------
------
1)
________ and ________ are typically the most easily identifiable aspects of a
company's
business
model.
A)
Market strategy; market opportunity
B) Value
proposition; revenue model
C) Value
proposition; competitive environment
D)
Revenue model; market strategy
B) Value
proposition; revenue model
2) All
of the following are using a subscription revenue model for music except:
A)
Spotify.
B)
Scribd.
C)
Rhapsody.
D)
Pandora.
B)
Scribd.
3) Which
element of the business model addresses what a firm provides that other firms
do not and cannot?
A)
revenue model
B)
competitive advantage
C)
market strategy
D) value
proposition
D) value
proposition
4) Which
element of the business model refers to the presence of substitute products in
the market?
A) value
proposition
B)
competitive environment
C)
competitive advantage
D) market
strategy
B)
competitive environment
5) Which
of the following are Amazon's primary value propositions?
A)
personalization and customization
B)
selection and convenience
C)
reduction of price discovery cost
D)
management of product delivery
B)
selection and convenience
6) A
firm's ________ describes how a firm will produce a superior return on invested
capital.
A) value
proposition
B)
revenue model
C)
market strategy
D)
competitive advantage
B)
revenue model
7) Which
of the following is an example of the subscription revenue model?
A)
eHarmony
B) eBay
C)
E*Trade
D)
Twitter
A)
eHarmony
8)
Stickiness is an important attribute for which of the following revenue models?
A)
advertising revenue model
B)
subscription revenue model
C) transaction
fee revenue model
D) sales
revenue model
A)
advertising revenue model
9) Which
of the following companies uses a transaction fee revenue model?
A) Yahoo
B)
E*Trade
C)
Twitter
D) Sears
B)
E*Trade
10)
Which of the following is an example of the affiliate revenue model?
A)
Scribd
B) eBay
C) L.L.
Bean
D)
MyPoints
D)
MyPoints
11)
Which of the following involves a company giving away a certain level of
product or services without charge, but then charging a fee for premium levels
of the product or service?
A)
advertising revenue model
B)
subscription revenue model
C)
freemium strategy
D)
transaction fee revenue mode
C)
freemium strategy
12)
Which of the following factors is not a significant influence on a company's
competitive environment?
A) how
many competitors are active
B) what
the market share of each competitor is
C) the
availability of supportive organizational structures
D) how
competitors price their products
C) the
availability of supportive organizational structures
13)
Which of the following would be considered an indirect competitor of Priceline?
A)
Travelocity
B)
Expedia
C)
Orbitz
D)
TripAdvisor
B)
Expedia
14) The existence
of a large number of competitors in any one market segment may indicate:
A) an
untapped market niche.
B) the
market is saturated.
C) no
one firm has differentiated itself within that market.
D) a
market that has already been tried without success.
B) the
market is saturated.
15) All
of the following can be considered a direct or indirect competitor of Amazon
except:
A) eBay.
B)
Apple's iTunes Store.
C)
Walmart.
D) Star
D) Star
16) A
perfect market is one in which:
A) there
are no competitive advantages or asymmetries because all firms have equal
access to all
the
factors to production.
B) one
firm develops an advantage based on a factor of production that other firms
cannot
purchase.
C) one
participant in the market has more resources than the others.
D)
competition is at a minimum, as each niche market within an industry is served
by the
company
with the greatest competitive advantage.
A) there
are no competitive advantages or asymmetries because all firms have equal
access to all
17)
Organizations that typically provide an array of services to start-up companies
along with a small amount of funding are referred to as:
A) angel
investors.
B)
crowdfunders.
C)
incubators.
D)
venture capital investors.
C)
incubators.
18) A ________
specifically details how you plan to find customers and to sell your product.
A) sales
analysis
B)
business plan
C)
competitive strategy
D)
market strategy
D)
market strategy
19)
Which of the following is not a community provider?
A)
LinkedIn
B)
Facebook
C)
Priceline
D)
Pinteres
C)
Priceline
20)
Which of the following is not a variation of the e-tailer business model?
A)
bricks-and-clicks
B)
virtual merchant
C)
market creator
D)
manufacturer-direct
C)
market creator
21) An
example of a company using the content provider model is:
A)
Priceline.
B)
Rhapsody.
C) Dell.
D) eBay.
B)
Rhapsody.
22)
Which of the following is not an example of the bricks-and-clicks e-tailing
business model?
A)
Walmart
B) Sears
C)
Bluefly
D)
Staples
C)
Bluefly
23) The overall
retail market in the United States in 2015 was estimated at about:
A) $48
trillion.
B) $4.8
trillion.
C) $480
D) $48
billion.
B) $4.8
trillion.
24) In
general, the key to becoming a successful content provider is to:
A) own
the content being provided.
B) own
the technology by which content is created, presented, and distributed.
C)
provide online content for free.
D)
provide other services as well as online content.
A) own
the content being provided.
25)
Which of the following was not able to successfully implement a freemium
business model?
A)
Pandora
B)
Dropbox
C)
LinkedIn
D) Ning
D) Ning
26) All
of the following may lead to a competitive advantage except:
A) less
expensive suppliers.
B)
better employees.
C) fewer
products.
D)
superior products.
C) fewer
products.
27)
Which of the following is an unfair competitive advantage?
A) Brand
name
B)
access to global markets
C) lower
product prices
D)
superior technology
A) Brand
name
28) Which
of the following gives a business model the most credibility with outside
investors?
A) the
firm's management team
B) the
firm's value proposition
C) the
firm's market opportunity
D) the
firm's market strategy
A) the
firm's management team
29)
Which of the following statements about Foursquare is not true?
A)
Foursquare combines a social network business model with location-based
technology.
B)
Foursquare began operating without a revenue model.
C)
Foursquare's business model faces significant intellectual property concerns.
D)
Foursquare has been able to command a high valuation from venture capital
investors despite unimpressive revenue and profits.
C)
Foursquare's business model faces significant intellectual property concerns.
30)
Which type of investor typically becomes interested in a start-up company after
it has begun
generating
revenue?
A)
incubators
B) angel
investors
C)
crowdfunders
D)
venture capital investors
D)
venture capital investors
31)
Which of the following is another name for a revenue model?
A)
business model
B)
business strategy
C)
financial model
D)
financial statements
C)
financial model
32) All
of the following use a social network marketing strategy except:
A)
Twitter.
B)
YouTube.
C)
Pinterest.
D)
Amazon.
C) Pinterest.
33) The
use by a company of its competitive advantage to achieve more advantage in
surrounding
markets is known as ________.
A)
market strategy
B)
differentiation
C)
leverage
D) focus
C)
leverage
34) A
wealthy individual who invests personal funds in a start-up in exchange for an
equity stock in the business is referred to as a(n) ________.
A)
incubator
B) angel
investor
C)
venture capital investor
D)
crowdfunder
B) angel
investor
35)
Which of the following is not a key element of an elevator pitch?
A) exit
strategy
B)
growth metrics
C) legal
structure
D)
market opportunity
C) legal
structure
36) A
value proposition defines how a company's product or service fulfills the needs
of a customer.
Answer:
TRUE
37)
Firms that fail to produce returns greater than alternative investments
typically go out of business.
Answer:
TRUE
38) An
asymmetry exists whenever all participants in a market have equivalent
resources.
Answer:
FALSE
39) First
movers are often not as successful as follower firms.
Answer:
TRUE
40) All
firms need an organization to efficiently implement their business plans and
strategies.
Answer:
TRUE
41) The
JOBS Act and issuance of enabling regulations by the Securities and Exchange
Commission allows a start-up company to use crowdfunding to solicit accredited
investors to invest in small and early-stage start-ups.
Answer:
TRUE
46) The
business model of e-tailers is quite similar to that of:
A)
e-distributors.
B)
transaction brokers.
C)
exchanges.
D)
service providers.
A)
e-distributors.
47) All
of the following use an advertising revenue model except:
A)
Twitter.
B)
Yahoo.
C)
Google.
D)
Amazon.
D)
Amazon.
48)
Which of the following is not considered a portal?
A) Yahoo
B) MSN
C)
Amazon
D) AOL
C)
Amazon
49)
Portals primarily generate revenue in all of the following ways except:
A)
charging advertisers for ad placement.
B)
collecting transaction fees.
C) sales
of goods.
D)
charging subscription fees
C) sales
of goods.
50) The
basic value proposition of community providers is:
A) they
offer a fast, convenient one-stop site where users can focus on their most
important
concerns
and interests.
B) they
offer consumers valuable, convenient, time-saving, and low cost alternatives to
traditional
service providers.
C) they
create a digital electronic environment for buyers and sellers to meet, agree
on a price,
and
transact.
D) they
increase customers' productivity by helping them get things done faster and
more
cheaply.
A) they
offer a fast, convenient one-stop site where users can focus on their most
important
concerns
and interests.
51) eBay
uses all of the following business models except:
A) B2C
market creator.
B) C2C
market creator.
C) content provider.
D) e-commerce infrastructure provider.
C)
content provider.
52) All
of the following are business models employed in the online music industry
except:
A)
subscription.
B)
peer-to-peer streaming.
C)
download-and-own.
D) cloud
streaming.
B)
peer-to-peer streaming.
53) The
financial services, travel services, and job placement services industries
typically use the ________ business model.
A)
community provider
B)
transaction broker
C)
market creator
D)
e-tailer
B)
transaction broker
54) In the
________ business model, a Web-based business builds a digital environment in
which
buyers
and sellers can meet, display products, search for products, and establish
prices.
A)
market creator
B)
community provider
C)
e-tailer
D)
portal
A)
market creator
55)
On-demand service companies are characterized by the free sharing of resources
between the company and consumers.
Answer:
FALSE
57) All
of the following are examples of business-to-business (B2B) business models
except:
A) e-distributors.
B) e-procurement.
C) exchanges.
D)
e-tailers.
D)
e-tailers.
58) What
is the primary revenue model for an e-distributor?
A) sales
B)
transaction fee
C)
advertising
D)
subscription
A) sales
59) W.W.
Grainger is an example of which of the following business models?
A) B2B
service provider
B)
exchange
C)
e-distributor
D)
industry consortia
C)
e-distributor
60)
________ create and sell access to digital markets.
A)
E-distributors
B)
Portals
C)
E-procurement firms
D)
Market creators
C)
E-procurement firms
61) Which
of the following may offer its customers value chain management software?
A)
e-distributors
B)
e-procurement companies
C)
exchanges
D)
community providers
B)
e-procurement companies
62) Over
the past decade, the number of exchanges has:
A)
greatly increased.
B)
diminished sharply.
C)
stayed abou D) increased slowly but steadily.
B)
diminished sharply.
63)
SupplyOn is an example of a(n):
A)
private industrial network.
B)
exchange.
C)
industry consortium.
D)
e-distributor.
C)
industry consortium.
64) A
________ marketplace supplies products and services of interest to particular
industries.
A)
perfect
B)
differentiated
C)
horizontal
D)
vertical
D)
vertical
65) SaaS
and PaaS providers can typically provide services at lower costs through scale
economies.
Answer:
TRUE
67)
Which business strategy involves implementing a new, more efficient set of
business processes that other firms cannot yet obtain?
A)
strategy of cost competition
B) scope
strategy
C)
customer intimacy strategy
D)
focus/market niche strategy
A)
strategy of cost competition
68)
Which of the following features of e-commerce technology changes industry
structure by lowering barriers to entry but greatly expands the market at the
same time?
A)
global reach
B)
richness
C)
interactivity
D)
personalization
A)
global reach
69)
Which of the following is not a primary activity in a firm value chain?
A)
outbound logistics
B)
finance/accounting
C)
operations
D)
after-sales service
B)
finance/accounting
70) A
________ is a networked business ecosystem that coordinates a firm's suppliers,
distributors, and delivery firms with its own production needs using an
Internet-based supply chain management system.
A) value
chain
B) value
system
C) value
web
D)
business strategy
C) value
web
71) If
you wished to leverage the ubiquitous nature of the Web to differentiate your
product, you would:
A)
enable individual customization of the product by consumers.
B) implement
a strategy of commoditization.
C) adopt
a strategy of cost competition.
D)
develop a scope strategy to compete within a narrower market segment.
A)
enable individual customization of the product by consumers.
72) A
strategy designed to compete within a narrow market or product segment is
called a ________ strategy.
A) scope
B)
differentiation
C) cost
D) focus
D) focus
73)
________ technologies are technologies that enable the incremental improvement
of products and services.
A)
Sustaining
B)
Differentiating
C)
Disruptive
D)
Commodity
A)
Sustaining
74)
Innovative entrepreneurs and their business firms that destroy existing
business models are referred to as ________.
A)
crowdfunders
B)
venture capitalists
C)
disruptors
D) angel
investors
C)
disruptors
75) The
term unfit fitness refers to a situation in which employees of a firm have the
wrong skills for the current environment.
Answer:
TRUE
76)
Scale economies are efficiencies that result from flattening the hierarchy of
an organization.
Answer:
FALSE
77) A
company's strong linkages with its customers increase switching costs.
Answer:
TRUE
78) The
Internet's universal standards can change industry structure by increasing
barriers to entry and decreasing competition within an industry.
Answer: FALSE
79)
Interactivity that enables product customization alters industry structure by
increasing the threat of substitutes.
Answer:
FALSE
80)
E-commerce has increased price competition in nearly all markets.
Answer:
TRUE
81)
Social technologies change industry structure by shifting programming and
editorial
decisions
to consumers and creating substitute entertainment products.
Answer:
TRUE
1.14)
Which of the following protocols is used to send mail to a server?
A.A)
SMTP
2.77)
Snapchat’s Lenses feature is an example of which of the following?
C
.
C)
augmented reality
3.「台塑網」屬於Morgan Stanley 電子市集經營模式中的哪一種?[單選]
A
.
由買方建? (Buy-managed) 電子市集
4.72)
Which of the following was the first to launch an intelligent digital
assistant?
B
.
B) Apple
5.台灣銀行在民國86年1月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]
A
.
電子資料交換
6.P&G與Wal-Mart建立分享資訊機制,讓P&G每天由Wal-Mart蒐集銷售資訊,藉此管理在Wal-Mart的存貨。請問這是屬於協同商務四大領域中的哪一種?[單選] 回答錯誤
B
.
顧客關係管理
7.43) The
________ is a consortium of corporations, government agencies, and nonprofit
organizations that monitors Internet policies and practices.
A
.
A)
Internet Engineering Steering Group (IESG)
B
.
B) World
Wide Web Consortium (W3C)
C
.
C)
Internet Engineering Task Force (IETF)
D
.
D)
Internet Society (ISOC)
正確答案: D
8.在線上以物?物的方式進?交?,是屬於電子商務中的何種經營模式?[單選] 回答錯誤
A
.
充足的信任機制
B
.
易用的網站功能
C
.
特殊的使用經驗
D
.
便捷的運送服務
正確答案: D
9.4. 台塑透過台塑網提高台塑集團採購、工程發包、原料標售系統與庫存管理等作業效率,進而提升台塑集團的競爭力。請問台塑網的發展屬於 B to B 電子商務發展的哪一個階段?(單選) 回答錯誤
A
.
(A) 電子資料交換
B
.
(B) 基本的電子商務
C
.
(C) 電子交易市集
D
.
(D) 協同商務
正確答案: C
10.阿翔是個3C愛好者,於是常常上MOBILE01討論,請問MOBILE01的出現是來自虛擬社群互動基礎的哪一項?[單選] 回答錯誤
A
.
多品牌服務
B
.
交流管道
C
.
交易機制
D
.
創造價值
正確答案: D
11.52)
All of the following are involved in the effort to create standards for IoT
except:
A
.
A)
AllSeen Alliance.
B
.
B)
Industrial Internet Consortium.
C
.
C) Open
Connectivity Foundation.
D
.
D) W3C.
正確答案: D
12.1) During
which period of time did the Institutionalization phase of Internet development
take place?
A
.
A)
1950-1960
B
.
B)
1961-1974
C
.
C)
1975-1995
D
.
D) 1995
to the present
正確答案: C
13.65)
You could expect to find all of the following services in a web server software
package except:
A
.
A)
security services.
B
.
B) FTP.
C
.
C)
search engine.
D
.
D) an
RSS aggregator.
正確答案: D
14.77) Snapchat’s
Lenses feature is an example of which of the following?
A
.
A)
artificial digital assistant
B
.
B)
virtual reality
C
.
C)
augmented reality
D
.
D) mixed
reality
正確答案: C
15.76)
The protocol that enables the transmission of voice and other forms of audio
communication over the Internet is called:
A
.
A) VoIP.
B
.
B) IPTP.
C
.
C) VTP.
D
.
D) IP.
正確答案: A
16.老陳是美國影集的愛好者,常到以物易物網和其他人交換自己喜愛的影集,請問以物易物網是屬於C to C商務模式的哪一種?[單選] 回答錯誤
A
.
競標過程
B
.
註冊使用
C
.
後續活動
D
.
上架交易
正確答案: A
17.73) Which
of the following enables Internet users to communicate with each other,
although not in real time?
A
.
A)
mobile messaging
B
.
B)
online forum
C
.
C) SMS
messaging
D
.
D) VoIP
正確答案: B
18.「eBay 拍賣網站」屬於哪一種電子商務模式?[單選] 回答錯誤
D.P2P
19.球球除了發表自己對行銷議題的看法之外,還會放一些有趣的行銷廣告影片,只要在影片下面留言「行銷創意,球球最夠力」並發布到自己的塗鴉牆,就有機會獲得電影票一張。請問這是C to C網路分享模式過程中的哪一個階段?[單選] 回答錯誤
A
.
結構性溝通層級
B
.
非結構性溝通層級
C
.
商務交?中心層級
D
.
知?/?程交?中心層級
正確答案: A
20.阿證最近發現某茶飲的廣告;「只要來店消費就會給予一組序號,憑序號再到Facebook按讚,就有機會獲得電影票一張。」請問這屬於C to C網路交易模式效益的哪一項?[單選] 回答錯誤
A
.
虛構的高評價
B
.
設立釣魚網頁
C
.
縮短交易時間
D
.
提供錯誤資訊
正確答案: D
21.Morgan
Stanley 認為B2B 電子商務的演進可分為四個發展階段,下?排序何者正確?[單選] 回答錯誤
A
.
吸引人潮
B
.
發展交易
C
.
匯聚人潮
D
.
獲得錢潮
正確答案: C
22.16) Which
of the following statements about cloud computing is not true?
A
.
A) A
public cloud is typically used by companies with stringent privacy and security
requirements.
B
.
B) Dropbox
is an example of a public cloud.
C
.
C)
Hybrid clouds offer both public and private cloud options.
D
.
D) A
private cloud may be hosted internally or externally.
正確答案: A
23.由消費者與消費者進行交易,在電子商務中屬於何種經營模式?[單選]
A
.
B2B
B
.
B2C
C.C2C
D
.
P2P
正確答案: C
24.拍賣網站提供消費者雙方標售二手商品,在電子商務中屬於何種經營模式?[單選] 回答錯誤
A
.
B2C
B
.
B2B
C
.
C2B
D
.
C2C
正確答案: C
25.Google優化其搜尋引擎的品質,讓使用者願意重複使用,這是屬於B to C電子商務的哪個發展階段?[單選] 回答錯誤
A
.
吸引人潮
B
.
發展交易
C
.
匯聚人潮
D
.
獲得錢潮
正確答案: C
26.50) The
major technologies used with wireless local area networks are:
A
.
A) Wi-Fi
and Bluetooth.
B
.
B) Wi-Fi
and WiMax.
C
.
C)
Bluetooth and 3G.
D
.
D) WiMax
and 3G.
正確答案: A
27.76) The
protocol that enables the transmission of voice and other forms of audio
communication over the Internet is called:
A
.
A) VoIP.
B
.
B) IPTP.
C
.
C) VTP.
D
.
D) IP.
正確答案: A
28.51)
Which of the following standards provide for high-speed short-range Wi-Fi?
A
.
A) WiGig
B
.
B) WiMax
C
.
C)
Bluetooth
D
.
D) Wi-Fi
6
正確答案: A
29.Morgan
Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選] 回答錯誤
A
.
吸引人潮
B
.
發展交易
C
.
匯聚人潮
D
.
獲得錢潮
正確答案: C
30.63) The
first web browser to make it possible to view documents on the Web with colored
background, images, and animations was:
A
.
A)
Netscape Navigator.
B
.
B)
Mosaic.
C
.
C)
Mozilla.
D
.
D)
Internet Explorer.
正確答案: B
31.阿源第一次利用博客來買書,在準備購買的時候,看到上面清楚的購買流程圖讓他順利買到他想要的書,請問博客來這樣的設計符合 B to C電子商務網站維持因素的哪一個?[單選]
A
.
良好功能
B
.
瀏覽器開啟
C
.
資訊化
D
.
相關指引
正確答案: D
32.83)
Applications for Android operating system-based smartphones are typically
written in which of the following?
A
.
A) Swift
B
.
B) Java
C
.
C) ActiveX
D
.
D) ColdFusion
正確答案: B
33.44) The ________ helps define the overall structure of the Internet.
A
.
A) IAB
B
.
B) IESG
C
.
C) W3C
D
.
D) ITU
正確答案: A
34.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]
A
.
商業自動化
B
.
電子商業
C
.
電子商務
D
.
協同產品商務
正確答案: D
35.根據Goldman Sachs對於協同商務層級的分類,由低至高排序為下列何者?[單選] 回答錯誤
A
.
線上學習
B
.
線上團購
C
.
線上購物
D
.
線上拍賣
正確答案: B
36.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選] 回答錯誤
A
.
人際關係
B
.
交易
C
.
幻想
D
.
興趣
正確答案: D
37.51)
Which of the following standards provide for high-speed short-range Wi-Fi?
A
.
A) WiGig
B
.
B) WiMax
C
.
C)
Bluetooth
D
.
D) Wi-Fi
6
正確答案: A
38.阿翔是個3C愛好者,於是常常上MOBILE01討論,請問MOBILE01的出現是來自虛擬社群互動基礎的哪一項?[單選] 回答錯誤
A
.
多品牌服務
B
.
交流管道
C
.
交易機制
D
.
創造價值
正確答案: D
39.15)
Where does TLS operate within TCP/IP?
A
.
A)
between the Internet Layer and the Transport Layer
B
.
B)
between the Transport Layer and the Application Layer
C
.
C) between
the Network Interface Layer and the Transport Layer
D
.
D)
between the Internet Layer and the Application Layer
正確答案: B
40.28)
The term latency refers to a delay that can be experienced in packet-switched
networks.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
41.32)
HTTP/2 is supported by almost all the leading web browsers.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
42.55) T1
and T3 refer to international telephone standards for digital communication.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
43.59)
WLAN-based Internet access derives from the same technological foundations as
telephone-based wireless Internet access.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
44.55)
T1 and T3 refer to international telephone standards for digital communication.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
45.78) About
75% of U.S. smart speaker users make voice-based purchases using those devices.
回答錯誤
是非題 (2 分) 0分
A
.
A
B
.
B
正確答案: B
46.31)
Amazon Web Services is an example of a private cloud.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
47.29)
Edge computing improves response time and saves bandwidth.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
48.84)
The only way apps can be purchased is via either the Apple App Store or from
Google Play.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
49.30) A
private cloud is operated for the benefit of multiple firms.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
50.57)
Tier 1 ISPs provide Internet access to consumers and businesses.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
1.4. 台塑透過台塑網提高台塑集團採購、工程發包、原料標售系統與庫存管理等作業效率,進而提升台塑集團的競爭力。請問台塑網的發展屬於 B to B 電子商務發展的哪一個階段?(單選)
A
.
(A) 電子資料交換
B
.
(B) 基本的電子商務
C
.
(C) 電子交易市集
D
.
(D) 協同商務
正確答案: C
2.「eBay 拍賣網站」屬於哪一種電子商務模式?[單選]
A
.
B2B
B
.
B2C
C
.
C2C
D
.
P2P
正確答案: D
3.20) Which
of the following are specialized computers that transmit message parcels along
available Internet communication paths and on to their destinations?
A
.
A)
routers
B
.
B) Web
servers
C
.
C) IP
servers
D
.
D)
packet servers
正確答案: A
4.在線上以物?物的方式進?交?,是屬於電子商務中的何種經營模式?[單選]
A
.
充足的信任機制
B
.
易用的網站功能
C
.
特殊的使用經驗
D
.
便捷的運送服務
正確答案: D
5.51)
Which of the following standards provide for high-speed short-range Wi-Fi?
A
.
A) WiGig
B
.
B) WiMax
C
.
C)
Bluetooth
D
.
D) Wi-Fi
6
正確答案: A
6.26)
Which of the following protocols enables the exchange of routing information
among different autonomous systems on the Internet?
A
.
A) HTTP
B
.
B) BGP
C
.
C) FTP
D
.
D) SMTP
正確答案: B
7.2. 在電子商務的交易模式中,若由買方彼此競價,出價最高者就贏得這項商務交易,這是屬於?(單選)
A
.
(A) 需求整合式價格
B
.
(B) 目錄式價格
C
.
(C) 拍賣式價格
D
.
(D) 逆拍賣式價格
正確答案: C
8.由消費者與消費者進行交易,在電子商務中屬於何種經營模式?[單選]
A
.
B2B
B
.
B2C
C
.
C2C
D
.
P2P
正確答案: C
9.52)
All of the following are involved in the effort to create standards for IoT
except:
A
.
A)
AllSeen Alliance.
B
.
B)
Industrial Internet Consortium.
C
.
C) Open
Connectivity Foundation.
D
.
D) W3C.
正確答案: D
10.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]
A
.
商業自動化
B
.
電子商業
C
.
電子商務
D
.
協同產品商務
正確答案: D
11.43) The
________ is a consortium of corporations, government agencies, and nonprofit
organizations that monitors Internet policies and practices.
A
.
A)
Internet Engineering Steering Group (IESG)
B
.
B) World
Wide Web Consortium (W3C)
C
.
C) Internet
Engineering Task Force (IETF)
D
.
D)
Internet Society (ISOC)
正確答案: D
12.10. 在電子商務的課程中,老師告訴大家在進行網路交易的時候要多方比較與分析、再次確認與詢問、確認網址與連結,請問老師正在教什麼?(單選)
A
.
(A) C to
C 網路交易模式效益
B
.
(B) C to
C 網路分享模式的過程
C
.
(C) C to
C 網路交易模式的詐騙與防止
D
.
(D) C to
C 網路交易模式的概念
正確答案: C
13.22)
Which of the following is not a basic type of cloud computing service?
A
.
A) IaaS
B
.
B) PaaS
C
.
C) SaaS
D
.
D) FiOS
正確答案: D
14.43) The
________ is a consortium of corporations, government agencies, and nonprofit
organizations that monitors Internet policies and practices.
A
.
A)
Internet Engineering Steering Group (IESG)
B
.
B) World
Wide Web Consortium (W3C)
C
.
C)
Internet Engineering Task Force (IETF)
D
.
D)
Internet Society (ISOC)
正確答案: D
15.44)
The ________ helps define the overall structure of the Internet.
A
.
A) IAB
B
.
B) IESG
C
.
C) W3C
D
.
D) ITU
正確答案: A
16.50) The
major technologies used with wireless local area networks are:
A
.
A) Wi-Fi
and Bluetooth.
B
.
B) Wi-Fi
and WiMax.
C
.
C)
Bluetooth and 3G.
D
.
D) WiMax
and 3G.
正確答案: A
17.48)
Which of the following is Google hoping to use to provide Internet access to
remote parts of the world?
A
.
A)
unused, low-powered television channels
B
.
B)
high-altitude balloons
C
.
C) WLANs
D
.
D) EDI
正確答案: B
18.8) The
Internet Layer of TCP/IP is responsible for which of the following?
A
.
A)
placing packets on and receiving them from the network medium
B
.
B)
addressing, packaging, and routing messages
C
.
C)
providing communication with the application by acknowledging and sequencing
the packets to and from the application
D
.
D)
providing a variety of applications with the ability to access the services of
the lower layers
正確答案: B
19.37)
Which of the following organizations focuses on the evolution of the Internet?
A
.
A) IRTF
B
.
B) ISOC
C
.
C) W3C
D
.
D) ICANN
正確答案: A
20.球球除了發表自己對行銷議題的看法之外,還會放一些有趣的行銷廣告影片,只要在影片下面留言「行銷創意,球球最夠力」並發布到自己的塗鴉牆,就有機會獲得電影票一張。請問這是C to C網路分享模式過程中的哪一個階段?[單選]
A
.
結構性溝通層級
B
.
非結構性溝通層級
C
.
商務交?中心層級
D
.
知?/?程交?中心層級
正確答案: A
21.72)
Which of the following was the first to launch an intelligent digital
assistant?
A
.
A)
Facebook
B
.
B) Apple
C
.
C)
Amazon
D
.
D)
Google
正確答案: B
22.24)
Which of the following was the original purpose of the Internet?
A
.
A) to provide
a network that would allow businesses to connect with consumers
B
.
B) to
link large mainframe computers on different college campuses
C
.
C) to
develop a military communications system that could withstand nuclear war
D
.
D) to
enable government agencies to track civilian communications
正確答案: B
23.23)
Which of the following are central directories that list all domain names
currently in use for specific domains?
A
.
A) Web
servers
B
.
B) root
servers
C
.
C)
client servers
D
.
D) DNS
servers
正確答案: B
24.21)
Which of the following is a set of rules for transferring data?
A
.
A)
protocol
B
.
B)
packet
C
.
C)
router
D
.
D) IP
address
正確答案: A
25.15)
Where does TLS operate within TCP/IP?
A
.
A) between
the Internet Layer and the Transport Layer
B
.
B)
between the Transport Layer and the Application Layer
C
.
C)
between the Network Interface Layer and the Transport Layer
D
.
D)
between the Internet Layer and the Application Layer
正確答案: B
26.在經營傳統的B to C商務時,首先要思考的是?[單選] 回答錯誤
A
.
產品
B
.
價格
C
.
區位
D
.
顧客經驗
正確答案: C
27.27)
In the United States, about ________ of Internet traffic now occurs over
Internet Protocol version 6 (IPv6). 回答錯誤
A
.
A) 10%
B
.
B) 15%
C
.
C) 45%
D
.
D) 65%
正確答案: C
28.73) Which
of the following enables Internet users to communicate with each other,
although not in real time?
A
.
A)
mobile messaging
B
.
B)
online forum
C
.
C) SMS
messaging
D
.
D) VoIP
正確答案: B
29.48) Which
of the following is Google hoping to use to provide Internet access to remote
parts of the world?
A
.
A)
unused, low-powered television channels
B
.
B)
high-altitude balloons
C
.
C) WLANs
D
.
D) EDI
正確答案: B
30.38)
TCP/IP operates in which layer of Internet architecture?
A
.
A)
Network Technology Substrate layer
B
.
B)
Middleware Services layer
C
.
C)
Transport Services and Representation Standards layer
D
.
D)
Applications layer
正確答案: C
31.24) Which
of the following was the original purpose of the Internet?
A
.
A) to
provide a network that would allow businesses to connect with consumers
B
.
B) to
link large mainframe computers on different college campuses
C
.
C) to
develop a military communications system that could withstand nuclear war
D
.
D) to
enable government agencies to track civilian communications
正確答案: B
32.76)
The protocol that enables the transmission of voice and other forms of audio
communication over the Internet is called:
A
.
A) VoIP.
B
.
B) IPTP.
C
.
C) VTP.
D
.
D) IP.
正確答案: A
33.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]
A
.
商業自動化
B
.
電子商業
C
.
電子商務
D
.
協同產品商務
正確答案: D
34.阿源第一次利用博客來買書,在準備購買的時候,看到上面清楚的購買流程圖讓他順利買到他想要的書,請問博客來這樣的設計符合 B to C電子商務網站維持因素的哪一個?[單選]
A
.
良好功能
B
.
瀏覽器開啟
C
.
資訊化
D
.
相關指引
正確答案: D
35.根據Goldman Sachs對於協同商務層級的分類,由低至高排序為下列何者?[單選]
A
.
線上學習
B
.
線上團購
C
.
線上購物
D
.
線上拍賣
正確答案: B
36.63)
The first web browser to make it possible to view documents on the Web with
colored background, images, and animations was:
A
.
A)
Netscape Navigator.
B
.
B)
Mosaic.
C
.
C)
Mozilla.
D
.
D)
Internet Explorer.
正確答案: B
37.在線上以物易物的方式進行交易,在電子商務中屬於何種經營模式?[單選] 回答錯誤
A
.
People
to People
B
.
Peer to
Peer
C
.
People
to Peer
D
.
Peer to
People
正確答案: D
38.阿翔是個3C愛好者,於是常常上MOBILE01討論,請問MOBILE01的出現是來自虛擬社群互動基礎的哪一項?[單選]
A
.
多品牌服務
B
.
交流管道
C
.
交易機制
D
.
創造價值
正確答案: D
39.台灣銀行在民國86年1月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]
A
.
電子資料交換
B
.
基本的電子商務
C
.
電子交易市集
D
.
協同商務
正確答案: A
40.28)
The term latency refers to a delay that can be experienced in packet-switched
networks.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
41.29)
Edge computing improves response time and saves bandwidth.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
42.30) A
private cloud is operated for the benefit of multiple firms.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
43.84) The
only way apps can be purchased is via either the Apple App Store or from Google
Play.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
44.55)
T1 and T3 refer to international telephone standards for digital communication.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
45.31)
Amazon Web Services is an example of a private cloud.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
46.78)
About 75% of U.S. smart speaker users make voice-based purchases using those
devices.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
47.59)
WLAN-based Internet access derives from the same technological foundations as
telephone-based wireless Internet access.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
48.32)
HTTP/2 is supported by almost all the leading web browsers.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
49.55)
T1 and T3 refer to international telephone standards for digital communication.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
50.57)
Tier 1 ISPs provide Internet access to consumers and businesses.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
1.1) During
which period of time did the Institutionalization phase of Internet development
take place?
A
.
A)
1950-1960
B
.
B)
1961-1974
C
.
C)
1975-1995
D
.
D) 1995
to the present
正確答案: C
2.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]
A
.
商業自動化
B
.
電子商業
C
.
電子商務
D
.
協同產品商務
正確答案: D
3.14)
Which of the following protocols is used to send mail to a server?
A
.
A) SMTP
B
.
B) FTP
C
.
C) HTTP
D
.
D) SSL
正確答案: A
4.台塑網出現後可與兩岸相關企業進行交易行為,不用另外以電話或傳真進行通知,減少採購人員的負擔,這是屬交易平台主要功能的哪一項?[單選] 回答錯誤
A
.
提供交易管理
B
.
豐富的比價機制
C
.
簡化買賣流程
D
.
創造收益利潤
正確答案: D
5.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]
A
.
商業自動化
B
.
電子商業
C
.
電子商務
D
.
協同產品商務
正確答案: D
6.Morgan
Stanley 認為B2B 電子商務的演進可分為四個發展階段,下列排序何者正確?[單選]
A
.
電子資料交換(EDI)→電子交易市集→基礎的電子商務→協同商務
B
.
電子資料交換(EDI)→協同商務→基礎的電子商務→電子交易市集
C
.
電子資料交換(EDI)→基礎的電子商務→協同商務→電子交易市集
D
.
電子資料交換(EDI)→基礎的電子商務→電子交易市集→協同商務
正確答案: D
7.63) The
first web browser to make it possible to view documents on the Web with colored
background, images, and animations was:
A
.
A)
Netscape Navigator.
B
.
B)
Mosaic.
C
.
C)
Mozilla.
D
.
D)
Internet Explorer.
正確答案: B
8.83)
Applications for Android operating system-based smartphones are typically
written in which of the following?
A
.
A) Swift
B
.
B) Java
C
.
C) ActiveX
D
.
D) ColdFusion
正確答案: B
9.根據Goldman Sachs對於協同商務層級的分類,由低至高排序為下列何者?[單選]
A
.
線上學習
B
.
線上團購
C
.
線上購物
D
.
線上拍賣
正確答案: B
10.20) Which
of the following are specialized computers that transmit message parcels along
available Internet communication paths and on to their destinations?
A
.
A)
routers
B
.
B) Web
servers
C
.
C) IP
servers
D
.
D)
packet servers
正確答案: A
11.2. 在電子商務的交易模式中,若由買方彼此競價,出價最高者就贏得這項商務交易,這是屬於?(單選)
A
.
(A) 需求整合式價格
B
.
(B) 目錄式價格
C
.
(C) 拍賣式價格
D
.
(D) 逆拍賣式價格
正確答案: C
12.38)
TCP/IP operates in which layer of Internet architecture?
A
.
A)
Network Technology Substrate layer
B
.
B) Middleware
Services layer
C
.
C)
Transport Services and Representation Standards layer
D
.
D)
Applications layer
正確答案: C
13.阿證最近發現某茶飲的廣告;「只要來店消費就會給予一組序號,憑序號再到Facebook按讚,就有機會獲得電影票一張。」請問這屬於C to C網路交易模式效益的哪一項?[單選]
A
.
虛構的高評價
B
.
設立釣魚網頁
C
.
縮短交易時間
D
.
提供錯誤資訊
正確答案: D
14.Morgan
Stanley 認為B2B 電子商務的演進可分為四個發展階段,下列排序何者正確?[單選]
A
.
電子資料交換(EDI)→電子交易市集→基礎的電子商務→協同商務
B
.
電子資料交換(EDI)→協同商務→基礎的電子商務→電子交易市集
C
.
電子資料交換(EDI)→基礎的電子商務→協同商務→電子交易市集
D
.
電子資料交換(EDI)→基礎的電子商務→電子交易市集→協同商務
正確答案: D
15.阿翔是個3C愛好者,於是常常上MOBILE01討論,請問MOBILE01的出現是來自虛擬社群互動基礎的哪一項?[單選]
A
.
多品牌服務
B
.
交流管道
C
.
交易機制
D
.
創造價值
正確答案: D
16.37)
Which of the following organizations focuses on the evolution of the Internet?
A
.
A) IRTF
B
.
B) ISOC
C
.
C) W3C
D
.
D) ICANN
正確答案: A
17.45) Which
of the following is not true about the mobile platform?
A
.
A) Most
smartphones use Intel chips.
B
.
B)
Smartphones and tablet computers are the primary means to access the Internet, both
in the United States and worldwide.
C
.
C) Most
smartphones use either Google's Android or Apple's iOS operating systems.
D
.
D)
Smartphones use flash memory chips.
正確答案: A
18.由消費者與消費者進行交易,在電子商務中屬於何種經營模式?[單選]
A
.
B2B
B
.
B2C
C
.
C2C
D
.
P2P
正確答案: C
19.27)
In the United States, about ________ of Internet traffic now occurs over
Internet Protocol version 6 (IPv6).
A
.
A) 10%
B
.
B) 15%
C
.
C) 45%
D
.
D) 65%
正確答案: C
20.9. 阿斌是 Apple 的瘋狂粉絲,在 iPad mini 尚未在台灣上市時,就透過拍賣網站先買到,請問這是屬於 C to C 網路交易模式帶來的何種效益?(單選)
A
.
(A) 獲利性
B
.
(B) 特殊性
C
.
(C) 低價性
D
.
(D) 流動性
正確答案: B
21.77)
Snapchat’s Lenses feature is an example of which of the following?
A
.
A)
artificial digital assistant
B
.
B)
virtual reality
C
.
C)
augmented reality
D
.
D) mixed
reality
正確答案: C
22.10. 在電子商務的課程中,老師告訴大家在進行網路交易的時候要多方比較與分析、再次確認與詢問、確認網址與連結,請問老師正在教什麼?(單選)
A
.
(A) C to
C 網路交易模式效益
B
.
(B) C to
C 網路分享模式的過程
C
.
(C) C to
C 網路交易模式的詐騙與防止
D
.
(D) C to
C 網路交易模式的概念
正確答案: C
23.4. 台塑透過台塑網提高台塑集團採購、工程發包、原料標售系統與庫存管理等作業效率,進而提升台塑集團的競爭力。請問台塑網的發展屬於 B to B 電子商務發展的哪一個階段?(單選)
A
.
(A) 電子資料交換
B
.
(B) 基本的電子商務
C
.
(C) 電子交易市集
D
.
(D) 協同商務
正確答案: C
24.老陳是美國影集的愛好者,常到以物易物網和其他人交換自己喜愛的影集,請問以物易物網是屬於C to C商務模式的哪一種?[單選]
A
.
競標過程
B
.
註冊使用
C
.
後續活動
D
.
上架交易
正確答案: A
25.21)
Which of the following is a set of rules for transferring data?
A
.
A)
protocol
B
.
B)
packet
C
.
C)
router
D
.
D) IP
address
正確答案: A
26.7. 阿任很想買一台 New iPad,為了以較優惠的價格買到,於是到殺價王和其他消費者競標,在這裡,以唯一最低出價者得標,請問此概念類似下列哪種拍賣模式?(單選)
A
.
(A) 英式拍賣
B
.
(B) 美式拍賣
C
.
(C) 義式拍賣
D
.
(D) 荷式拍賣
正確答案: D
27.51)
Which of the following standards provide for high-speed short-range Wi-Fi?
A
.
A) WiGig
B
.
B) WiMax
C
.
C) Bluetooth
D
.
D) Wi-Fi
6
正確答案: A
28.8. 不小心弄壞小仙耳機的阿光,到 Yahoo!奇摩拍賣尋找賣方,因為怕買到水貨,他都會注意每位賣方的評價,請問阿光正在 C to C 網路交易模式的哪一個過程?(單選) 回答錯誤
A
.
(A) 競標過程
B
.
(B) 註冊使用
C
.
(C) 後續活動
D
.
(D) 上架交易
正確答案: A
29.台灣銀行在民國86年1月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]
A
.
電子資料交換
B
.
基本的電子商務
C
.
電子交易市集
D
.
協同商務
正確答案: A
30.小安是個愛寫小說的人,以下哪個社會網絡服務網站較不適合他?[單選] 回答錯誤
A
.
分享期
B
.
互動期
C
.
準備期
D
.
商務期
正確答案: B
31.23) Which
of the following are central directories that list all domain names currently
in use for specific domains?
A
.
A) Web
servers
B
.
B) root
servers
C
.
C)
client servers
D
.
D) DNS
servers
正確答案: B
32.「台塑網」屬於Morgan Stanley 電子市集經營模式中的哪一種?[單選]
A
.
由買方建? (Buy-managed) 電子市集
B
.
由賣方建?
(Supplier-managed) 電子市集
C
.
公開市集 (Marker Markets)
D
.
內容整合 (Content
Aggregator) 電子市集
正確答案: A
33.65)
You could expect to find all of the following services in a web server software
package except:
A
.
A)
security services.
B
.
B) FTP.
C
.
C)
search engine.
D
.
D) an
RSS aggregator.
正確答案: D
34.P&G與Wal-Mart建立分享資訊機制,讓P&G每天由Wal-Mart蒐集銷售資訊,藉此管理在Wal-Mart的存貨。請問這是屬於協同商務四大領域中的哪一種?[單選]
A
.
供應鏈管理
B
.
顧客關係管理
C
.
企業資源規劃
D
.
關係強度預測
正確答案: B
35.48) Which
of the following is Google hoping to use to provide Internet access to remote
parts of the world?
A
.
A)
unused, low-powered television channels
B
.
B)
high-altitude balloons
C
.
C) WLANs
D
.
D) EDI
正確答案: B
36.將傳統拍賣方式轉換到網際網路上來進行 ,此模式稱為?[單選] 回答錯誤
A
.
銷售通路者
B
.
市場製造者
C
.
交易服務者
D
.
市場利基者
正確答案: D
37.在經營傳統的B to C商務時,首先要思考的是?[單選]
A
.
產品
B
.
價格
C
.
區位
D
.
顧客經驗
正確答案: C
38.44)
The ________ helps define the overall structure of the Internet.
A
.
A) IAB
B
.
B) IESG
C
.
C) W3C
D
.
D) ITU
正確答案: A
39.73) Which
of the following enables Internet users to communicate with each other,
although not in real time?
A
.
A)
mobile messaging
B
.
B)
online forum
C
.
C) SMS
messaging
D
.
D) VoIP
正確答案: B
40.55)
T1 and T3 refer to international telephone standards for digital communication.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
41.28)
The term latency refers to a delay that can be experienced in packet-switched
networks.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
42.31)
Amazon Web Services is an example of a private cloud.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
43.30) A
private cloud is operated for the benefit of multiple firms.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
44.29) Edge
computing improves response time and saves bandwidth.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
45.32)
HTTP/2 is supported by almost all the leading web browsers.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
46.57)
Tier 1 ISPs provide Internet access to consumers and businesses.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
47.59)
WLAN-based Internet access derives from the same technological foundations as
telephone-based wireless Internet access.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
48.55) T1
and T3 refer to international telephone standards for digital communication.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
49.78)
About 75% of U.S. smart speaker users make voice-based purchases using those
devices.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
50.84) The
only way apps can be purchased is via either the Apple App Store or from Google
Play.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
1.P&G與Wal-Mart建立分享資訊機制,讓P&G每天由Wal-Mart蒐集銷售資訊,藉此管理在Wal-Mart的存貨。請問這是屬於協同商務四大領域中的哪一種?[單選]
A
.
供應鏈管理
B
.
顧客關係管理
C
.
企業資源規劃
D
.
關係強度預測
正確答案: B
2.7. 阿任很想買一台 New iPad,為了以較優惠的價格買到,於是到殺價王和其他消費者競標,在這裡,以唯一最低出價者得標,請問此概念類似下列哪種拍賣模式?(單選)
A
.
(A) 英式拍賣
B
.
(B) 美式拍賣
C
.
(C) 義式拍賣
D
.
(D) 荷式拍賣
正確答案: D
3.74) Which
of the following is not a mobile messaging application?
A
.
A) Kik
B
.
B)
WhatsApp
C
.
C) Viber
D
.
D)
Feedly
正確答案: D
4.43)
The ________ is a consortium of corporations, government agencies, and
nonprofit organizations that monitors Internet policies and practices.
A
.
A)
Internet Engineering Steering Group (IESG)
B
.
B) World
Wide Web Consortium (W3C)
C
.
C)
Internet Engineering Task Force (IETF)
D
.
D)
Internet Society (ISOC)
正確答案: D
5.24)
Which of the following was the original purpose of the Internet?
A
.
A) to
provide a network that would allow businesses to connect with consumers
B
.
B) to
link large mainframe computers on different college campuses
C
.
C) to
develop a military communications system that could withstand nuclear war
D
.
D) to
enable government agencies to track civilian communications
正確答案: B
6.Morgan
Stanley 認為B2B 電子商務的演進可分為四個發展階段,下列排序何者正確?[單選]
A
.
電子資料交換(EDI)→電子交易市集→基礎的電子商務→協同商務
B
.
電子資料交換(EDI)→協同商務→基礎的電子商務→電子交易市集
C
.
電子資料交換(EDI)→基礎的電子商務→協同商務→電子交易市集
D
.
電子資料交換(EDI)→基礎的電子商務→電子交易市集→協同商務
正確答案: D
7.5) The
process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the
destination point is called:
A
.
A)
routing.
B
.
B)
hyperlinking.
C
.
C)
packet switching.
D
.
D)
transporting.
正確答案: C
8.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]
A
.
人際關係
B
.
交易
C
.
幻想
D
.
興趣
正確答案: D
9.51) Which
of the following standards provide for high-speed short-range Wi-Fi?
A
.
A) WiGig
B
.
B) WiMax
C
.
C)
Bluetooth
D
.
D) Wi-Fi
6
正確答案: A
10.在線上以物易物的方式進行交易,在電子商務中屬於何種經營模式?[單選]
A
.
People
to People
B
.
Peer to
Peer
C
.
People
to Peer
D
.
Peer to People
正確答案: D
11.16)
Which of the following statements about cloud computing is not true?
A
.
A) A
public cloud is typically used by companies with stringent privacy and security
requirements.
B
.
B)
Dropbox is an example of a public cloud.
C
.
C)
Hybrid clouds offer both public and private cloud options.
D
.
D) A
private cloud may be hosted internally or externally.
正確答案: A
12.45)
Which of the following is not true about the mobile platform?
A
.
A) Most
smartphones use Intel chips.
B
.
B)
Smartphones and tablet computers are the primary means to access the Internet,
both in the United States and worldwide.
C
.
C) Most smartphones
use either Google's Android or Apple's iOS operating systems.
D
.
D)
Smartphones use flash memory chips.
正確答案: A
13.阿證最近發現某茶飲的廣告;「只要來店消費就會給予一組序號,憑序號再到Facebook按讚,就有機會獲得電影票一張。」請問這屬於C to C網路交易模式效益的哪一項?[單選]
A
.
虛構的高評價
B
.
設立釣魚網頁
C
.
縮短交易時間
D
.
提供錯誤資訊
正確答案: D
14.77)
Snapchat’s Lenses feature is an example of which of the following?
A
.
A)
artificial digital assistant
B
.
B)
virtual reality
C
.
C)
augmented reality
D
.
D) mixed
reality
正確答案: C
15.將企業由內至外之所有資源如企業資源規劃(ERP)、供應鏈管理(SCM)、顧客關係管理(CRM)等整合起來以達企業分享知識及經驗之效果,是下列何者的定義?[單選]
A
.
商業自動化
B
.
電子商業
C
.
電子商務
D
.
協同產品商務
正確答案: D
16.73)
Which of the following enables Internet users to communicate with each other,
although not in real time?
A
.
A)
mobile messaging
B
.
B)
online forum
C
.
C) SMS
messaging
D
.
D) VoIP
正確答案: B
17.23)
Which of the following are central directories that list all domain names
currently in use for specific domains?
A
.
A) Web
servers
B
.
B) root
servers
C
.
C)
client servers
D
.
D) DNS
servers
正確答案: B
18.B to
B交易平台的出現可以讓整個交易過程更為簡化、快速,這是考慮到哪一個因素?[單選] 回答錯誤
A
.
儘早市場卡位
B
.
策略聯盟夥伴
C
.
專業管理能力
D
.
建立聲望與信任
正確答案: B
19.83)
Applications for Android operating system-based smartphones are typically
written in which of the following?
A
.
A) Swift
B
.
B) Java
C
.
C) ActiveX
D
.
D) ColdFusion
正確答案: B
20.老陳是美國影集的愛好者,常到以物易物網和其他人交換自己喜愛的影集,請問以物易物網是屬於C to C商務模式的哪一種?[單選]
A
.
競標過程
B
.
註冊使用
C
.
後續活動
D
.
上架交易
正確答案: A
21.台塑網出現後可與兩岸相關企業進行交易行為,不用另外以電話或傳真進行通知,減少採購人員的負擔,這是屬交易平台主要功能的哪一項?[單選]
A
.
提供交易管理
B
.
豐富的比價機制
C
.
簡化買賣流程
D
.
創造收益利潤
正確答案: D
22.8)
The Internet Layer of TCP/IP is responsible for which of the following?
A
.
A)
placing packets on and receiving them from the network medium
B
.
B)
addressing, packaging, and routing messages
C
.
C)
providing communication with the application by acknowledging and sequencing
the packets to and from the application
D
.
D)
providing a variety of applications with the ability to access the services of
the lower layers
正確答案: B
23.Morgan
Stanley 認為B2B 電子商務的演進可分為四個發展階段,下列排序何者正確?[單選]
A
.
電子資料交換(EDI)→電子交易市集→基礎的電子商務→協同商務
B
.
電子資料交換(EDI)→協同商務→基礎的電子商務→電子交易市集
C
.
電子資料交換(EDI)→基礎的電子商務→協同商務→電子交易市集
D
.
電子資料交換(EDI)→基礎的電子商務→電子交易市集→協同商務
正確答案: D
24.Morgan
Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選]
A
.
吸引人潮
B
.
發展交易
C
.
匯聚人潮
D
.
獲得錢潮
正確答案: C
25.9. 阿斌是 Apple 的瘋狂粉絲,在 iPad mini 尚未在台灣上市時,就透過拍賣網站先買到,請問這是屬於 C to C 網路交易模式帶來的何種效益?(單選)
A
.
(A) 獲利性
B
.
(B) 特殊性
C
.
(C) 低價性
D
.
(D) 流動性
正確答案: B
26.由消費者與消費者進行交易,在電子商務中屬於何種經營模式?[單選]
A
.
B2B
B
.
B2C
C
.
C2C
D
.
P2P
正確答案: C
27.台灣銀行在民國86年1月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]
A
.
電子資料交換
B
.
基本的電子商務
C
.
電子交易市集
D
.
協同商務
正確答案: A
28.「eBay 拍賣網站」屬於哪一種電子商務模式?[單選]
A
.
B2B
B
.
B2C
C
.
C2C
D
.
P2P
正確答案: D
29.52)
All of the following are involved in the effort to create standards for IoT
except:
A
.
A)
AllSeen Alliance.
B
.
B)
Industrial Internet Consortium.
C
.
C) Open Connectivity
Foundation.
D
.
D) W3C.
正確答案: D
30.54)
Microsoft's pilot program to provide broadband Internet access to rural areas
uses which of the following technologies?
A
.
A)
satellites
B
.
B)
drones
C
.
C)
unused, low-powered television channels
D
.
D)
high-altitude balloons
正確答案: C
31.72)
Which of the following was the first to launch an intelligent digital
assistant?
A
.
A)
Facebook
B
.
B) Apple
C
.
C)
Amazon
D
.
D)
Google
正確答案: B
32.8)
The Internet Layer of TCP/IP is responsible for which of the following?
A
.
A)
placing packets on and receiving them from the network medium
B
.
B)
addressing, packaging, and routing messages
C
.
C)
providing communication with the application by acknowledging and sequencing
the packets to and from the application
D
.
D)
providing a variety of applications with the ability to access the services of
the lower layers
正確答案: B
33.21)
Which of the following is a set of rules for transferring data?
A
.
A)
protocol
B
.
B)
packet
C
.
C)
router
D
.
D) IP
address
正確答案: A
34.在線上以物?物的方式進?交?,是屬於電子商務中的何種經營模式?[單選]
A
.
充足的信任機制
B
.
易用的網站功能
C
.
特殊的使用經驗
D
.
便捷的運送服務
正確答案: D
35.72)
Which of the following was the first to launch an intelligent digital
assistant?
A
.
A)
Facebook
B
.
B) Apple
C
.
C)
Amazon
D
.
D)
Google
正確答案: B
36.拍賣網站提供消費者雙方標售二手商品,在電子商務中屬於何種經營模式?[單選]
A
.
B2C
B
.
B2B
C
.
C2B
D
.
C2C
正確答案: C
37.小安是個愛寫小說的人,以下哪個社會網絡服務網站較不適合他?[單選]
A
.
分享期
B
.
互動期
C
.
準備期
D
.
商務期
正確答案: B
38.48)
Which of the following is Google hoping to use to provide Internet access to
remote parts of the world?
A
.
A) unused,
low-powered television channels
B
.
B)
high-altitude balloons
C
.
C) WLANs
D
.
D) EDI
正確答案: B
39.老陳是美國影集的愛好者,常到以物易物網和其他人交換自己喜愛的影集,請問以物易物網是屬於C to C商務模式的哪一種?[單選]
A
.
競標過程
B
.
註冊使用
C
.
後續活動
D
.
上架交易
正確答案: A
40.84) The
only way apps can be purchased is via either the Apple App Store or from Google
Play.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
41.28)
The term latency refers to a delay that can be experienced in packet-switched
networks.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
42.32)
HTTP/2 is supported by almost all the leading web browsers.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
43.31)
Amazon Web Services is an example of a private cloud.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
44.59)
WLAN-based Internet access derives from the same technological foundations as
telephone-based wireless Internet access.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
45.78)
About 75% of U.S. smart speaker users make voice-based purchases using those
devices.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
46.30) A
private cloud is operated for the benefit of multiple firms.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
47.29)
Edge computing improves response time and saves bandwidth.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
48.55) T1
and T3 refer to international telephone standards for digital communication.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
49.55) T1
and T3 refer to international telephone standards for digital communication.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
50.57)
Tier 1 ISPs provide Internet access to consumers and businesses.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
-----------
During
which period of time did the Institutionalization phase of Internet development
take place?
A)
1950-1960
B)
1961-1974
C)
1975-1995
D)
1995-through the present
C
Which of
the following occurred during the Commercialization phase of Internet
development?
A) The
fundamental building blocks of the Internet were realized in actual hardware
and software.
B)
Personal computers were invented.
C) The
Domain Name System (DNS) was introduced.
D) NSF privatized
the operation of the Internet's backbone.
D
During
which phase of the development of the Internet was the Domain Name System (DNS)
introduced?
A)
Commercialization
B)
Institutional
C)
Innovation
D)
Consolidation
B
Which of
the following is not one of the basic technological foundations of the
Internet?
A)
client/server computing
B) FTP
C)
TCP/IP
D)
packet switching
B
The
process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the
destination point is called:
A)
routing.
B) the
Transmission Control Protocol (TCP).
C)
packet switching.
D) the
File Transfer Protocol (FTP).
C
Which of
the following is the core communications protocol for the Internet?
A)
Telnet
B) FTP
C)
TCP/IP
D) TLS
C
The
________ allows a natural language expression, such as Google.com, to represent
a numeric IP address.
A)
uniform resource locator system
B)
Internet protocol addressing schema
C)
domain name system
D) assigned
numbers and names system
C
The
address used by a browser to identify the location of content on the Web is
called:
A) a
domain name.
B) a
uniform resource locator.
C) an IP
address.
D) a
file path.
B
12)
Which of the following is not an advantage of client/server computing over
centralized mainframe computing?
A) It is
easy to expand capacity by adding servers and clients.
B) Each
client added to the network increases the network's overall capacity and
transmission speeds.
C)
Client/server networks are less vulnerable, in part because the processing load
is balanced over many powerful smaller computers rather than concentrated in a
single huge computer.
D) There
is less risk that a system will completely malfunction because backup or mirror
servers can pick up the slack if one server goes down.
B
________
is a model of computing in that computer processing, storage, software, and
other services are provided as a shared pool of virtualized resources over the
Internet.
A)
Client/server computing
B) P2P
computing
C)
Mobile computing
D) Cloud
computing
D
Which of
the following statements about cloud computing is not true?
A) A
public cloud is typically used by companies with stringent privacy and security
requirements.
B)
Dropbox is an example of a public cloud.
C)
Hybrid clouds offer both public and private cloud options.
D) A
private cloud hosted internally or externally.
A
________
is used to allow remote login on another computer.
A)
Telnet
B) FTP
C) HTTP
D) SSL
A
________
is a utility program that allows you to check the connection between your
client and a TCP/IP network.
A) Ping
B)
Telnet
C)
Tracert
D)
Finger
A
Which of
the following technologies has enabled the Internet to grow exponentially to
support millions of users, without overloading the network architecture?
A) fiber
optics
B) Wi-Fi
C) IPv6
D)
client/server computing
D
Which of
the following are specialized computers that transmit message parcels along
available Internet communication paths and on to their destinations?
A)
routers
B) web
servers
C) IP
servers
D)
packet servers
A
Which of
the following is a set of rules for transferring data?
A)
protocol
B)
packet
C)
router
D) IP
address
A
Which of
the following is not a basic type of cloud computing service?
A) IaaS
B) PaaS
C) SaaS
D) FiOS
D
Which of
the following was the original purpose of the Internet?
A) to
provide a network that would allow businesses to connect with consumers
B) to
link large mainframe computers on different college campuses
C) to
develop military communications systems that could withstand nuclear war
D) to
enable government agencies to track civilian communications
B
When
talking about the physical elements of the Internet, the term redundancy refers
to:
A)
transmitting multiple copies of a single packet to safeguard against data loss.
B) the
use of tiered high-speed switching computers to connect the backbone to
regional and local networks.
C)
delays in messages caused by the uneven flow of information through the
network.
D)
multiple duplicate devices and paths in a network built so that data can be
rerouted if a breakdown occurs.
D
The
________ is a consortium of corporations, government agencies, and nonprofit
organizations that monitors Internet policies and practices.
A)
Internet Engineering Steering Group (IESG)
B) World
Wide Web Consortium (W3C)
C)
Internet Engineering Task Force (IETF)
D)
Internet Society (ISOC)
D
Which of
the following is not true about the mobile platform?
A) Most
smartphones use Intel chips.
B) The
number of cell phones worldwide exceeds the number of PCs.
C) Over
a third of the world's cell phones are smartphones.
D)
Smartphones use flash memory chips.
A
Which of
the following is not a concern about IoT?
A) the
high cost of sensors
B) interoperability
C)
security
D)
privacy
A
What
type of Internet access technology are Google and Facebook hoping to use to
provide Internet access to remote parts of the world?
A)
Bluetooth
B)
drones
C) WLANs
D) DSL
B
Which of
the following is not a limitation of the current Internet?
A) the
continued reliance on cables and wires for connectivity
B)
limited bandwidth, which causes congestion and cannot adequately handle video
and voice traffic
C)
architectural restrictions, which stipulate that numerous requests for the same
file must each be answered individually, slowing network performance
D) the
difficulty in expanding capacity by adding servers and clients
D
Which of
the following statements about fiber-optic cable is not true?
A) It
transmits more data at faster speeds than coaxial or twisted pair cable.
B) It is
thinner and lighter than coaxial or twisted pair cable.
C) As of
2016, a majority of U.S. homes have fiber connections.
D)
Telecommunications firms have made substantial investments in cross-country
fiber optic systems in the last decade.
C
The
major technologies used with wireless local area networks are:
A) Wi-Fi
and Bluetooth.
B) Wi-Fi
and WiMax.
C)
Bluetooth and 3G.
D) WiMax
and 3G.
A
Which of
the following refers to delays in messages caused by the uneven flow of
information packets through the network?
A)
redundancy
B)
latency
C) Net
neutrality
D) QOS
B
What
country intends to be the first to use Project Loon to provide universal
Internet access?
A) New
Zealand
B) Sri
Lanka
C) Ghana
D)
Australia
B
The
first web browser to make it possible to view documents on the Web with colored
background, images, and animations was:
A)
Netscape Navigator.
B)
Mosaic.
C) Mozilla.
D) Internet Explorer.
B
In the
address http://www.company.com/clients.html, which of the following is the
top-level domain?
A) .com
B)
company.com
C) www
D) http
A
You
could expect to find the following services in a web server software package
except:
A)
security services.
B) FTP.
C)
search engine.
D) an
RSS aggregator.
D
Which of
the following is currently the most popular web browser?
A)
Internet Explorer
B)
Safari
C)
Chrome
D)
Firefox
C
Cortana
is a type of:
A)
intelligent personal assistant.
B)
widget.
C)
gadget.
D) social
network.
A
Which of
the following enables Internet users to communicate with each other, although
not in real time?
A)
mobile messaging
B)
online forum
C) SMS
messaging
D) VoIP
B
Which of
the following is not a mobile messaging application?
A) Kik
B)
WhatsApp
C) Viber
D)
Feedly
D
A(n)
________ allows users to easily add and edit content on a web page.
A) wiki
B)
podcast
C) blog
D) RSS
feed
A
The protocol
that enables the transmission of voice and other forms of audio communication
over the Internet is called:
A) VoIP.
B) IPTP.
C) VTP.
D) IP.
A
Snapchat's
Lenses feature is an example of which of the following?
A)
virtual reality
B)
artificial intelligence
C)
augmented reality
D)
chatbot
C
All of
the following statements about mobile apps are true except:
A) the
average U.S. consumer now spends more time using mobile apps than watching
television.
B) iOS
apps are cross-platform, open-source applications.
C) over
130 billion apps have been downloaded from the Apple App Store.
D)
almost all the top 100 brands have a presence in at least one of the major app
stores.
B
----
You wish
to send encrypted emails. What option should you enable?
A)
S/MIME
B) POP3
C) IMAP
D) ISP
A)
S/MIME /Secure/Multipurpose Internet Mail Extensions (S/MIME) allows you to
send encrypted emails when enabled. To enable S/MIME on an Android phone, open
the email client and select More. Then select the appropriate email account and
Security Options. To enable encryption, select the Encrypt option, and then tap
Email encryption cert. (If prompted, you may have to enter the device password
at this point.) If you wish to use a certificate that is already installed,
select the client certificate from those available, and then click Allow.
- POP3
(110) copies the emails from the server onto the local machine, then deletes
the original from the server. It does not provide encryption.
- IMAP (143)
stores mail on a server for subsequent remote access. It does not provide
encryption.
What
transport protocol and port are used to transmit HTTPS traffic?
A) TCP/
443
B) TCP/
80
C) UDP/
443
D) UDP/
80
A) TCP/
443
What
feature would we use to give a host a known IP without having to configure a
static address on the host itself?
A) APIPA
B) DNS
host record
C) DHCP
scope
D) DHCP
reservation
D) DHCP
reservation
Which
term refers to establishing a TCP session?
A) Query
B)
Reservation
C)
Handshake
D)
Authentication
C)
Handshake
Which of
the following protocols is used for transporting email? (choose two.)
A) SMTP
B) POP3
C) X.500
D) MIME
E) X.25
A) SMTP
(sending email)
B) POP3
(receiving email) /Remember, SMTP is used for sending emails, POP3 is often
used for receiving emails.
You are
configuring a customer's new PC. When setting up their email you find that
their incoming email server uses port 995. What protocol does this setting
support?
A) POP3
B) IMAP
C) POP3S
D)
S/MIME
C) POP3S
/POP3 and IMAP are widely used for unencrypted client connections to the mail
server. Encrypted connections to POP3 servers use default port 995 to support
POP3 SSL/TLS (POP3S)
Which
protocol uses TCP port 443?
A) SMTP
B) TFTP
C) HTTPS
D) HTTP
C)
HTTPS/ HTTPS is the second version of HTTP and normally uses 128 bit SSL
(Secure Sockets Layer) encryption to secure the information sent and received
on a web page.
A user
needs telnet remote terminal access to be able to work from home. You
disapprove of this citing security concerns. What is your optimal solution for
this user?
A) SFTP
B) SSH
C) RDP
D)
Telnetd
B) SSH
/Telent sessions are insecure and hackers can obtain usernames and passwords,
without much trouble. SSH addresses this security issue and is implemented
through open source programs such as PuTTY or KiTTY. Telnetd is a telent
server.
A web
developer wants to increase security on the company website. Which of the
following Internet protocols should be implemented to meet the requirement?
A) HTTPS
B) IMAP
C)
TELNET
D) SMTP
A) HTTPS
/In order to protect the confidentiality of data transmitted from the company,
website encryption would be required, which would necessitate the HTTPS
protocol on port 443 using the SSL/TLS standard.
Which
port is used by the IMAP protocol?
A) 67/68
B) 25
C) 110
D) 143
D) 143/
The Internet Mail Access Protocol (IMAP) uses port 143. Ports 67/68 are used by
DHCP, 25 is used by S(ponge)MTP(atrick) and 110 is used by POP(POP)3.
Which of
the following involves two servers and makes use of POP3 or IMAP4?
A) Web
server
B) File
server
C) DHCP server
D) DNS server
E) Mail server
E) Mail
server /Email is a client-server application that involves two mail servers. SMTP
is used to send email messages, and either POP3 or IMAP4 is used to deliver an
email message to a client.
You want
to use a secure email configuration on your mobile device. Which port would you
open on the router to use the Secure (SSL) SMTP protocol?
A) 995
B) 993
C) 465
D) 587
C) 465
/Secure SMTP uses Port 465, Unsecured SMTP and secure TLS use port 25 and can
also use port 587.
You want
to implement Remote Desktop on your company's network. Which security
precaution would you implement?
A)
Change default port
B) Block
port 3389 on firewall
C) Limit
Remote users Group password lockout
D) All
of these
D) All
of these /Remote desktop can increase productivity and access, but at a cost.
All of the following choices are correct and should be implemented. Changing
the default RDP port from 3389 and blocking it will keep hackers from targeting
the protocol. In addition, strengthen or implement the Remote Users group
lockout policy in order to prevent brute force attempts.
One of
your customers is having trouble obtaining a DHCP address. The access point
they are using is correctly configured to assign addresses. Which port(s) would
you check?
A) 20/21
B) 67/68
C)
137/139
D)
161/162
B) 67/68
/The DHCP uses port 67 and 68 to accept requests and assign addresses. Ports
20/21 are used by FTP, NetBIOS over 137/139.
HTTP
(Hypertext Transfer Protocol) is used to
A)
Create WEB pages
B)
Develop a performance baseline of the network
C)
Control system monitoring
D)
Communicate between Web browsers and Web servers
D) The
HTTP protocol (80) is used by Web browsers and Web servers to transfer files,
such as text and graphic files.
Which of
the protocols shown provides support for Remote Desktop?
A) DNS
B) RDP
C) DNAT
D) SRDP
B) RDP
How can
you access a PC using the Terminal window?
A) Ifget
B)
telnet
C) Net
use
D)
telnetrc
B)
telnet /The te(L)net command is common to Microsoft, Linux and Macs. Its
default port is 23. You use the command and the target machine name and need
your password to continue. It will bring you a terminal screen, no GUI. The net
use command is a Windows command used to map drives and other options but not
an interactive environment. Telnetrc gets executed once you have successfully
connected to a Linux device. Ifget is the nonsense detractor and is of no use
here.
To
configure email on an iOS device, you will need: (Choose all that apply)
A) Your
phone number
B)
Street address
C) Names
of mail servers
D) Type
of protocol used
E)
Browser type
C) Names
of mail servers
D) Type
of protocol used /The type of information you will need are email
address/password, server names, protocols used and security information.
Which
port is used by a server using SSL-secured IMAP protocol?
A) 110
B) 143
C) 993
D) 995
C) 993
Which
Applications level protocol is used to transfer files on the Internet?
A) Email
B) FTP
(21)
C) Web
browser
D)
Telnet (23)
B) FTP
/File Transfer Protocol (21) (not today) is a type of protocol supported on the
Internet that allows you to easily transfer files from your computer to another
computer. To use FTP, you need the address of a server that supports FTP and a
client software package that supports FTP running on your computer. This
protocol runs in the OSI (Open Systems Interconnection) model Application
Layer.
What is
the default port for FTP?
A) 21
B) 80
C) 23
D) 25
A) 21,
could you do somethin for me?
The
Internet uses which network protocol?
A)
IPX/SPX
B)
TCP/IP
C) ATM
D)
Netbeui
B)
TCP/IP /Remember, TCP/IP was invented to serve the Internet or large company
intranets.
A laptop
is not able to resolve the IP address of any FQDNs. Which of the following
would MOST likely be blocked at the firewall?
A)
TCP/22
B)
UDP/53
C)
TCP/389
D)
UDP/161
E)
TCP/443
B)
UDP/53. Port 53 is DNS. DNS converts names to IP addresses.
www.professormesser.com=162.159.246.164.
If you
are able to use FTP, this verifies which transport protocol is functioning?
A) IP
B) IPX
C) TCP
D)
NWLink
C) TCP
/Remember, FTP also allows for access in both directions. FTP teams up with
Telnet to transparently log you on to the FTP server and then provides for the
transfer of files. Accessing a host is only the first step. Users must then be
subjected to an authenticaion login that's probably secured with passwords and
usernames placed there by the system administrator to restrict access. FTP is
part of the TCP/IP stack, and since it's connection oriented, it can verify TCP
is functioning.
You have
implemented a permanent connection to the Internet for your home network that
consists of three workstations. You are concerned about the threat of hackers
gaining access from the Internet. You have set up filtering on your DSL router.
Now, you are unable to access Internet sites by their domain names, though you
can access them by their IP addresses. Which of the following is most likely
the cause of this problem?
A) Your
DSL router is blocking port 21
B) Your
DSL router is blocking port 53
C) Your
DSL router is not logged into the ISP
D) You
do not have IP configured on your clients
B) Your
DSL router is blocking port 53/ The DNS service uses port 53.
When
configuring corporate email, you must enter
A) SMTP
B) POP3
C)
Account name
D)
Password
E) DNS
F) ISP
A) SMTP
B) POP3
C)
Account name /Email configuration requires setting the SMTP server name, the
POP3 server name, and the account name. The password can be left to be entered
each time you log in to get email. Remember that optionally you can enter the
password during configuration and check off to have it saved.
---
1)
During which period of time did the Institutionalization phase of Internet
development take place?
A)
1950-1960
B)
1961-1974
C)
1975-1995
D)
1995-through the present
C)1975-1995
2) Which
of the following occurred during the Commercialization phase of Internet
development?
A) The
fundamental building blocks of the Internet were realized in actual hardware
and software.
B)
Personal computers were invented.
C) The
Domain Name System (DNS) was introduced.
D) NSF
privatized the operation of the Internet's backbone.
D) NSF
privatized the operation of the Internet's backbone.
3) During
which phase of the development of the Internet was the Domain Name System (DNS)
introduced?
A)
Commercialization
B)
Institutional
C)
Innovation
D)
Consolidation
B)innovation
4) Which
of the following is not one of the basic technological foundations of the
Internet?
A)
client/server computing
B) FTP
C)
TCP/IP
D)
packet switching
B)FTP
5) The
process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the
destination point is called:
A)
routing.
B) the
Transmission Control Protocol (TCP).
C)
packet switching.
D) the
File Transfer Protocol (FTP).
C)
packet switching
6) Which
of the following is the core communications protocol for the Internet?
A)
Telnet
B) FTP
C)
TCP/IP
D) TLS
C)
TCP/IP
7) The
Transport Layer of TCP/IP is responsible for which of the following?
A)
placing packets on and receiving them from the network medium
B)
addressing, packaging, and routing messages
C)
providing communication with the application by acknowledging and sequencing
the packets to and from the application
D)
providing a variety of applications with the ability to access the services of
the lower layers
C) providing
communication with the application by acknowledging and sequencing the packets
to and from the application
8) The
Internet Layer of TCP/IP is responsible for which of the following?
A)
placing packets on and receiving them from the network medium
B)
addressing, packaging, and routing messages
C)
providing communication with the application by acknowledging and sequencing
the packets to and from the application
D)
providing a variety of applications with the ability to access the services of
the lower layers
B)
addressing, packaging, and routing messages
9) An
IPv4 address is expressed as a:
A)
32-bit number that appears as a series of four separate numbers separated by
semicolons.
B)
64-bit number that appears as a series of four separate numbers separated by
semicolons.
C)
64-bit number that appears as a series of four separate numbers separated by
periods.
D)
32-bit number that appears as a series of four separate numbers separated by
periods.
D)
32-bit number that appears as a series of four separate numbers separated by
periods.
10) The
________ allows a natural language expression, such as Google.com, to represent
a numeric IP address.
A)
uniform resource locator system
B)
Internet protocol addressing schema
C)
domain name system
D)
assigned numbers and names system
C)
domain name system
11) The
address used by a browser to identify the location of content on the Web is
called:
A) a
domain name.
B) a
uniform resource locator.
C) an IP
address.
D) a
file path.
B) a
uniform resource locator
12)
Which of the following is not an advantage of client/server computing over
centralized mainframe computing?
A) It is
easy to expand capacity by adding servers and clients.
B) Each
client added to the network increases the network's overall capacity and
transmission speeds.
C)
Client/server networks are less vulnerable, in part because the processing load
is balanced over many powerful smaller computers rather than concentrated in a
single huge computer.
D) There
is less risk that a system will completely malfunction because backup or mirror
servers can pick up the slack if one server goes down.
B) Each
client added to the network increases the network's overall capacity and
transmission speeds.
13)
________ is a model of computing in that computer processing, storage,
software, and other services are provided as a shared pool of virtualized
resources over the Internet.
A)
Client/server computing
B) P2P
computing
C)
Mobile computing
D) Cloud
computing
D) cloud
computing
14)
Which of the following protocols is used to send mail to a server?
A) IMAP
B) FTP
C) HTTP
D) SSL
A) IMAP
15)
Where does TLS operate within TCP/IP?
A)
between the Internet Layer and the Transport Layer
B)
between the Transport Layer and the Application Layer
C)
between the Network Interface Layer and the Transport Layer
D)
between the Internet Layer and the Application Layer
B)
between the Transport Layer and the Application Layer
16)
Which of the following statements about cloud computing is not true?
A) A
public cloud is typically used by companies with stringent privacy and security
requirements.
B)
Dropbox is an example of a public cloud.
C)
Hybrid clouds offer both public and private cloud options.
D) A
private cloud hosted internally or externally.
A) A
public cloud is typically used by companies with stringent privacy and security
requirements.
17)
________ is used to allow remote login on another computer.
A)
Telnet
B) FTP
C) HTTP
D) SSL
A)
Telnet
18) ________
is a utility program that allows you to check the connection between your
client and a TCP/IP network.
A) Ping
B)
Telnet
C)
Tracert
D)
Finger
A) Ping
19)
Which of the following technologies has enabled the Internet to grow
exponentially to support millions of users, without overloading the network
architecture?
A) fiber
optics
B) Wi-Fi
C) IPv6
D)
client/server computing
D)
client/server computing
20)
Which of the following are specialized computers that transmit message parcels
along available Internet communication paths and on to their destinations?
A)
routers
B) web
servers
C) IP
servers
D)
packet servers
A)
routers
21)
Which of the following is a set of rules for transferring data?
A)
protocol
B)
packet
C)
router
D) IP
address
A)
protocol
22)
Which of the following is not a basic type of cloud computing service?
A) IaaS
B) PaaS
C) SaaS
D) FiOS
D)FiOS
23) Which
of the following are central directories that list all domain names currently
in use for specific domains?
A) web
servers
B) root
servers
C) client servers
D) DNS servers
B) root
servers
24)
Which of the following was the original purpose of the Internet?
A) to
provide a network that would allow businesses to connect with consumers
B) to
link large mainframe computers on different college campuses
C) to
develop military communications systems that could withstand nuclear war
D) to
enable government agencies to track civilian communications
B) to
link large mainframe computers on different college campuses
25)
Which of the following is a utility program that allows you to track the path
of a message sent from a client computer to a remote computer on the Internet?
A)
Telnet
B) Ping
C) IMAP
D)
Tracert
D)
Tracert
26)
Which of the following protocols enables the exchange of routing information
among different autonomous systems on the Internet?
A) HTTP
B) BGP
C) FTP
D) SMTP
B) BGP
37)
Which of the following organizations coordinate the Internet's systems of
unique identifiers, such as IP addresses and top-level domain systems?
A) IETF
B) IAB
C) W3C
D) ICANN
D) ICANN
38) TCP/IP
operates in which layer of Internet architecture?
A)
Network Technology Substrate layer
B)
Middleware Services layer
C)
Transport Services and Representation Standards layer
D)
Applications layer
C)
Transport Services and Representation Standards layer
39) The
Web runs in which layer of Internet architecture?
A)
Network Technology Substrate layer
B)
Middleware Services layer
C)
Transport Services and Representation Standards layer
D)
Applications layer
D)
Applications layer
40) The
layer of Internet architecture that ties the applications to the communications
network and includes such services as security and authentication is called
the:
A)
Network Technology Substrate layer.
B)
Middleware Services layer.
C)
Transport Services and Representation Standards layer.
D)
Applications layer.
B)
Middleware Services layer.
41) The
backbone of the Internet is formed by:
A) Internet Exchange Points (IXPs).
B) Tier
1 ISPs.
C)
Network Access Points (NAPs).
D)
Metropolitan Area Exchanges (MAEs).
B) Tier
1 ISPs
42) When
talking about the physical elements of the Internet, the term redundancy refers
to:
A)
transmitting multiple copies of a single packet to safeguard against data loss.
B) the
use of tiered high-speed switching computers to connect the backbone to
regional and local networks.
C)
delays in messages caused by the uneven flow of information through the
network.
D)
multiple duplicate devices and paths in a network built so that data can be
rerouted if a breakdown occurs
D)
multiple duplicate devices and paths in a network built so that data can be
rerouted if a breakdown occurs.
43) The
________ is a consortium of corporations, government agencies, and nonprofit
organizations that monitors Internet policies and practices.
A)
Internet Engineering Steering Group (IESG)
B) World
Wide Web Consortium (W3C)
C)
Internet Engineering Task Force (IETF)
D)
Internet Society (ISOC)
D)
Internet Society
44) The
________ helps define the overall structure of the Internet.
A) IAB
B) IESG
C) W3C
D) ITU
A) IAB
45)
Which of the following is not true about the mobile platform?
A) Most
smartphones use Intel chips.
B) The
number of cell phones worldwide exceeds the number of PCs.
C) Over
a third of the world's cell phones are smartphones.
D)
Smartphones use flash memory chips.
A) Most
smartphones use Intel chips
46)
Which of the following organizations involved with Internet governance has the
United States recently given up control over?
A) ICANN
B) IGF
C) NTIA
D) IANA
D)IANA
47) Internet
traffic is predicted to ________ by 2019.
A)
decrease
B)
double
C)
triple
D)
quadruple
C)triple
54)
Which of the following is not a concern about IoT?
A) the
high cost of sensors
B)
interoperability
C)
security
D)
privacy
A) the
high cost of sensors
55) How
long does it take for 300,000 X-rays to be transmitted on a 100-gbps network?
A) 10
seconds
B) 1
minute
C) 10
minutes
D) 1
hour
B) 1
minute
56) What
type of Internet access technology are Google and Facebook hoping to use to
provide Internet access to remote parts of the world?
A)
Bluetooth
B)
drones
C) WLANs
D) DSL
B)
drones
57)
Which of the following is not a limitation of the current Internet?
A) the
continued reliance on cables and wires for connectivity
B)
limited bandwidth, which causes congestion and cannot adequately handle video
and voice traffic
C)
architectural restrictions, which stipulate that numerous requests for the same
file must each be answered individually, slowing network performance
D) the difficulty
in expanding capacity by adding servers and clients
D) the
difficulty in expanding capacity by adding servers and clients
58)
Which of the following statements about fiber-optic cable is not true?
A) It
transmits more data at faster speeds than coaxial or twisted pair cable.
B) It is
thinner and lighter than coaxial or twisted pair cable.
C) As of
2016, a majority of U.S. homes have fiber connections.
D)
Telecommunications firms have made substantial investments in cross-country
fiber optic systems in the last decade.
C) As of
2016, a majority of U.S. homes have fiber connections
59) The
major technologies used with wireless local area networks are:
A) Wi-Fi
and Bluetooth.
B) Wi-Fi
and WiMax.
C)
Bluetooth and 3G.
D) WiMax
and 3G.
A) Wi-Fi
and Bluetooth.
60)
Which IEEE 802.11 standard provides for throughput of up to 7 Gbps?
A)
802.11a
B)
802.11b
C)
802.11ac
D)
802.11ad
D)
802.11ad
61) All
of the following are involved in the effort to create standards for IoT except:
A)
AllSeen Alliance.
B)
Industrial Internet Consortium.
C) Open
Connectivity Foundation.
D) W3C.
D) W3C
62)
Which of the following refers to delays in messages caused by the uneven flow
of information packets through the network?
A)
redundancy
B)
latency
C) Net
neutrality
D) QOS
B) latency
63) What
country intends to be the first to use Project Loon to provide universal
Internet access?
A) New
Zealand
B) Sri
Lanka
C) Ghana
D)
Australia
B) Sri
Lanka
69) The
first web browser to make it possible to view documents on the Web with colored
background, images, and animations was:
A)
Netscape Navigator.
B)
Mosaic.
C) Mozilla.
D) Internet Explorer.
B)
Mosaic
70) In
the address http://www.company.com/clients.html, which of the following is the
top-level domain?
A) .com
B)
company.com
C) www
D) http
A) .com
71) You
could expect to find the following services in a web server software package
except:
A)
security services.
B) FTP.
C)
search engine.
D) an
RSS aggregator.
D) an
RSS aggregator
72)
Which of the following is currently the most popular web browser?
A)
Internet Explorer
B)
Safari
C)
Chrome
D)
Firefox
C)
Chrome
73) The
concept behind document formatting has its roots in which of the following?
A) XML
B) SGML
C) HTML
D) GML
D) GML
74) All of
the following are characteristics of HTML5 except:
A) a
video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer.
B) use
of CSS3.
C)
ability to access built-in functionality of mobile devices, such as GPS and
swiping.
D)
support for digital rights management.
D)
support for digital rights management.
77)
Cortana is a type of:
A)
intelligent personal assistant.
B)
widget.
C)
gadget.
D)
social network.
A)
intelligent personal assistant
78)
Which of the following enables Internet users to communicate with each other,
although not in real time?
A)
mobile messaging
B)
online forum
C) SMS
messaging
D) VoIP
B)
online forum
79)
Which of the following is not a mobile messaging application?
A) Kik
B)
WhatsApp
C) Viber
D)
Feedly
D)
Feedly
80) A(n)
________ allows users to easily add and edit content on a web page.
A) wiki
B)
podcast
C) blog
D) RSS
feed
A) wiki
81) The
protocol that enables the transmission of voice and other forms of audio
communication over the Internet is called:
A) VoIP.
B) IPTP.
C) VTP.
D) IP.
A) VoIP
82)
Snapchat's Lenses feature is an example of which of the following?
A)
virtual reality
B)
artificial intelligence
C)
augmented reality
D)
chatbot
C)
augmented reality
85) All
of the following statements about mobile apps are true except:
A) the
average U.S. consumer now spends more time using mobile apps than watching
television.
B) iOS
apps are cross-platform, open-source applications.
C) over
130 billion apps have been downloaded from the Apple App Store.
D)
almost all the top 100 brands have a presence in at least one of the major app
stores.
B) iOS
apps are cross-platform, open-source applications.
All of the
following are involved in the effort to create standards for IoT except:
A:
AllSeen Alliance.
B: Open
Connectivity Foundation.
C:
Industrial Internet Consortium.
D: W3C.
W3C
Which of
the following IEEE standards provide for high-speed short-range Wi-Fi?
802.11ad
802.11af
802.11ah
802.11ay
802.11ad
Which of
the following is not a basic type of cloud computing service?
PaaS
SaaS
IaaS
FiOS
FiOS
Tier 1
ISPs provide Internet access to consumers and businesses.
True
False
False
The
________ is a consortium of corporations, government agencies, and nonprofit
organizations that monitors Internet policies and practices.
World
Wide Web Consortium (W3C)
Internet
Engineering Steering Group (IESG)
Internet
Society (ISOC)
Internet
Engineering Task Force (IETF)
Internet
Society (ISOC)
Cortana
is a type of:
gadget.
widget.
intelligent
digital assistant.
social
network.
intelligent
digital assistant.
WLAN-based
Internet access derives from the same technological foundations as
telephone-based wireless Internet access.
True
False
False
The Web
runs in which layer of Internet architecture?
Network
Technology Substrate layer
Middleware
Services layer
Transport
Services and Representation Standards layer
Applications
layer
Applications
layer
TCP/IP
operates in which layer of Internet architecture?
Network
Technology Substrate layer
Middleware
Services layer
Transport
Services and Representation Standards layer
Applications
layer
Transport
Services and Representation Standards layer
The
first web browser to make it possible to view documents on the Web with colored
background, images, and animations was:
Internet
Explorer.
Mosaic.
Netscape
Navigator.
Mozilla.
Mosaic
Which of
the following is the core communications protocol for the Internet?
Telnet
TCP/IP
TLS
FTP
TCP/IP
HTML
defines the structure of a web page.
True
False
True
Bluetooth
is a high-speed, fixed broadband wireless local area network for commercial and
residential use.
True
False
False
Which of
the following is a set of rules for transferring data?
protocol
IP
address
router
packet
protocol
The
Transport Layer of TCP/IP is responsible for which of the following?
providing
communication with the application by acknowledging and sequencing the packets
to and from the application
addressing,
packaging, and routing messages
providing
a variety of applications with the ability to access the services of the lower
layers
placing
packets on and receiving them from the network medium
providing
communication with the application by acknowledging and sequencing the packets
to and from the application
Which of
the following statements about cloud computing is not true?
A public
cloud is typically used by companies with stringent privacy and security
requirements.
Dropbox
is an example of a public cloud.
Hybrid
clouds offer both public and private cloud options.
A
private cloud may be hosted internally or externally.
A public
cloud is typically used by companies with stringent privacy and security
requirements
________
is a utility program that allows you to check the connection between your
client and a TCP/IP network.
Tracert
Finger
Ping
Telnet
Ping
FTP is
the protocol that permits users to transfer files from a server to their client
computer, and vice versa.
True
False
True
Where
does TLS operate within TCP/IP?
between
the Internet Layer and the Transport Layer
between
the Internet Layer and the Application Layer
between
the Transport Layer and the Application Layer
between
the Network Interface Layer and the Transport Layer
between
the transport layer and the application layer
T1 and
T3 refer to international telephone standards for digital communication.
True
False
True
The
process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the
destination point is called:
packet
switching.
the
Transmission Control Protocol.
routing.
the File
Transfer Protocol.
packet
switching
Which of
the following technologies has enabled the Internet to grow exponentially to
support millions of users, without overloading the network architecture?
Wi-Fi
IPv6
fiber
optics
client/server
computing
client/server
computing
The
backbone of the Internet is formed by:
Internet
Exchange Points (IXPs).
Network
Access Points (NAPs).
Metropolitan
Area Exchanges (MAEs).
Tier 1
ISPs.
Tier 1
ISPs
The
layer of Internet architecture that ties the applications to the communications
network and includes security and authentication services is called the:
Network
Technology Substrate layer.
Middleware
Services layer.
Transport
Services and Representation Standards layer.
Applications
layer.
Middleware
Services layer
The
Internet Layer of TCP/IP is responsible for which of the following?
placing
packets on and receiving them from the network medium
providing
a variety of applications with the ability to access the services of the lower
layers
providing
communication with the application by acknowledging and sequencing the packets
to and from the application
addressing,
packaging, and routing messages
addressing,
packaging, and routing messages
Which of
the following statements about cloud computing is not true?
A public
cloud is typically used by companies with stringent privacy and security
requirements.
A
private cloud may be hosted internally or externally.
Dropbox
is an example of a public cloud.
Hybrid
clouds offer both public and private cloud options.
a public
cloud is typically used by companies with stringent privacy and security
requirements
Which of
the following is a programming language introduced by Apple specifically for
developing iOS applications?
Swift
C
Objective-C
C++
Swift
________
is used to allow remote login on another computer.
Telnet
HTTP
FTP
SSL
Telnet
Which of
the following was the most popular web browser as of August 2018?
Firefox
Chrome
Internet
Explorer
Safari
Chrome
All of
the following statements about HTML5 are true except:
HTML5 is
an important tool for both response web design and adaptive web delivery.
HTML5
apps work just like web pages.
HTML5
stores page content into mobile device hardware rather loading into the browser
from a web server.
HTML5
has become the de facto web page development standard.
HTML5
stores page content into mobile device hardware rather loading into the browser
from a web server.
The
Internet of Things (IoT) is based on sensors that can collect data and connect
to the Internet.
True
False
True
Which of
the following is not an advantage of client/server computing over centralized
mainframe computing?
-There
is less risk that a system will completely malfunction because backup or mirror
servers can pick up the slack if one server goes down.
-Client/server
networks are less vulnerable, in part because the processing load is balanced
over many powerful smaller computers rather than concentrated in a single huge
computer.
-It is
easy to expand capacity by adding servers and clients.
-Each
client added to the network increases the network's overall capacity and
transmission speeds.
Each
client added to the network increases the network's overall capacity and
transmission speeds.
HTTP/2
is supported by almost all the leading web browsers.
True
False
True
Which of
the following are central directories that list all domain names currently in
use for specific domains?
client
servers
Web
servers
root
servers
DNS
servers
root
servers
which of
the following are specialized computers that transmit message parcels along
available Internet communication paths and on to their destinations?
IP
servers
packet
servers
routers
Web
servers
routers
Google
Cardboard is an example of which of the following?
virtual
reality
artificial
intelligence
chatbot
augmented
reality
virtual
reality
During
which phase of the development of the Internet was the Domain Name System (DNS)
introduced?
consolidation
phase
innovation
phase
commercialization
phase
institutional
phase
institutional
phase
Which of
the following statements about fiber-optic cable is not true?
It
transmits more data at faster speeds than coaxial or twisted pair cable.
Most
U.S. homes have fiber connections.
Long-haul
fiber optic networks are typically owned by firms referred to as Tier I ISPs.
It is
thinner and lighter than coaxial or twisted pair cable.
Most
U.S. homes have fiber connections
All of
the following are involved in the effort to create standards for IoT except:
Industrial
Internet Consortium.
AllSeen
Alliance.
Open
Connectivity Foundation.
W3C.
W3C
16)
During which period of time did the Institutionalization phase of Internet
development take place?
A)
1950-1960
B)
1961-1974
C)
1975-1995
D)
1995-through the present
Answer:
C
17)
Which of the following occurred during the Commercialization phase of Internet
development?
A) The
fundamental building blocks of the Internet were realized in actual hardware
and software.
B) Large
mainframes on different college campuses were linked.
C) The
Domain Name System was introduced.
D) NSF
privatized the operation of the Internet's backbone.
Answer:
D
18)
During which phase of the development of the Internet was ARPANET invented?
A)
Commercialization phase
B)
Institutional phase
C)
Innovation phase
D)
Consolidation phase
Answer:
B
19) Which
of the following is not one of the basic technological foundations of the
Internet?
A)
client/server computing
B)
Tracert
C)
TCP/IP communications protocol
D)
packet-switching hardware
Answer:
B
20) The
process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the
destination point is called:
A)
routing.
B) the
Transmission Control Protocol.
C)
packet switching.
D) the
File Transfer Protocol.
Answer:
C
21)
Which of the following is the core communications protocol for the Internet?
A)
Telnet
B) FTP
C)
TCP/IP
D) SSL
Answer:
C
22) The
Transport Layer of TCP/IP is responsible for which of the following?
A)
placing packets on and receiving them from the network medium
B)
addressing, packaging, and routing messages
C)
providing communication with the application by acknowledging and sequencing
the packets to and from the application
D)
providing a variety of applications with the ability to access the services of
the lower layers
Answer:
C
23) The
Internet Layer of TCP/IP is responsible for which of the following?
A)
placing packets on and receiving them from the network medium
B)
addressing, packaging, and routing messages
C) providing
communication with the application by acknowledging and sequencing the packets
to and from the application
D)
providing a variety of applications with the ability to access the services of
the lower layers
Answer:
B
24)
Which of the following allows users to communicate visually and aurally in
real-time, and uses high-resolution monitors to simulate the presence of
participants?
A)
telepresence
B)
videoconferencing
C) VOIP
D) IP
telephony
Answer:
A
25) An
IPv4 address is expressed as a:
A)
32-bit number that appears as a series of four separate numbers separated by
semicolons.
B)
64-bit number that appears as a series of four separate numbers separated by
semicolons.
C)
64-bit number that appears as a series of four separate numbers separated by
periods.
D)
32-bit number that appears as a series of four separate numbers separated by
periods.
Answer:
D
26) The
natural language convention used to represent IP addresses is called the:
A)
uniform resource locator system.
B)
Internet protocol addressing schema.
C)
domain name system.
D)
assigned numbers and names (ANN) system.
Answer:
C
27) The
addresses used by browsers to identify the location of content on the Web are
called:
A)
domain names.
B)
uniform resource locators.
C) IP
addresses.
D) file
paths.
Answer:
B
28)
Which of the following organizations coordinates the Internet's systems of
unique identifiers, such as IP addresses and top-level domain systems?
A) IETF
B) IAB
C) W3C
D) ICANN
Answer:
C
29) Which
of the following is not an advantage of client/server computing over
centralized mainframe computing?
A) It is
easy to expand capacity by adding servers and clients.
B) Each
client added to the network increases the network's overall capacity and
transmission speeds.
C)
Client/server networks are less vulnerable, in part because the processing load
is balanced over many powerful smaller computers rather than concentrated in a
single huge computer.
D) There
is less risk that a system will completely malfunction because backup or mirror
servers can pick up the slack if one server goes down.
Answer:
B
30)
________ is a model of computing in which firms and individuals obtain
computing power and software applications over the Internet, rather than
purchasing and installing it on their own computers.
A)
Client/server computing
B) P2P
computing
C)
Mobile computing
D) Cloud
computing
Answer:
D
31)
Which of the following protocols is used to send mail to a server?
A) SMTP
B) FTP
C) HTTP
D) SSL
Answer:
A
32)
Where does TSL operate within TCP/IP?
A)
between the Internet Layer and the Transport Layer
B)
between the Transport Layer and the Application Layer
C)
between the Network Interface Layer and the Transport Layer
D)
between the Internet Layer and the Application Layer
Answer:
B
33) A(n)
________ is an audio presentation stored as an audio file and posted to the Web
for users to download.
A)
podcast
B) RSS
subscription
C)
weblog
D)
widget
Answer:
A
34) ________
is one of the original Internet services and is used to transfer files from a
server computer to a client computer and vice versa.
A) SMTP
B) FTP
C) HTTP
D) SSL
Answer:
B
35)
________ is a utility program that allows you to check the connection between
your client and a TCP/IP network.
A) Ping
B)
Telnet
C)
Tracert
D)
Finger
Answer:
A
36)
________ is a unique virtual laboratory for exploring future internets at
scale, to promote innovations in network science and technologies.
A)
Internet of Things
B)
Internet2
C)
ARPANET
D) GENI
Answer:
D
37)
TCP/IP operates in which layer of Internet architecture?
A)
Network Technology Substrate layer
B)
Middleware Services layer
C)
Transport Services and Representation Standards layer
D) Applications
layer
Answer:
C
38) An
Internet-enabled media player would run in which layer of Internet
architecture?
A)
Network Technology Substrate layer
B)
Middleware Services layer
C)
Transport Services and Representation Standards layer
D)
Applications layer
Answer:
D
39) The
layer of Internet architecture that ties the applications to the communications
network and includes such services as security and authentication is called
the:
A)
Network Technology Substrate layer.
B)
Middleware Services layer.
C)
Transport Services and Representation Standards layer.
D)
Applications layer.
Answer:
B
40) The
backbone of the Internet is formed by:
A) Internet Exchange Points (IXPs).
B)
Network Service Providers (NSPs).
C)
Internet Service Providers (ISPs).
D)
Metropolitan Area Exchanges (MAEs).
Answer:
B
41) When
talking about the physical elements of the Internet, the term redundancy refers
to:
A)
transmitting multiple copies of a single packet to safeguard against data loss.
B) the
use of tiered high-speed switching computers to connect the backbone to
regional and local networks.
C)
delays in messages caused by the uneven flow of information through the
network.
D)
multiple duplicate devices and paths in a network built so that data can be
rerouted if a breakdown occurs.
Answer:
D
42)
Which source of e-commerce revenues has grown from nearly zero prior to 2007 to
over $38 billion in 2013?
A)
search engine advertising
B)
mobile retail purchases
C)
streaming video subscriptions
D) social
network advertising
Answer:
B
43)
Local area networks that operate within a single organization that leases
access to the Web directly from regional and national carriers are called:
A) wide
area networks.
B)
extranets.
C)
campus area networks.
D)
private exchanges.
Answer:
C
44) The
________ is a consortium of corporations, government agencies, and nonprofit
organizations that monitors Internet policies and practices.
A)
Internet Engineering Steering Group (IESG)
B) World
Wide Web Consortium (W3C)
C)
Internet Engineering Task Force (IETF)
D)
Internet Society (ISOC)
Answer:
D
45) The
________ helps define the overall structure of the Internet.
A) IAB
B) IESG
C) W3C
D) ITU
Answer:
A
46)
Which of the following is not a limitation of the current Internet?
A) the
continued reliance on cables and wires for connectivity
B)
limited bandwidth, which causes congestion and cannot adequately handle video
and voice traffic
C)
architectural restrictions, which stipulate that numerous requests for the same
file must each be answered individually, slowing network performance
D) the
difficulty in expanding capacity by adding servers and clients
Answer:
D
47)
Which of the following is not true about the mobile platform?
A) Most
smartphones use Microsoft's operating system, Windows Mobile.
B) The
number of cell phones worldwide exceeds the number of PCs.
C) About
a third of the world's cell phones are smartphones.
D)
Unlike PCs, smartphones do not need fans.
Answer:
A
48) Which
of the following statements about fiber-optic cable is not true?
A) It
consists of twelve or sixteen strands of glass.
B) It is
thinner and lighter than coaxial or twisted pair cable.
C) It
enables better data security than coaxial cable.
D)
Telecommunications firms have made substantial investments in cross-country
fiber optic systems in the last decade.
Answer:
A
49) The
model of computing in which firms and individuals obtain computing power and
software over the Internet is called ________ computing.
A) mobile
B) mainframe
C) client/server
D) cloud
Answer:
D
50)
Which of the following technologies has enabled the Internet to grow
exponentially to support millions of users, without overloading the network
architecture?
A) fiber
optics
B) Wi-Fi
C) IPv6
D)
client/server networking
Answer:
D
51) The
major technologies used with wireless local area networks are:
A) Wi-Fi
and Bluetooth.
B) Wi-Fi
and WiMax.
C)
Bluetooth and 3G.
D) WiMax
and 3G.
Answer:
A
52)
Akamai offers all of the following services except:
A)
instant messaging.
B)
targeted advertising.
C)
security services.
D)
global traffic management.
Answer:
A
53) Which
of the following is a high-speed, medium-range, broadband wireless metropolitan
area network?
A) Wi-Fi
B) WiMAX
C)
Bluetooth
D)
ZigBee
Answer:
B
54) Siri
is a type of:
A)
intelligent personal assistant.
B)
widget.
C)
gadget.
D)
social network.
Answer:
A
55) The
first Web browser to make it possible to view documents on the Web with colored
background, images, and animations was:
A)
Netscape Navigator.
B)
Mosaic.
C) Mozilla.
D) Internet Explorer.
Answer:
B
56) In
the address http://www.company.com/clients.html, which of the following is the
top-level domain?
A) .com
B)
company.com
C) www
D) http
Answer:
A
57) You could
expect to find all of the following services in a Web server software package
except:
A)
security services.
B) FTP.
C) data
capture.
D) an
RSS aggregator.
Answer:
D
58)
Which of the following is currently the most popular Web browser?
A)
Internet Explorer
B)
Netscape
C)
Chrome
D)
Firefox
Answer:
A
59) The
concept behind document formatting had its roots in which of the following?
A) XML
B) SGML
C) HTML
D) GML
Answer:
D
60)
Which of the following is a Web application that enables Internet users to
communicate with each other, although not in real time?
A)
online chat
B)
online forum
C) IM
D) VoIP
Answer:
B
61)
Which of the following is a Web 2.0 service or application?
A) wikis
B)
e-mail
C) IM
D)
online forums
Answer:
A
62) A(n)
________ is a Web application that allows users to easily add and edit content
on a Web page.
A) wiki
B)
podcast
C) blog
D) RSS
feed
Answer:
A
63) The
protocol that enables the transmission of voice and other forms of audio
communication over the Internet is called:
A) VoIP.
B) IPTP.
C) VTP.
D) IP.
Answer:
A
64) All
of the following are characteristics of HTML5 except:
A) a
video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer.
B) use
of CSS3.
C)
ability to access built-in functionality of mobile devices, such as GPS and
swiping.
D)
support for digital rights management.
Answer:
D
65) All
of the following are true about iPhone apps except:
A) They
are distributed through Apple's App Store.
B) They
are cross-platform, open-source applications.
C) They
were estimated to generate over $1 billion in 2013.
D)
Apple's goal of offering apps is to increase retail sales of iPhones, iPads,
and iPods.
Answer:
B
Which of
the following is a characteristic of the Consolidation phase of e-commerce?
A.
predominance of pure online strategies
B.
emphasis on revenue growth versus profits
C. brand
extension and strengthening becomes more important than creating new brands
D. shift
to a technology-driven approach
C. brand
extension and strengthening becomes more important than creating new brands
The
easiest and least expensive way to prevent threats to system integrity is to
install anti-virus software. T/F
True
The
overall rate of online credit card fraud is ________ of all online card
transactions.
less
than 1%
around
5%
around
10%
around
15%
less
than 1%
________
is the ability to ensure that messages and data are only available to those
authorized to view them.
Confidentiality
Integrity
Privacy
Availability
Confidentiality
A
digital certificate contains all of the following except the:
subject's
private key.
subject's
public key.
digital
signature of the certification authority.
digital
certificate serial number.
subject's
private key.
Phishing
attacks rely on browser parasites. T/F
False
Which of
the following statements about Bitcoin is not true?
The
computational power required to mine Bitcoins has increased over time.
Bitcoins
are completely secure.
Bitcoins
are illegal in some countries.
In 2018,
Bitcoin represented just under 40% of the full market for cryptocurrencies.
Bitcoins
are completely secure.
Which of
the following statements is not true?
A majority
of states require companies that maintain personal data on their residents to
publicly disclose when a security breach affecting those residents has
occurred.
The USA
Patriot Act broadly expanded law enforcement's investigative and surveillance
powers.
The
Cybersecurity Information Sharing Act was strongly supported by most large
technology companies and privacy advocates.
The
Federal Trade Commission has asserted that it has authority over corporations'
data security practices.
The
Cybersecurity Information Sharing Act was strongly supported by most large
technology companies and privacy advocates.
Which of
the following is not a key factor for establishing e-commerce security?
data
integrity
technology
organizational
policies
laws and
industry standards
data
integrity
Malware
that comes with a downloaded file that a user requests is called a:
Trojan
horse.
backdoor.
drive-by
download.
PUP.
drive-by
download.
All of
the following statements about PKI are true except:
the term
PKI refers to the certification authorities and digital certificate procedures
that are accepted by all parties.
PKI is
not effective against insiders who have a legitimate access to corporate
systems including customer information.
PKI
guarantees that the verifying computer of the merchant is secure.
the
acronym PKI stands for public key infrastructure.
PKI
guarantees that the verifying computer of the merchant is secure.
What is
the first step in developing an e-commerce security plan?
Create a
security organization.
Develop
a security policy.
Perform
a risk assessment.
Perform
a security audit.
Perform
a risk assessment.
Which of
the following is an example of an integrity violation of e-commerce security?
A
website is not actually operated by the entity the customer believes it to be.
A
merchant uses customer information in a manner not intended by the customer.
A
customer denies that he is the person who placed the order.
An
unauthorized person intercepts an online communication and changes its
contents.
An
unauthorized person intercepts an online communication and changes its
contents.
Which of
the following statements about data breaches in 2017 is not true?
A.
According to the Identity Theft Resource Center, the number of breaches in 2017
increased by almost 45% from 2016.
B.
According to the Identity Theft Resource Center, over 50% of data breaches
involved social security numbers.
C.
According to the Identity Theft Resource Center, employee error was the leading
cause of data breaches.
D.
According to the Identity Theft Resource Center, data breaches involving the
business sector represented over 55% of all breaches.
C.
According to the Identity Theft Resource Center, employee error was the leading
cause of data breaches.
Which of
the following is not an example of a potentially unwanted program (PUP)?
adware
browser
parasite
drive-by
download
spyware
drive-by
download
PayPal
is an example of what type of payment system?
online
stored value payment system
digital
checking system
accumulating
balance system
digital
credit card system
online
stored value payment system
A Trojan
horse appears to be benign, but then does something other than expected. T/F
True
Which of
the following is a set of short-range wireless technologies used to share
information among devices within about two inches of each other?
DES
NFC
IM
text
messaging
NFC
________
is the ability to ensure that e-commerce participants do not deny their online
actions.
Nonrepudiation
Authenticity
Availability
Integrity
Nonrepudiation
Which of
the following is not an example of malicious code?
a.
scareware
b.
Trojan horse
c. bot
d.
sniffer
D.
sniffer
FREAK is
an example of a software vulnerability. T/F
True
All of
the following are methods of securing channels of communication except:
A.SSL/TLS.
B. digital certificates.
C. VPN.
D. FTP.
D. FTP.
Which
dimension(s) of security is spoofing a threat to?
A.
integrity
B.
availability
C.
integrity and authenticity
D.
availability and integrity
C.
integrity and authenticity
Which of
the following statements is not true?
A. A VPN
provides both confidentiality and integrity.
B. A VPN
uses both authentication and encryption.
C. A VPN
uses a dedicated secure line.
D. The
primary use of VPNs is to establish secure communications among business
partners.
C. A VPN
uses a dedicated secure line.
The
easiest and least expensive way to prevent threats to system integrity is to
install anti-virus software. T/F
True
All of
the following were visions of e-commerce expressed during the early years of
e-commerce except:
A. a
nearly perfect information marketspace.
B.
friction-free commerce.
C.
disintermediation.
D. fast
follower advantage.
D. fast
follower advantage.
Which of
the following are specialized computers that transmit message parcels along
available Internet communication paths and on to their destinations?
A.
routers
B. Web
servers
C. IP
servers
D.
packet servers
A.
routers
Where
does TLS operate within TCP/IP?
A.
between the Internet Layer and the Transport Layer
B.
between the Transport Layer and the Application Layer
C.
between the Network Interface Layer and the Transport Layer
D.
between the Internet Layer and the Application Layer
B.
between the Transport Layer and the Application Layer
You
could expect to find all of the following services in a web server software
package except:
A.
security services.
B. FTP.
C.
search engine.
D. an
RSS aggregator.
D. an
RSS aggregator.
WLAN-based
Internet access derives from the same technological foundations as
telephone-based wireless Internet access. T/F
False
Which of
the following protocols enables the exchange of routing information among
different autonomous systems on the Internet?
A. HTTP
B. BGP
C. FTP
D. SMTP
B. BGP
The
major hubs in the United States where the Internet backbone intersects with
regional and local networks are now commonly referred to as Internet Exchange
Points (IXPs). T/F
True
An IPv4
address is expressed as a:
A.
32-bit number that appears as a series of four separate numbers separated by
semicolons.
B.
64-bit number that appears as a series of four separate numbers separated by
semicolons.
C.
64-bit number that appears as a series of four separate numbers separated by
periods.
D.
32-bit number that appears as a series of four separate numbers separated by
periods.
D.
32-bit number that appears as a series of four separate numbers separated by
periods.
Which of
the following is not an advantage of client/server computing over centralized
mainframe computing?
A. It is
easy to expand capacity by adding servers and clients.
B. Each
client added to the network increases the network's overall capacity and
transmission speeds.
C.
Client/server networks are less vulnerable, in part because the processing load
is balanced over many powerful smaller computers rather than concentrated in a
single huge computer.
D. There
is less risk that a system will completely malfunction because backup or mirror
servers can pick up the slack if one server goes down.
B. Each
client added to the network increases the network's overall capacity and
transmission speeds.
Microsoft's
pilot program to provide broadband Internet access to rural areas uses which of
the following technologies?
A.
satellites
B.
drones
C.
unused, low-powered television channels
D. high
altitude balloons
C. unused,
low-powered television channels
Which of
the following organizations monitor Internet policies and practices?
A. IETF
B. ISOC
C. W3C
D. ICANN
B. ISOC
Applications
for Android operating system-based smartphones are typically written in which
of the following?
A. Swift
B. Java
C. ActiveX
D. ColdFusion
B. Java
The Web
runs in which layer of Internet architecture?
A.
Network Technology Substrate layer
B.
Middleware Services layer
C.
Transport Services and Representation Standards layer
D.
Applications layer
D.
Applications layer
Which of
the following was the original purpose of the Internet?
A. to
provide a network that would allow businesses to connect with consumers
B. to
link large mainframe computers on different college campuses
C. to
develop a military communications system that could withstand nuclear war
D. to
enable government agencies to track civilian communications
B. to
link large mainframe computers on different college campuses
Which of
the following is a programming language introduced by Apple specifically for
developing iOS applications?
A.
Objective-C
B. C
C. C++
D. Swift
D. Swift
Amazon
Web Services is an example of a private cloud. T/F
False
All of the
following either currently, or have plans to, offer Internet access via
satellite except:
A.
Facebook
B. Dish
C.
Microsoft
D.
Boeing
C.
Microsoft
Which of
the following protocols is used to send mail to a server?
A. SMTP
B. FTP
C.HTTP
D. SSL
A. SMTP
A
private cloud is operated for the benefit of multiple firms. T/F
False
The
backbone of the Internet is formed by:
A. Internet Exchange Points (IXPs).
B. Tier
1 ISPs.
C.
Network Access Points (NAPs).
D.
Metropolitan Area Exchanges (MAEs).
B. Tier
1 ISPs.
T1 and
T3 refer to international telephone standards for digital communication. T/F
True
Which of
the following monitors and controls access to a main web server, and implements
firewall protection?
A. proxy
server
B. list
server
C. groupware
server
D. mail
server
A. proxy
server
Which of
the following is not part of the LAMP open source web development model?
A. Linux
B. Apache
C. Microsoft IIS
D. PHP
C.
Microsoft IIS
Which of
the following details the actual hardware components to be used in a system?
A.
architecture plan
B.
system functionalities plan
C.
logical design
D.
physical design
D.
physical design
Which of
the following is a server-side technique that detects the attributes of the
device making the request, and using predefined templates, loads a version of a
site optimized for the device?
A. LAMP
B. AWD
C.
mobile first design
D. RoR
B. AWD
Which of
the following basic system functionalities is used to display goods on a
website?
A. product database
B. digital catalog
C.
shopping cart system
D.
customer database system
B.
digital catalog
All of
the following are key design principles of responsive web design except:
A.
flexible grid-based layouts.
B. media
queries.
C.
coding by convention.
D. flexible
images and media.
C.
coding by convention.
Which of
the following helps you engage your customers in a conversation?
A.
shopping cart
B.
product database
C.
on-site blog
D. site
tracking and reporting system
C.
on-site blog
Ruby on
Rails is based on which of the following philosophies?
A. SLDC
B. CoC
C. LAMP
D. Ajax
B. CoC
________
are a kind of middleware software that provides the glue connecting traditional
corporate systems to the customer as well as all the functionality needed to
conduct e-commerce.
A. Application servers
B. Web page servers
C. Database servers
D. Content management servers
A.
Application servers
Which of
the following details the actual hardware components to be used in a system?
A.
architecture plan
B.
system functionalities plan
C.
logical design
D.
physical design
D.
physical design
A
multi-tier architecture typically includes only a web server and a database
server. T/F
False
Dynamic page
generation enables price discrimination. T/F
True
Which of
the following typically includes a data flow diagram (DFD) to describe the flow
of information for an e-commerce site?
A.
physical design
B.
logical design
C.
testing plan
D.
co-location plan
B.
logical design
Which of
the following typically includes a data flow diagram (DFD) to describe the flow
of information for an e-commerce site?
A.
physical design
B.
logical design
C.
testing plan
D.
co-location plan
B.
logical design
The web
server software used has a significant impact on how a website's web pages look
on a user's computer. T/F
False
DHMTL is
used to generate dynamic web pages. T/F
False
Which of
the following is the minimum system architecture requirement for an e-commerce
website that processes orders?
A.
single-tier architecture
B.
two-tier architecture
C.
three-tier architecture
D.
multi-tier architecture
B.
two-tier architecture
Which of
the following verifies that the business objectives of the system are in fact
working?
A. system
testing
B.
acceptance testing
C. unit
testing
D.
implementation testing
B.
acceptance testing
A
security hole known as Shellshock enabled hackers to target JavaScript running
on Apache web servers. T/F
False
Django
is based on which of the following?
A. PHP
B.
Python
C. Perl
D. Ruby
on Rails
B.
Python
The term
stateless refers to the fact that:
A. no
one government entity controls the Internet.
B. the
server does not have to maintain an ongoing dedicated interaction with the
client computer.
C.
system performance degrades as more simultaneous users require service.
D. web
servers may maintain multiple instances of server software to handle requests.
B. the
server does not have to maintain an ongoing dedicated interaction with the
client computer.
Django
follows the ________ programming principle.
A. CoC
B.
WYSIWYG
C. DRY
D. LAMP
C. DRY
All of
the following are simple steps for optimizing web page content except:
A.
reducing unnecessary HTML comments.
B.
segmenting computer servers to perform dedicated functions.
C. using
more efficient graphics.
D.
avoiding unnecessary links to other pages on the site.
B.
segmenting computer servers to perform dedicated functions.
All of the
following are website design features that annoy customers except:
A.
slow-loading pages.
B.
pop-under ads.
C.
splash pages.
D.
multi-browser functionality.
D.
multi-browser functionality.
Most of
the time required to maintain an e-commerce site is spent on:
A.
debugging code.
B.
responding to emergency situations.
C.
general administration and making changes and enhancements to the system.
D.
changes in reports, data files, and links to backend databases.
C.
general administration and making changes and enhancements to the system.
Which of
the following was the most popular web browser as of August 2018?
A. Internet Explorer
B. Safari
C. Chrome
D.
Firefox
C.
Chrome
IMAP is
the Internet protocol used by a browser to transfer web pages. T/F
False
WLAN-based
Internet access derives from the same technological foundations as
telephone-based wireless Internet access. T/F
False
The
major hubs in the United States where the Internet backbone intersects with
regional and local networks are now commonly referred to as Internet Exchange
Points (IXPs). T/F
True
The
Internet is a worldwide system of computer networks. T/F
True
________
was the first truly large-scale digitally enabled transaction system in the B2C
arena.
A. Telex
B. The Baxter
Healthcare system
C. The
French Minitel
D.
Electronic Data Interchange (EDI)
C. The
French Minitel
In 2018,
the overall retail market in the United States was estimated to be about:
A. $53
trillion.
B. $5.3
trillion.
C. $530
billion.
D. $53
billion.
B. $5.3
trillion.
Which of
the following is not a primary activity in a firm value chain?
A.
outbound logistics
B.
finance/accounting
C.
operations
D.
after-sales service
B.
finance/accounting
A
wealthy individual who invests personal funds in a startup in exchange for an
equity share in the business is referred to as a(n):
A.
incubator.
B. angel
investor.
C.
venture capital investor.
D.
crowdfunder.
B. angel
investor.
Which of
the following may offer its customers value chain management software?
A.
e-distributors
B.
e-procurement companies
C.
exchanges
D.
community providers
B.
e-procurement companies
Which of
the following is not considered a portal?
A. Yahoo
B. MSN
C.
Amazon
D. AOL
C.
Amazon
Which of
the following gives a business model the most credibility with outside
investors?
A. the
firm's management team
B. the
firm's value proposition
C. the
firm's market opportunity
D. the
firm's market strategy
A. the
firm's management team
First
movers often fail because:
A. their
competitive advantage is unfair.
B. they
lack complementary resources needed to sustain their advantages.
C. they
are operating in a perfect market.
D. they
fail to leverage their competitive assets.
B. they
lack complementary resources needed to sustain their advantages.
In
general, the key to becoming a successful content provider is to:
A. own
the content being provided.
B. own
the technology by which content is created, presented, and distributed.
C.
provide online content for free.
D.
provide other services as well as online content.
A. own
the content being provided.
All of
the following use an advertising revenue model except:
A.
Facebook.
B.
Yahoo.
C.
Google.
D.
Walmart.
D.
Walmart.
Which of
the following is an example of the affiliate revenue model?
A.
Scribd
B. eBay
C. L.L.
Bean
D.
MyPoints
D.
MyPoints
Which
type of investor typically becomes interested in a startup company after it has
begun generating revenue?
A.
incubators
B. angel
investors
C.
crowdfunders
D.
venture capital investors
D.
venture capital investors
Slow
followers are sometimes more successful than first movers. T/F
True
A
________ specifically details how you plan to find customers and to sell your
product.
A. sales
analysis
B.
business plan
C.
competitive strategy
D.
market strategy
D.
market strategy
In the
________ business model, a web-based business builds a digital environment in
which buyers and sellers can meet, display products, search for products and
establish prices.
A.
market creator
B.
community provider
C.
e-tailer
D.
portal
A.
market creator
Which of
the following is not a variation of the e-tailer business model?
A.
bricks-and-clicks
B.
virtual merchant
C.
market creator
D. manufacturer-direct
C.
market creator
Which of
the following is an example of a company using the content provider model?
A.
Priceline
B.
Netflix
C. Dell
D. eBay
B.
Netflix
The
Jumpstart Our Business Startups (JOBS) Act, and issuance of enabling
regulations by the Securities and Exchange Commission, allows a start-up
company to use crowdfunding to solicit investors to invest in small and
early-stage startups. T/F
True
Social
technologies change industry structure by weakening powerful sales channels and
shifts bargaining power to consumers. T/F
False
SaaS and
PaaS providers can typically provide services at lower costs through scale
economies. T/F
True
E-commerce
has increased price competition in many markets. T/F
True
Information
asymmetries enable some firms to have an edge over others. T/F
True
Which of
the following uses a subscription revenue model for books?
A.
Spotify
B.
Amazon Kindle Unlimited
C.
Rhapsody
D.
Pandora
B.
Amazon Kindle Unlimited
On-demand
service companies are characterized by the free sharing of resources between
the company and consumers. T/F
False
Over the
past decade, the number of exchanges has:
A.
greatly increased.
B.
diminished sharply.
C.
stayed about the same.
D.
increased slowly but steadily.
B. diminished
sharply.
All of
the following can be considered a direct competitor of Priceline except:
A.
Travelocity.
B.
Expedia.
C.
Orbitz.
D. ESPN.
D. ESPN.
Which of
the following is not an example of the bricks-and-clicks e-tailing business
model?
A.
Walmart
B.
Target
C.
Bluefly
D.
Staples
C.
Bluefly
The Seam
is an example of a(n):
A.
private industrial network.
B.
exchange.
C.
industry consortium.
D.
e-distributor.
C.
industry consortium.
Which of
the following is a leading platform for social e-commerce?
A.
Amazon
B. eBay
C.
Wikipedia
D.
Facebook
D.
Facebook
Which of
the following is an example of an e-commerce first mover that failed?
A. Etsy
B. eToys
C. eBay
D.
E*Trade
B. eToys
Price transparency
refers to the ease with which consumers can find out what merchants pay for
products. T/F
False
Which of
the following statements about the Web is not true?
A. The
Web is the technology upon which the Internet is based.
B. The
Web was the original "killer app."
C. The
Web provides access to pages written in Hypertext Markup Language.
D. The
Web is both a communications infrastructure and an information storage system.
A. The
Web is the technology upon which the Internet is based.
Which of
the following best describes the early years of e-commerce?
A. They
were a technological success but a mixed business success.
B. They
were a technological success but a business failure.
C. They
were a technological failure but a business success.
D. They
were a mixed technological and business success.
A. They
were a technological success but a mixed business success.
Which of
the following is a characteristic of e-commerce during the Invention period?
A.
mobile technology
B.
earnings and profit emphasis
C.
disintermediation
D.
extensive government surveillance
C.
disintermediation
Personalization
involves targeting marketing messages to specific individuals by adjusting the
message based upon a consumer's preferences or past purchasing behavior. T/F
True
Ubiquity
increases the cognitive energy required to transact in a marketspace. T/F
False
Which of
the following refers to the practice of researching a product online before
purchasing it at a physical store?
A.
zooming
B.
grazing
C.
showrooming
D. webrooming
D.
webrooming
Retail
e-commerce in the United States is not expected to continue growing at
double-digit growth rates in 2018-2019. T/F
False
Which of
the following describes the basic web policy of large firms during the
Invention period?
A.
Integrate social networks and the mobile platform with website marketing.
B.
Emphasize the necessity for the Web to generate profits.
C. Use
the Web to sell complex goods and services online.
D.
Maintain a basic, static website depicting the firm's brand.
D.
Maintain a basic, static website depicting the firm's brand.
Which of
the following statements is not true?
A.
Information asymmetries are continually being introduced by merchants and
marketers.
B.
Intermediaries have not disappeared.
C.
Overall transaction costs have dropped dramatically.
D.
Brands remain very important in e-commerce.
C.
Overall transaction costs have dropped dramatically.
Price
dispersion has been eliminated in e-commerce T/F
False
All of
the following are platforms for C2C e-commerce except:
A.
Walmart.
B.
Facebook Marketplace.
C.
Craigslist.
D. Etsy.
A.
Walmart.
The
Internet is a worldwide system of computer networks. T/F
True
It is estimated
that by 2022, the size of the B2B market will reach:
A. $730
million.
B. $7.3
billion.
C. $730
billion.
D. $7.3
trillion.
D. $7.3
trillion.
The fact
that e-commerce is conducted based on universal standards decreases search
costs for consumers. T/F
True
All of
the following are examples of Web 2.0 sites and applications except:
A.
photo-sharing sites.
B.
blogs.
C. wikis.
D. auction sites.
D.
auction sites.
Price
transparency refers to the ease with which consumers can find out what
merchants pay for products. T/F
False
In 2018,
there were more than ________ Internet hosts.
A. 1
million
B. 10
million
C. 100
million
D. 1
billion
D. 1
billion
It is
estimated that by 2022, the size of the B2B market will reach:
A. $730
million.
B. $7.3
billion.
C. $730
billion.
D. $7.3
trillion.
D. $7.3
trillion.
________
and ________ are typically the most easily identifiable aspects of a company's
business model.
Value
proposition; revenue model
Which of
the following is not an example of the bricks-and-clicks e-tailing business
model?
Select
one:
a.
Target
b.
Bluefly
c.
Walmart
d.
Staples
b.
Bluefly
All of
the following are business models employed in the online music industry except:
Select
one:
a.
download-and-own.
b.
peer-to-peer streaming.
c. cloud
streaming.
d.
subscription.
b.
peer-to-peer streaming.
All of
the following may lead to a competitive advantage except:
Select
one:
a. fewer
products.
b.
better employees.
c.
superior products.
d. less
expensive suppliers.
a. fewer
products.
Innovative
entrepreneurs and their business firms that destroy existing business models
are referred to as:
Select
one:
a. angel
investors.
b.
venture capitalists.
c.
crowdfunders.
d.
disruptors.
d.
disruptors.
Ariba is
an example of a________.
Select
one:
a.
portal
b.
e-distributor
c.
e-procurement firm
d.
Industry consortium
c.
e-procurement firm
Organizations
that typically provide an array of services to startup companies along with a
small amount of funding are referred to as:
Select
one:
a.
venture capital investors.
b.
incubators.
c.
crowdfunders.
d. angel
investors.
b.
incubators.
The
existence of many competitors in any one market segment may indicate:
Select
one:
a. no
one firm has differentiated itself within that market.
b. an
untapped market niche.
c. the
market is saturated.
d. a
market that has already been tried without success
c. the
market is saturated.
What is
the primary revenue model for an e-distributor?
Select
one:
a. sales
b.
subscription
c.
advertising
d.
transaction fee
a. sales
Which
element of the business model refers to the presence of substitute products in
the market?
Select
one:
a. value
proposition
b.
competitive environment
c.
competitive advantage
d. market
opportunity
b.
competitive environment
Which of
the following does not use a subscription revenue model?
Select
one:
a.
Twitter
b. Apple
Music
c.
Ancestry
d.
eHarmony
a.
Twitter
Which of
the following factors is not a significant influence on a company's competitive
environment?
Select
one:
a. the
availability of supportive organizational structures
b. how
many competitors are active
c. what
the market share of each competitor is
d. how
competitors price their products
a. the
availability of supportive organizational structures
Which of
the following is not a key element of an elevator pitch?
Select
one:
a.
market opportunity
b.
growth metrics
c. exit
strategy
d. legal
structure
d. legal
structure
Which of
the following is not a variation of the e-tailer business model?
Select
one:
a.
market creator
b.
bricks-and-clicks
c.
virtual merchant
d.
manufacturer-direct
a.
market creator
Which of
the following is not considered a portal?
Select
one:
a. MSN
b. Yahoo
c.
Amazon
d. AOL
c.
Amazon
E-commerce
has increased price competition in many markets.
Select
one:
True
False
True
Real
markets are imperfect.
Select
one:
True
False
True
SaaS and
PaaS providers can typically provide services at lower costs through scale
economies.
Select
one:
True
False
True
Slow
followers are sometimes more successful than first movers.
Select
one:
True
False
True
The Internet's
universal standards have changed industry structure by increasing barriers to
entry and decreasing competition within an industry.
Select
one:
True
False
False
________
is a model of computing in computer processing, storage, software, and other
services which are provided as a shared pool of virtualized resources over the
Internet.
Select
one:
a.
Client/server computing
b. P2P
computing
c.
Mobile computing
d. Cloud
computing
d. Cloud
computing
All of
the following either currently, or have plans to, offer Internet access via
satellite except:
Select
one:
a.
Facebook
b.
Boeing
c. Dish
d.
Microsoft
d.
Microsoft
During
which phase of the development of the Internet was the Domain Name System (DNS)
introduced?
Select
one:
a.
innovation phase
b.
institutional phase
c.
commercialization phase
d.
consolidation phase
b.
institutional phase
The
layer of Internet architecture that ties the applications to the communications
network and includes security and authentication services is called the:
Select
one:
a.
Transport Services and Representation Standards layer.
b.
Applications layer.
c.
Network Technology Substrate layer.
d.
Middleware Services layer.
d.
Middleware Services layer.
The
________ allows a natural language expression, such as Google.com to represent
a numeric IP address.
Select
one:
a.
uniform resource locator system
b.
domain name system
c.
assigned numbers and names (ANN) system
d.
Internet protocol addressing schema
b.
domain name system
The
major technologies used with wireless local area networks are:
Select
one:
a. WiMax
and 3G.
b.
Bluetooth and 3G.
c. Wi-Fi
and WiMax.
d. Wi-Fi
and Bluetooth.
d. Wi-Fi
and Bluetooth.
The
process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the
destination point is called:
Select
one:
a.
routing.
b. the
Transmission Control Protocol.
c.
packet switching.
d. the
File Transfer Protocol.
c.
packet switching.
The
protocol that enables the transmission of voice and other forms of audio
communication over the Internet is called:
Select
one:
a. IP.
b. VTP.
c. VoIP.
d. IPTP.
c. VoIP.
The
Transport Layer of TCP/IP is responsible for which of the following?
Select
one:
a.
providing a variety of applications with the ability to access the services of
the lower layers
b.
providing communication with the application by acknowledging and sequencing
the packets to and from the application
c.
addressing, packaging, and routing messages
d.
placing packets on and receiving them from the network medium
b.
providing communication with the application by acknowledging and sequencing
the packets to and from the application
The Web
runs in which layer of Internet architecture?
Select
one:
a.
Applications layer
b.
Network Technology Substrate layer
c.
Transport Services and Representation Standards layer
d.
Middleware Services layer
a.
Applications layer
Which of
the following are central directories that list all domain names currently in
use for specific domains?
Select
one:
a.
client servers
b. root
servers
c. Web
servers
d. DNS
servers
b. root
servers
Which of
the following is a programming language introduced by Apple specifically for
developing iOS applications?
Select
one:
a. C
b. C++
c.
Objective-C
d. Swift
d. Swift
Which of
the following is not true about the mobile platform?
Select
one:
a. Most
smartphones use Intel chips.
b.
Smartphones use flash memory chips.
c. Most
smartphones use either Google's Android or Apple's iOS operating systems.
d.
Smartphones and tablet computers are the primary means to access the Internet,
both in the United States and worldwide.
a. Most
smartphones use Intel chips.
Which of
the following statements about cloud computing is not true?
Select
one:
a. A
public cloud is typically used by companies with stringent privacy and security
requirements.
b. A
private cloud may be hosted internally or externally.
c.
Dropbox is an example of a public cloud.
d.
Hybrid clouds offer both public and private cloud options.
a. A
public cloud is typically used by companies with stringent privacy and security
requirements.
Which of
the following technologies has enabled the Internet to grow exponentially to
support millions of users, without overloading the network architecture?
Select
one:
a. IPv6
b. fiber
optics
c.
client/server computing
d. Wi-Fi
c.
client/server computing
Which of
the following is the most popular web browser?
Select
one:
a.
Internet Explorer
b.
Chrome
c.
Safari
d.
Firefox
b.
Chrome
A
private cloud is operated for the benefit of multiple firms.
Select
one:
True
False
False
HTTP/2 is
supported by almost all the leading web browsers.
Select
one:
True
False
True
The
Internet of Things (IoT) is based on sensors that can collect data and connect
to the Internet.
Select
one:
True
False
True
The term
latency refers to a delay that can be experienced in packet-switched networks.
Select
one:
True
False
True
All of
the following are online communications used to support the evaluation of
alternatives stages of the consumer decision process except:
Select
one:
A.
social networks.
B. targeted
banner ads.
C.
online catalogs.
D.
search engines.
B.
targeted banner ads.
Which of
the following is not one of the four main methods advertisers use to
behaviorally target ads?
Select
one:
A.
clickstream data
B.
Nielsen ratings
C.
integration of online data with offline data
D. data
collected from social networks
B.
Nielsen ratings
Amazon's
Associates program is an example of which of the following?
Select
one:
A. lead
generation marketing
B. viral
marketing
C. local
marketing
D.
affiliate marketing
D.
affiliate marketing
All of
the following are "traditional" online marketing tools except:
Select
one:
A.
affiliate marketing.
B.
e-mail and permission marketing.
C.
social marketing.
D.
sponsorship marketing.
C.
social marketing.
The Nike
iD program is an example of which of the following marketing techniques?
Select
one:
A. price
discrimination
B.
permission marketing
C.
customer co-production
D.
transactive content
C.
customer co-production
Group M,
the world's largest advertising buyer, requires which of the following in order
for an ad to be considered viewable?
Select
one:
A. 50%
of the pixels must be in view for at least one second.
B. 50%
of the pixels must be in view for at least two seconds.
C. 100%
of the pixels must be in view for at least two seconds
D. 100%
of the pixels must be in view for at least one second
D. 100%
of the pixels must be in view for at least one second
Which of
the following features of e-commerce technology has reduced the cost of
delivering marketing messages and receiving feedback from users?
Select
one:
A.
information density
B.
universal standards
C.
ubiquity
D.
richness
B.
universal standards
________
is an open source database that can store and analyze both structured and
unstructured data.
Select
one:
A. JSP
B. ASP
C. PHP
D.
Hadoop
D.
Hadoop
VTR
measures the ________ response rate to an ad.
Select
one:
A. 7-day
B.
30-minute
C.
24-hour
D.
30-day
D.
30-day
What kinds
of ads have the lowest CTR?
Select
one:
A.
e-mails to an in-house list
B. video
ads
C.
social network display ads
D.
banner display ads
D.
banner display ads
78)
View-to-cart ratio is a measure of the: 回答錯誤
A
.
A)
percentage of visitors who indicate an interest in a site's products by
registering or visiting a product's pages.
B
.
B)
percentage of views that lead to an add-to-cart action.
C
.
C)
percentage of existing customers who continue to buy on a regular basis.
D
.
D)
percentage of shoppers who do not return within a year after their initial
purchase.
正確答案: B
42. 女鞋業者Grace Gift利用素人以及知名部落客合作,推出其專屬商品,成功擄獲消費者的心而使商品大賣,請問Grace Gift是考慮到網路商業模式的哪種特性?[單選] 回答錯誤
A
.
服務面
B
.
核心面
C
.
策略面
D
.
業務面
正確答案: A
27.將傳統拍賣方式轉換到網際網路上來進行,此模式稱為?[單選] 回答錯誤
A
.
Internet
B
.
Intranet
C
.
Extranet
D
.
Outranet
正確答案: D
Research shows the two key factors shaping the decision to purchase online
are utility and trust.
Select
one:
True
False
True
Online
traffic is driven by offline brands and shopping.
Select
one:
True
False
True
The
highest amount of online advertising spending is for online video ads.
Select
one:
True
False
False
Consumers
tend to look at native ads more frequently than they look at display ads.
Select
one:
True
False
True
The
concept of "customer satisfaction" is broader than the concept of
"customer experience."
Select
one:
True
False
False
Transaction
logs are built into client software.
Select
one:
True
False
False
Approximately
________ of U.S. Internet users research online but do not buy.
Select
one:
A. 19%
B. 7.7%
C. 15%
D. 12.7%
D. 12.7%
The richness
made possible by e-commerce technologies does which of the following?
Select
one:
A. It
reduces the cost of delivering marketing messages and receiving feedback from
users.
B. It
enables worldwide customer service and marketing communications.
C. It
allows consumers to become co-producers of the goods and services being sold.
D. It
allows video, audio, and text to be integrated into a single marketing message
and consuming experience.
D. It
allows video, audio, and text to be integrated into a single marketing message
and consuming experience.
The
overall rate of online credit card fraud is ________ of all online card
transactions.
Select
one:
A.
around 10%
B.
around 5%
C. less
than 1%
D.
around 15%
C. less
than 1%
Which of
the following did the Internet Advertising Bureau urge advertisers to abandon?
Select
one:
A. HTML5
B. Adobe
Acrobat
C. HTML
D. Adobe
Flash
D. Adobe
Flash
Which
dimension(s) of security is spoofing a threat to?
Select
one:
A.
availability and integrity
B.
availability
C.
integrity and authenticity
D.
integrity
C.
integrity and authenticity
Beebone
is an example of which of the following?
Select
one:
A.
phishing
B. worm
C.
hacktivism
D.
botnet
D.
botnet
According
to Ponemon Institute's 2017 survey, which of the following was not among the
causes of the most costly cybercrimes?
Select
one:
A.
malicious code
B.
malicious insiders
C.
denial of service
D.
botnets
D.
botnets
All the
following statements about symmetric key cryptography are true except:
Select
one:
A.
symmetric key cryptography is computationally slower.
B.
symmetric key cryptography is a key element in digital envelopes.
C. in
symmetric key cryptography, both the sender and the receiver use the same key
to encrypt and decrypt a message.
D. the
Data Encryption Standard is a symmetric key encryption system.
A.
symmetric key cryptography is computationally slower.
The Data
Encryption Standard uses a ________-bit key.
Select
one:
A. 8
B. 56
C. 512
D. 256
b. 56
All of
the following statements about public key cryptography are true except:
Select
one:
A.
public key cryptography uses two mathematically related digital keys.
B. public
key cryptography ensures authentication of the sender.
C.
public key cryptography is based on the idea of irreversible mathematical
functions.
D.
public key cryptography does not ensure message integrity.
B.
public key cryptography ensures authentication of the sender.
A
________ is hardware or software that acts as a filter to prevent unwanted
packets from entering a network.
firewall
Which of
the following statements is not true?
Select
one:
A.
Biometric devices reduce the opportunity for spoofing.
B. A
retina scan is an example of a biometric device.
C.
Apple's Touch ID stores a digital replica of a user's actual fingerprint in
Apple's iCloud.
D.
Biometric data stored on an iPhone is encrypted.
C.
Apple's Touch ID stores a digital replica of a user's actual fingerprint in
Apple's iCloud.
An
intrusion detection system can perform all of the following functions except:
Select
one:
A.
examining network traffic.
B.
setting off an alarm when suspicious activity is detected.
C.
checking network traffic to see if it matches certain patterns or preconfigured
rules.
D.
blocking suspicious activity.
D.
blocking suspicious activity.
All of
the following statements about Apple Pay are true except which of the
following?
Select
one:
A. Apple
Pay is an example of a universal proximity mobile wallet.
B. Apple
Pay is the most popular alternative payment method in the United States.
C. Apple
Pay has more users than either Google Pay or Samsung Pay.
D. Apple
Pay can be used for mobile payments at the point of sale at a physical store
B. Apple
Pay is the most popular alternative payment method in the United States.
PCI-DSS
is a standard established by which of the following?
Select
one:
A. the
banking industry
B. the
retail industry
C. the federal
government
D. the
credit card industry
D. the
credit card industry
Which of
the following is a set of short-range wireless technologies used to share
information among devices within about two inches of each other?
Select
one:
A. IM
B. text
messaging
C. NFC
D. DES
C. NFC
Today,
online bill payment accounts for ________ of all bill payments, while paper
checks account for ________.
Select
one:
A. about
25%; about 10%
B. about
95%; about 5%
C. less
than 10%; less than 25%
D. more
than 55%; less than 20%
D. more
than 55%; less than 20%
Typically,
the more security measures added to an e-commerce site, the slower and more
difficult it becomes to use.
Select
one:
True
False
True
Phishing
attacks rely on browser parasites.
Select
one:
True
False
false
Exploit
kits can be purchased by users to protect their computers from malware.
Select
one:
True
False
false
The
easiest and least expensive way to prevent threats to system integrity is to
install anti-virus software.
Select
one:
True
False
true
________
are a kind of middleware software that provides the glue connecting traditional
corporate systems to the customer as well as all the functionality needed to
conduct e-commerce.
Select
one:
a. Web
page servers
b. Content management servers
c. Database servers
d. Application servers
d. Application servers
A
template test is a form of which type of testing?
Select
one:
a.
acceptance testing
b. unit
testing
c. A/B
testing
d.
system testing
c. A/B
testing
All of
the following are website design features that annoy customers except:
Select
one:
a.
slow-loading pages.
b.
multi-browser functionality.
c.
splash pages.
d.
pop-under ads.
b.
multi-browser functionality.
Beginning
the e-commerce development process with a mobile presence rather than a desktop
website is referred to as which of the following?
Select
one:
a. RWD
b.
mobile first design
c. AWD
d. RESS
b.
mobile first design
Django
is based on which of the following?
Select
one:
a. Ruby
on Rails
b. Perl
c.
Python
d. PHP
c.
Python
The
concept of a "sprint" is related to which of the following
development methodologies?
Select
one:
a. Scrum
b.
component-based development
c.
DevOps Apache
d.
prototyping
a. Scrum
The
leading web server software is:
Select
one:
a.
Apache.
b.
Google Enterprise Server.
c. Sun Solaris.
d. Microsoft Internet Information Server.
a.
Apache.
The primary
way a website is able to personalize the content presented to a visitor is
through the use of:
Select
one:
a.
accessibility rules.
b.
cookies.
c. site
management tools.
d.
privacy policies.
b.
cookies.
What are
the two most important management challenges in building a successful
e-commerce presence?
Select
one:
a.
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
b.
having an accurate understanding of your business environment and an achievable
business plan
c.
identifying the key components of your business plan and selecting the right
software, hardware, and infrastructure for your site
d.
building a team with the right skill sets and closely managing the development
process
a.
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
Which of
the following basic system functionalities is used to display goods on a
website?
Select
one:
a.
digital catalog
b.
customer database system
c.
product database
d.
shopping cart system
a.
digital catalog
Which of
the following helps you engage your customers in a conversation?
Select
one:
a.
shopping cart
b.
on-site blog
c.
product database
d. site tracking
and reporting system
b.
on-site blog
Which of
the following is a simple but powerful method for strategizing about a
business?
Select
one:
a.
benchmarking
b. SWOT
analysis
c.
DevOps
d. SLDC
b. SWOT
analysis
Which of
the following monitors and controls access to a main web server, and implements
firewall protection?
Select
one:
a.
groupware server
b. mail
server
c. proxy
server
d. list
server
c. proxy
server
Which of
the following verifies that the business objectives of the system are in fact
working?
Select
one:
a. unit
testing
b.
implementation testing
c.
acceptance testing
d.
system testing
c.
acceptance testing
Which of
the following would you use to verify that links on web pages are valid?
Select
one:
a. data
capture tools
b. HTTP
c. site
management tools
d. FTP
c. site
management tools
In
general, the annual system maintenance cost will roughly parallel the
development cost.
Select
one:
True
False
true
Native web
apps need to be developed for different mobile platforms.
Select
one:
True
False
true
The SDLC
methodology helps developers to understand the business objectives of a system
and design an appropriate solution.
Select
one:
True
False
true
The web
server software used has a significant impact on how a website's web pages look
on a user's computer.
Select
one:
True
False
false
All of
the following are simple steps for optimizing web page content except:
Select
one:
a.
reducing unnecessary HTML comments.
b. using
more efficient graphics.
c.
segmenting computer servers to perform dedicated functions.
d.
avoiding unnecessary links to other pages on the site.
c.
segmenting computer servers to perform dedicated functions.
Which of
the following is not part of the LAMP open source web development model?
Select
one:
a.
Microsoft IIS
b.
Apache
c. PHP
d. Linux
a.
Microsoft IIS
Which of
the following typically includes a data flow diagram (DF~to describe the flow
of information for an e-commerce site?
Select
one:
a.
logical design
b.
testing plan
c.
co-location plan
d.
physical design
a.
logical design
1.22)
Which of the following is the minimum system architecture requirement for an
e-commerce website that processes orders?
B.B)
two-tier architecture
2.「所有和Internet有關的行為都必須經過防火牆,所以防火牆可以記錄所 有Internet的活動事件。」此為防火牆的哪個功用?[單選]
B.B. 監視活動
3.67)
All of the following are important factors in search engine optimization
except:
D)
adhering to privacy policies.
4.電子商務網站最大的安全威脅來源是?[單選]
B. 內部鬆散的安全程序
5.9)
________ are the types of information systems capabilities needed to meet
business objectives.
B)
System functionalities
6.65)
Which of the following is the most commonly used server-side scripting
language?
C) PHP
7.21)
All of the following are simple steps for optimizing web page content except:
B)
segmenting computer servers to perform dedicated functions.
8.56)
Which of the following types of sites typically require a high percentage of
secure pages?
C)
trading
9.下列何者不屬於電子現金的特性?[單選]
B. 不可轉換性
10.17) Which
of the following details the actual hardware components to be used in a system?
D)
physical design
11.下列何者不屬於電子現金的特性?[單選]
B. 不可轉換性
12.16)
Which of the following typically includes a data flow diagram to describe the
flow of information for an e-commerce site?
B)
logical design
13.8) In
order from beginning to end, the major steps in the SDLC are:
A)
systems analysis/planning; systems design; building the system; testing; and
implementation.
14.28)
When using multivariate testing, if you wish to test three elements, such as an
image, a button, and a piece of text, each with two different versions, how
many combinations will you need to test?
D) 8
15.77)
All of the following are key design principles of responsive web design except:
C)
coding by convention.
16.7)
What are the two most important management challenges in building a successful
e-commerce presence?
A)
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
17.3. 只要透過個人電腦,結合「晶片金融卡」及「晶片卡讀卡機」連結至銀行網站,即可隨時隨地在網際網路上享有銀行所提供之 ATM 金融服務,這是指?(單選)
(B)
Web-ATM
18.48)
________ are a kind of middleware software that provides the glue connecting
traditional corporate systems to the customer as well as all the functionality
needed to conduct e-commerce.
A)
Application servers
19.11)
Which system functionality must your website have to be able to personalize or
customize a product for a client?
D)
customer on-site tracking
20.38)
The leading web server software is:
A)
Apache.
21.63)
Django is based on which of the following?
B)
Python
22.關於電子支付機制,下列何者有誤?[單選] 回答錯誤
D.電子錢包一般適合處理大額付款
23.在SET 機制中,除認證授權者、商家(特約商店)、持卡者外,還有那個重 要個體?[單選]
D. 付款閘道
24.23) The
concept of a “sprint” is related to which of the following development
methodologies?
B) Scrum
25.68)
________ scripts have become obsolete, due to security and other concerns and
have been replaced by more modern and secure methods.
A) CGI
26.下列何者不是電子現金的特性?[單選]
B. 不可轉換性
27.1)
Which of the following is a simple but powerful method for describing a firm’s
strengths and weaknesses?
C) SWOT
analysis
28.40)
Which of the following would you use to verify that links on web pages are
valid?
D) site
management tools
29.關於SET 的敘述,下列何者有誤?[單選]
D. 確認在SET 通訊協定中商店可看到客戶端之個人資訊,以確保交易進行
30.1. 電子憑證是?(單選)
(A) 網路購物的身分證明
31.78) Which
of the following is a server-side technique that detects the attributes of the
device making the request, and using predefined templates, loads a version of a
site optimized for the device?
B) AWD
32.防火牆的設定步驟為?[單選]
A. 開啟防火牆→勾選設定值→新增例外連結
33.33)
In general, the annual system maintenance cost will roughly parallel the
development cost.
是非題 (2 分) 2分
A.A
34.73)
The current versions of most web browsers no longer support Java applets.
是非題 (2 分) 2分
A.A
36.35)
Microservices are a very granular implementation of SOA.
是非題 (2 分) 2分
A.A
37.61)
Storing HTML pages in RAM rather than on a server's hard drive is an expensive
way to fine-tune the processing architecture of a website.
是非題 (2 分) 2分
B.B
38.59) All
of the following are methods of improving the processing architecture of a
website except:
是非題 (2 分) 2分
D)
adding web servers.
39.53)
Objects can be retrieved from a database using Java Server Pages.
是非題 (2 分) 2分
A.A
40.84)
Native web apps need to be developed for different mobile platforms.
是非題 (2 分) 2分
A.A
41.52)
Dynamic page generation enables price discrimination.
是非題 (2 分) 2分
A.A
42.30)
The SDLC methodology helps developers to understand the business objectives of
a system and design an appropriate solution.
是非題 (2 分) 2分
A.A
43.50)
The web server software used has a significant impact on how a website's web
pages look on a user's computer.
是非題 (2 分) 2分
B.B
44.57)
Which of the following is not a main factor in determining the overall demand
on an e-commerce site?
是非題 (2 分) 2分
A) file
sizes of web pages being served
45.32)
Using prebuilt templates is typically one of the most inexpensive options when
building an e-commerce site.
是非題 (2 分) 2分
A.A
46.58)
All of the following are steps one can take to right-size a website's hardware
platform and meet demands for service except:
是非題 (2 分) 2分
C)
replacing static pages with dynamically generated pages.
47.31)
Scrum is a type of agile development.
是非題 (2 分) 2分
A.A
48.60)
Upgrading a server from a single processor to multiple processors is an example
of scaling a site vertically.
是非題 (2 分) 2分
A.A
49.34) A
multi-tier architecture includes a web and database server.
是非題 (2 分) 2分
B
50.51)
DHMTL is used to generate dynamic web pages.
是非題 (2 分) 2分
B
--
1.下列何者不是電子現金的特性?[單選]
A
.
A. 可分性
B
.
B. 不可轉換性
C
.
C. 離線付款
D
.
D. 匿名性
正確答案: B
2.38)
The leading web server software is:
A
.
A)
Apache.
B
.
B)
Microsoft Internet Information Server.
C
.
C) Sun Solaris.
D
.
D) Google Enterprise Server.
正確答案: A
3.49) Which of the following is a standard that makes it possible to access
data from any application regardless of the database and operating system
software being used?
A
.
A) CGI
B
.
B) ODBC
C
.
C) MySQL
D
.
D) HTTP
正確答案: B
4.69)
________ is a programming language invented by Netscape used to control the
objects on an HTML page and handle interactions with the browser.
A
.
A)
Python
B
.
B) ASP
C
.
C) ColdFusion
D
.
D) JavaScript
正確答案: D
5.45) Which of the following technologies is used to separate the design
and presentation of content from the content creation process?
A
.
A) SOA
B
.
B) proxy
server
C
.
C)
shopping cart
D
.
D) CMS
正確答案: D
6.3. 只要透過個人電腦,結合「晶片金融卡」及「晶片卡讀卡機」連結至銀行網站,即可隨時隨地在網際網路上享有銀行所提供之 ATM 金融服務,這是指?(單選)
A
.
(A)
iCash
B
.
(B)
Web-ATM
C
.
(C)
Mondex
D
.
(D)
MasterCard
正確答案: B
7.根據調查,大部分的網路安全性威脅來自於?[單選]
A
.
A. 外部駭客
B
.
B. 內部人士的有心挪用
C
.
C. 網路顧客
D
.
D. 線上供應商
正確答案: B
8.80)
Building which of the following is the least expensive path to creating a
mobile presence?
A
.
A)
native app
B
.
B)
mobile website
C
.
C)
mobile web app
D
.
D)
hybrid HTTP
正確答案: B
9.46)
MySQL is which of the following?
A) open source
database software
10.1)
Which of the following is a simple but powerful method for describing a firm’s
strengths and weaknesses?
A
.
A)
benchmarking
B
.
B) SLDC
C
.
C) SWOT
analysis
D
.
D)
DevOps
正確答案: C
11.81)
Which of the following statements about mobile websites is not true?
A
.
A)
Mobile websites run on a firm's servers, just like a traditional website.
B
.
B) Mobile
websites can be built using standard web tools such as server-side HTML, Linux,
PHP and SQL.
C
.
C)
Generally, mobile websites operate more quickly than traditional websites
viewed on a desktop computer connected to a broadband office network.
D
.
D) Most
large firms today have mobile websites.
正確答案: C
12.23)
The concept of a “sprint” is related to which of the following development
methodologies?
A
.
A)
prototyping
B
.
B) Scrum
C
.
C)
component-based development
D
.
D)
DevOps
正確答案: B
13.66)
All of the following are website design features that annoy customers except:
A
.
A)
slow-loading pages.
B
.
B)
pop-under ads.
C
.
C)
splash pages.
D
.
D)
multi-browser functionality.
正確答案: D
14.43)
Which of the following cannot be used to retrieve objects from a database?
A
.
A)
Node.js
B
.
B)
ASP.NET
C
.
C) JSP
D
.
D) HTML
正確答案: D
15.1. 電子憑證是?(單選)
A
.
(A) 網路購物的身分證明
B
.
(B) 軟體的序號
C
.
(C) 應用軟體的開發商
D
.
(D) 作業系統中使用者的帳號和密碼
正確答案: A
16.79) Which
of the following statements about responsive web design (RWD) is not true?
A
.
A) RWD
works best for sites that have complex functionality.
B
.
B) RWD
tools include HTML5 and CSS3.
C
.
C) RWD
makes it possible to design a website that automatically adjusts its layout and
display according to the screen resolution of the device on which it is being
viewed.
D
.
D) RWD
can be costly.
正確答案: A
17.在SET 機制中,除認證授權者、商家(特約商店)、持卡者外,還有那個重 要個體?[單選]
A
.
A. 發卡者
B
.
B. 取得者
C
.
C. 信用卡品牌
D
.
D. 付款閘道
正確答案: D
18.電子現金的哪一個特性,可經由不同的存、提款設備,將電子現金儲存在 不同的設備中?[單選]
A
.
A. 匿名性
B
.
B. 可分性
C
.
C. 離線付款
D
.
D. 可轉換性
正確答案: D
19.39)
All of the following are basic functionality provided by web servers except:
D) a
shopping cart.
20.防火牆的設定步驟為?[單選]
A. 開啟防火牆→勾選設定值→新增例外連結
21.11)
Which system functionality must your website have to be able to personalize or
customize a product for a client?
A
.
A) an ad
server
B
.
B) a
site tracking and reporting system
C
.
C) an
inventory management system
D
.
D) customer
on-site tracking
正確答案: D
22.24)
Which of the following involves creating a skeleton version that focuses on
functionality rather than design?
A
.
A) web
services
B
.
B)
wireframing
C
.
C) Scrum
D
.
D) DevOps
正確答案: B
23.41) All of the following are examples of an open source content
management system (CMS) except: 回答錯誤
C) Dreamweaver CC.
24.電子商務網站最大的安全威脅來源是?[單選]
A
.
A. 詐欺
B
.
B. 內部鬆散的安全程序
C
.
C. 監聽程式的竊聽
D
.
D. 駭客入侵
正確答案: B
25.25) Which
of the following is the preferred method of implementing a service-oriented
architecture?
A
.
A)
prototyping
B
.
B) Scrum
C
.
C) web
services
D
.
D)
DevOps
正確答案: C
26.7)
What are the two most important management challenges in building a successful
e-commerce presence?
A
.
A)
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
B
.
B) having
an accurate understanding of your business environment and an achievable
business plan
C
.
C)
building a team with the right skill sets and closely managing the development
process
D
.
D)
identifying the key components of your business plan and selecting the right
software, hardware, and infrastructure for your site
正確答案: A
27.72)
Django follows the ________ programming principle.
A
.
A) CoC
B
.
B)
WYSIWYG
C
.
C) DRY
D
.
D) LAMP
正確答案: C
28.下列何者不屬於電子現金的特性?[單選]
A
.
A. 不易被複製或篡改
B
.
B. 不可轉換性
C
.
C. 具匿名性
D
.
D. 不可回溯性
正確答案: B
29.47)
All of the following are basic functionality provided by e-commerce merchant
server software except: 回答錯誤
B)
marketing analytics.
30.9)
________ are the types of information systems capabilities needed to meet
business objectives.
A
.
A)
Information requirements
B
.
B)
System functionalities
C
.
C)
System design specifications
D
.
D)
Physical design specifications
正確答案: B
31.19)
Which of the following involves testing a site's program modules one at a time?
A
.
A)
system testing
B
.
B)
acceptance testing
C
.
C) unit
testing
D
.
D)
implementation testing
正確答案: C
32.下列何者不屬於網路信用卡交易的參與者?[單選]
A
.
A. 持卡者
B
.
B. 商家
C
.
C. 發卡銀行
D
.
D. 政府
正確答案: D
33.53) Objects
can be retrieved from a database using Java Server Pages.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
34.34) A
multi-tier architecture includes a web and database server.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
35.57)
Which of the following is not a main factor in determining the overall demand
on an e-commerce site?
是非題 (2 分) 2分
A
.
A) file
sizes of web pages being served
B
.
B)
number of simultaneous users in peak periods
C
.
C) speed
of legacy applications that are needed to supply data to web pages
D
.
D)
whether content is dynamic or static
正確答案: A
36.35)
Microservices are a very granular implementation of SOA.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
37.31)
Scrum is a type of agile development.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
38.52)
Dynamic page generation enables price discrimination.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
39.33)
In general, the annual system maintenance cost will roughly parallel the
development cost.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
40.83) An
HTML5 app is one designed to specifically operate using a mobile device's
hardware and operating system.
是非題 (2 分) 2分
A
.
A
B
.
B
C
.
正確答案: B
41.30)
The SDLC methodology helps developers to understand the business objectives of
a system and design an appropriate solution.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
42.60)
Upgrading a server from a single processor to multiple processors is an example
of scaling a site vertically.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
43.59) All
of the following are methods of improving the processing architecture of a
website except:
是非題 (2 分) 2分
A
.
A)
separating static content from dynamic content.
B
.
B)
optimizing ASP code.
C
.
C)
optimizing the database schema.
D
.
D)
adding web servers.
正確答案: D
44.50)
The web server software used has a significant impact on how a website's web
pages look on a user's computer.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
45.58) All
of the following are steps one can take to right-size a website's hardware
platform and meet demands for service except:
是非題 (2 分) 2分
A
.
A)
scaling hardware vertically.
B
.
B)
scaling hardware horizontally.
C
.
C)
replacing static pages with dynamically generated pages.
D
.
D)
improving processing architecture.
正確答案: C
46.73)
The current versions of most web browsers no longer support Java applets.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
47.51)
DHMTL is used to generate dynamic web pages.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
48.84)
Native web apps need to be developed for different mobile platforms.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
49.61)
Storing HTML pages in RAM rather than on a server's hard drive is an expensive
way to fine-tune the processing architecture of a website.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
50.32)
Using prebuilt templates is typically one of the most inexpensive options when
building an e-commerce site.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
49) Which
of the following is a standard that makes it possible to access data from any
application regardless of the database and operating system software being
used?
A
.
A) CGI
B
.
B) ODBC
C
.
C) MySQL
D
.
D) HTTP
正確答案: B
2.2) The
cost of hardware, software, and telecommunications services needed to build a
website have ________ over the last decade.
A
.
A)
increased dramatically
B
.
B)
increased moderately
C
.
C)
decreased dramatically
D
.
D)
decreased slightly
正確答案: C
3.下列何者不屬於網路信用卡交易的參與者?[單選]
A
.
A. 持卡者
B
.
B. 商家
C
.
C. 發卡銀行
D
.
D. 政府
正確答案: D
4.63)
Django is based on which of the following?
A
.
A) PHP
B
.
B)
Python
C
.
C) Perl
D
.
D) Ruby
on Rails
正確答案: B
5.在網路保全的方式中,目前最常用的方式是?[單選]
A
.
A. DNA 驗證
B
.
B. 生物特徵辨識
C
.
C. 主機保全
D
.
D. 密碼設定
正確答案: D
6.65)
Which of the following is the most commonly used server-side scripting
language?
A
.
A) Ruby
on Rails
B
.
B)
Django
C
.
C) PHP
D
.
D) Perl
正確答案: C
7.在網路保全的方式中,目前最常用的方式是?[單選]
A
.
A. DNA 驗證
B
.
B. 生物特徵辨識
C
.
C. 主機保全
D
.
D. 密碼設定
正確答案: D
8.77)
All of the following are key design principles of responsive web design except:
A
.
A)
flexible grid-based layouts.
B
.
B) media
queries.
C
.
C)
coding by convention.
D
.
D)
flexible images and media.
正確答案: C
9.「所有和Internet有關的行為都必須經過防火牆,所以防火牆可以記錄所 有Internet的活動事件。」此為防火牆的哪個功用?[單選]
A
.
A. 隔離問題
B
.
B. 監視活動
C
.
C. 網路把關
D
.
D. 集中管理
正確答案: B
10.46)
MySQL is which of the following?
A
.
A) open
source database software
B
.
B)
scripting language embedded in HTML documents
C
.
C) web
server software
D
.
D)
website analytics software
正確答案: A
11.29)
The process of comparing a website with that of its competitors in terms of
response speed, quality of layout, and design is known as:
A
.
A) split
testing.
B
.
B) funnel
testing.
C
.
C)
benchmarking.
D
.
D)
system testing.
正確答案: C
12.55)
The term stateless refers to the fact that:
A
.
A) no
one government entity controls the Internet.
B
.
B) the
server does not have to maintain an ongoing dedicated interaction with the
client computer.
C
.
C)
system performance degrades as more simultaneous users require service.
D
.
D) web
servers may maintain multiple instances of server software to handle requests.
正確答案: B
13.10. 對電子商務安全機制的描述,下列何者不正確?(單選)
A
.
(A) 認證中心是整個電子商務的核心關鍵
B
.
(B) 金鑰有公開金鑰與私有金鑰兩種
C
.
(C) 所謂電子簽章就是把手寫筆跡數位化
D
.
(D) 加密方式目前大多採用 DES 或 RSA 演算法
正確答案: C
14.關於電子支付機制,下列何者有誤?[單選]
A
.
數位簽章具有交易者身份的識別
B
.
防火牆是針對資料庫的保護而設計
C
.
電子簽章具有不可否認性
D
.
電子錢包一般適合處理大額付款
正確答案: D
15.41) All
of the following are examples of an open source content management system (CMS)
except:
A
.
A)
Joomla.
B
.
B)
Drupal.
C
.
C)
Dreamweaver CC.
D
.
D)
WordPress.
正確答案: C
16.防火牆的設定步驟為?[單選]
A
.
A. 開啟防火牆→勾選設定值→新增例外連結
B
.
B. 勾選設定值→新增例外連結→開啟防火牆
C
.
C. 勾選設定值→開啟防火牆→新增例外連結
D
.
D. 新增例外連結→勾選設定值→開啟防火牆
正確答案: A
17.根據調查,大部分的網路安全性威脅來自於?[單選]
A
.
A. 外部駭客
B
.
B. 內部人士的有心挪用
C
.
C. 網路顧客
D
.
D. 線上供應商
正確答案: B
18.下列何者不屬於網路信用卡交易的參與者?[單選]
A
.
A. 持卡者
B
.
B. 商家
C
.
C. 發卡銀行
D
.
D. 政府
正確答案: D
19.39)
All of the following are basic functionality provided by web servers except:
A
.
A) site
management tools.
B
.
B) data
capture tools.
C
.
C)
security services.
D
.
D) a
shopping cart.
正確答案: D
20.下列何者不屬於電子現金的特性?[單選]
A
.
A. 不易被複製或篡改
B
.
B. 不可轉換性
C
.
C. 具匿名性
D
.
D. 不可回溯性
正確答案: B
21.15)
All of the following are basic information requirements for a product database
except:
A
.
A)
product descriptions.
B
.
B) stock
numbers.
C
.
C)
customer ID numbers.
D
.
D)
inventory levels.
正確答案: C
22.28) When
using multivariate testing, if you wish to test three elements, such as an
image, a button, and a piece of text, each with two different versions, how
many combinations will you need to test?
A
.
A) 2
B
.
B) 4
C
.
C) 6
D
.
D) 8
正確答案: D
23.26)
Which form of testing compares a control page with one that is very different?
A
.
A)
template test
B
.
B) new
concept test
C
.
C)
funnel test
D
.
D)
system test
正確答案: B
24.27) A
template test is a form of which type of testing?
A
.
A) unit
testing
B
.
B)
system testing
C
.
C)
acceptance testing
D
.
D) A/B
testing
正確答案: D
25.關於電子支付機制,下列何者有誤?[單選]
A
.
數位簽章具有交易者身份的識別
B
.
防火牆是針對資料庫的保護而設計
C
.
電子簽章具有不可否認性
D
.
電子錢包一般適合處理大額付款
正確答案: D
26.電子商務網站最大的安全威脅來源是?[單選]
A
.
A. 詐欺
B
.
B. 內部鬆散的安全程序
C
.
C. 監聽程式的竊聽
D
.
D. 駭客入侵
正確答案: B
27.23)
The concept of a “sprint” is related to which of the following development
methodologies?
A
.
A)
prototyping
B
.
B) Scrum
C
.
C) component-based
development
D
.
D)
DevOps
正確答案: B
28.「保護的對象應該是全部的Internet,而不只是在Internet和內部網路的連 接處進行安全措施」此為防火牆需注意的哪個項目?[單選]
B. 系統的補強角色
29.47)
All of the following are basic functionality provided by e-commerce merchant
server software except:
A
.
A) a
product catalog.
B
.
B)
marketing analytics.
C
.
C) a
shopping cart.
D
.
D)
credit card processing.
正確答案: B
30.關於SET 的敘述,下列何者有誤?[單選]
A
.
A. 可確認在Internet 線上交易,每個節點之訊息傳遞都是安全的
B
.
B. 可確保顧客資料輸入的隱密性
C
.
C. 可確認商店及持卡人雙方身份的正確性
D
.
D. 確認在SET 通訊協定中商店可看到客戶端之個人資訊,以確保交易進行
正確答案: D
31.18)
Which of the following verifies that the business objectives of the system are
in fact working?
A
.
A)
system testing
B
.
B)
acceptance testing
C
.
C) unit
testing
D
.
D)
implementation testing
正確答案: B
32.44)
Which of the following monitors and controls access to a main web server, and
implements firewall protection?
A
.
A) proxy
server
B
.
B) list
server
C
.
C)
groupware server
D
.
D) mail
server
正確答案: A
33.52) Dynamic
page generation enables price discrimination.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
34.61)
Storing HTML pages in RAM rather than on a server's hard drive is an expensive
way to fine-tune the processing architecture of a website.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
35.51)
DHMTL is used to generate dynamic web pages.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
36.32) Using
prebuilt templates is typically one of the most inexpensive options when
building an e-commerce site.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
37.31)
Scrum is a type of agile development.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
38.58)
All of the following are steps one can take to right-size a website's hardware
platform and meet demands for service except:
是非題 (2 分) 2分
A
.
A)
scaling hardware vertically.
B
.
B)
scaling hardware horizontally.
C
.
C) replacing
static pages with dynamically generated pages.
D
.
D)
improving processing architecture.
正確答案: C
39.33)
In general, the annual system maintenance cost will roughly parallel the
development cost.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
40.59)
All of the following are methods of improving the processing architecture of a
website except:
是非題 (2 分) 2分
A
.
A)
separating static content from dynamic content.
B
.
B)
optimizing ASP code.
C
.
C)
optimizing the database schema.
D
.
D) adding
web servers.
正確答案: D
41.57)
Which of the following is not a main factor in determining the overall demand
on an e-commerce site?
是非題 (2 分) 2分
A
.
A) file
sizes of web pages being served
B
.
B)
number of simultaneous users in peak periods
C
.
C) speed
of legacy applications that are needed to supply data to web pages
D
.
D)
whether content is dynamic or static
正確答案: A
42.34) A
multi-tier architecture includes a web and database server.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
43.84)
Native web apps need to be developed for different mobile platforms.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
44.50)
The web server software used has a significant impact on how a website's web
pages look on a user's computer.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
45.53) Objects
can be retrieved from a database using Java Server Pages.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
46.30)
The SDLC methodology helps developers to understand the business objectives of
a system and design an appropriate solution.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
47.83)
An HTML5 app is one designed to specifically operate using a mobile device's
hardware and operating system.
是非題 (2 分) 2分
A
.
A
B
.
B
C
.
正確答案: B
48.60)
Upgrading a server from a single processor to multiple processors is an example
of scaling a site vertically.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
49.73)
The current versions of most web browsers no longer support Java applets.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
50.35) Microservices
are a very granular implementation of SOA.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
-----------
1)
Offline media is typically used for all of the following marketing activities
except:
A)
education.
B)
exposure.
C)
conversation.
D)
branding
c
2) The
cost of hardware, software, and telecommunications services needed to build a
website have ________ over the last decade.
A)
increased dramatically
B)
increased moderately
C)
decreased dramatically
D)
decreased slightly
c
3) Which
of the following types of e-commerce presence is best suited for creating an
ongoing conversation with one's customers?
A)
website
B)
e-mail
C)
social media
D)
offline media
c
7) What are
the two most important management challenges in building a successful
e-commerce presence?
A)
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
B)
having an accurate understanding of your business environment and an achievable
business plan
C)
building a team with the right skill sets and closely managing the development
process
D)
identifying the key components of your business plan and selecting the right
software, hardware, and infrastructure for your site
a
8) In
order from beginning to end, the major steps in the SDLC are:
A)
systems analysis/planning; systems design; building the system; testing; and
implementation.
B)
systems design; testing; building the system; and implementation.
C)
systems analysis/planning; systems design; building the system; implementation;
and testing.
D)
systems analysis/planning; implementation; building the system; and testing.
a
9)
________ are the types of information systems capabilities needed to meet
business objectives.
A)
Information requirements
B)
System functionalities
C)
System design specifications
D)
Physical design specifications
b
10)
Which of the following basic system functionalities is used to display goods on
a website?
A)
product database
B)
digital catalog
C)
shopping cart system
D)
customer database system
b
11)
Which system functionality must your website have to be able to personalize or
customize a product for a client?
A) an ad
server
B) a site
tracking and reporting system
C) an
inventory management system
D)
customer on-site tracking
d
12)
Which of the following are the two main components of a systems design?
A)
logical design and physical design
B)
behavioral design and technological design
C)
business objectives and technology requirements
D)
front-end systems and back-end system
a
13)
Which of the following helps you engage your customers in a conversation?
A)
shopping cart
B)
product database
C)
on-site blog
D) site
tracking and reporting system
c
14)
Which of the following is not one of the basic business objectives for an
e-commerce site?
A)
display goods
B)
execute a transaction
C)
provide production and supplier links
D)
optimize system architecture
d
15) All
of the following are basic information requirements for a product database
except:
A)
product descriptions.
B) stock
numbers.
C)
customer ID numbers.
D)
inventory levels.
c
16) Which
of the following typically includes a data flow diagram (DFD) to describe the
flow of information for an e-commerce site?
A)
physical design
B)
logical design
C)
testing plan
D)
co-location plan
b
17)
Which of the following details the actual hardware components to be used in a
system?
A)
architecture plan
B)
system functionalities plan
C)
logical design
D)
physical design
d
18)
Which of the following verifies that the business objectives of the system are
in fact working?
A)
system testing
B)
acceptance testing
C) unit
testing
D)
implementation testing
b
19)
Which of the following involves testing a site's program modules one at a time?
A)
system testing
B)
acceptance testing
C) unit
testing
D)
implementation testing
c
20) Most
of the time required to maintain an e-commerce site is spent on:
A)
debugging code.
B)
responding to emergency situations.
C)
general administration and making changes and enhancements to the system.
D)
changes in reports, data files, and links to backend databases.
c
21) All
of the following are simple steps for optimizing web page content except:
A)
reducing unnecessary HTML comments.
B)
segmenting computer servers to perform dedicated functions.
C) using
more efficient graphics.
D)
avoiding unnecessary links to other pages on the site.
b
22)
Which of the following is the minimum system architecture requirement for an
e-commerce website that processes orders?
A)
single-tier architecture
B)
two-tier architecture
C)
three-tier architecture
D)
multi-tier architecture
b
23)
Which of the following does not offer website building tools?
A)
Squarespace
B)
Google Sites
C)
WordPress
D)
Apache
d
24) All
of the following are major players in hosting/co-location/cloud services
except:
A)
GoDaddy.
B)
WordPress.
C)
Verio.
D)
Liquid Web.
b
25)
Which form of testing compares a control page with one that is very different?
A)
template test
B) new
concept test
C)
funnel test
D)
system test
b
26) A template
test is a form of which type of testing?
A) unit
testing
B)
system testing
C)
acceptance testing
D) A/B
testing
d
27) When
using multivariate testing, if you wish to test two different versions of an
image, a button, and a piece of text, how many combinations will you need to
test?
A) 2
B) 4
C) 6
D) 8
d
28) The
process of comparing a website with that of its competitors in terms of
response speed, quality of layout, and design is known as:
A) split
testing.
B)
funnel testing.
C)
benchmarking.
D)
system testing.
c
36) All
of the following might be part of a website's middle-tier layer except:
A) a
database server.
B) an ad
server.
C)
legacy corporate applications.
D) a
mail server.
c
37) The
leading web server software is:
A)
Apache.
B)
Microsoft Internet Information Server.
C) Sun
Solaris.
D)
Google Enterprise Server
a
38) All
of the following are basic functionality provided by web servers except:
A) site
management tools.
B) data
capture tools.
C)
security services.
D) a shopping
cart.
d
39)
Which of the following is used to process certificates and private/public key
information?
A) HTTP
B)
Secure Sockets Layer/Transport Layer Security
C) File
Transfer Protocol
D) data
capture tools
b
40)
Which of the following would you use to verify that links on web pages are
valid?
A) HTTP
B) FTP
C) data
capture tools
D) site
management tools
d
41)
Which of the following is an example of a CMS?
A)
Apache
B)
Drupal
C)
Dreamweaver CC
D)
Webtrends Analytics
b
42)
Advantages of dynamic page generation include all of the following except:
A)
lowered menu costs.
B)
market segmentation.
C)
nearly cost-free price discrimination.
D)
client-side execution of programming.
d
43) Which
of the following cannot be used to retrieve objects from a database?
A) CGI
B) ASP
C) JSP
D) HTML
d
44)
Which of the following types of application server monitors and controls access
to a main web server, and implements firewall protection?
A) proxy
server
B) list
server
C)
groupware server
D) mail
server
a
45)
Which of the following technologies is used to separate the design and
presentation of content from the content creation process?
A) CGI
B) proxy
server
C)
shopping cart
D) CMS
d
---
C) SWOT
analysis
Which of
the following is a simple but powerful method for strategizing about a
business?
A)
benchmarking
B) SLDC
C) SWOT
analysis
D)
DevOps
C)
decreased dramatically
The cost
of hardware, software, and telecommunications services needed to build a
website have ________ over the last decade.
A)
increased dramatically
B)
increased moderately
C)
decreased dramatically
D)
decreased slightly
C)
social media
Which of
the following types of e-commerce presence is best suited for creating an
ongoing conversation with one's customers?
A)
website
B)
e-mail
C)
social media
D)
offline media
A)
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
What are
the two most important management challenges in building a successful
e-commerce presence?
A)
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
B)
having an accurate understanding of your business environment and an achievable
business plan
C)
building a team with the right skill sets and closely managing the development
process
D)
identifying the key components of your business plan and selecting the right
software, hardware, and infrastructure for your site
A)
systems analysis/planning; systems design; building the system; testing; and
implementation.
In order
from beginning to end, the major steps in the SDLC are:
A)
systems analysis/planning; systems design; building the system; testing; and
implementation.
B)
systems design; testing; building the system; and implementation.
C)
systems analysis/planning; systems design; building the system; implementation;
and testing.
D)
systems analysis/planning; implementation; building the system; and testing.
B)
System functionalities
________
are the types of information systems capabilities needed to meet business
objectives.
A)
Information requirements
B)
System functionalities
C)
System design specifications
D)
Physical design specifications
B)
digital catalog
Which of
the following basic system functionalities is used to display goods on a
website?
A)
product database
B)
digital catalog
C)
shopping cart system
D) customer
database system
D)
customer on-site tracking
Which
system functionality must your website have to be able to personalize or
customize a product for a client?
A) an ad
server
B) a
site tracking and reporting system
C) an
inventory management system
D)
customer on-site tracking
A)
logical design and physical design
Which of
the following are the two main components of a systems design?
A)
logical design and physical design
B)
behavioral design and technological design
C)
business objectives and technology requirements
D)
front-end systems and back-end systems
C)
on-site blog
Which of
the following helps you engage your customers in a conversation?
A)
shopping cart
B)
product database
C)
on-site blog
D) site
tracking and reporting system
D)
optimize system architecture
Which of
the following is not one of the basic business objectives for an e-commerce
site?
A)
display goods
B)
execute a transaction
C)
provide production and supplier links
D)
optimize system architecture
C) customer
ID numbers.
All of
the following are basic information requirements for a product database except:
A)
product descriptions.
B) stock
numbers.
C)
customer ID numbers.
D)
inventory levels.
B)
logical design
Which of
the following typically includes a data flow diagram (DFD) to describe the flow
of information for an e-commerce site?
A)
physical design
B)
logical design
C)
testing plan
D)
co-location plan
D)
physical design
Which of
the following details the actual hardware components to be used in a system?
A)
architecture plan
B)
system functionalities plan
C)
logical design
D)
physical design
B)
acceptance testing
Which of
the following verifies that the business objectives of the system are in fact
working?
A)
system testing
B)
acceptance testing
C) unit
testing
D)
implementation testing
C) unit
testing
Which of
the following involves testing a site's program modules one at a time?
A)
system testing
B)
acceptance testing
C) unit
testing
D)
implementation testing
C) general
administration and making changes and enhancements to the system.
Most of
the time required to maintain an e-commerce site is spent on:
A)
debugging code.
B)
responding to emergency situations.
C)
general administration and making changes and enhancements to the system.
D)
changes in reports, data files, and links to backend databases.
B)
segmenting computer servers to perform dedicated functions.
All of
the following are simple steps for optimizing web page content except:
A)
reducing unnecessary HTML comments.
B)
segmenting computer servers to perform dedicated functions.
C) using
more efficient graphics.
D)
avoiding unnecessary links to other pages on the site.
B)
two-tier architecture
Which of
the following is the minimum system architecture requirement for an e-commerce
website that processes orders?
A)
single-tier architecture
B)
two-tier architecture
C)
three-tier architecture
D)
multi-tier architecture
B) Scrum
The
concept of a "sprint" is related to which of the following
development methodologies?
A)
prototyping
B) Scrum
C)
component-based development
D)
DevOps Apache
B)
wireframing
Which of
the following involves creating a skeleton version that focuses on
functionality rather than design?
A) web
services
B)
wireframing
C) Scrum
D) DevOps
B) new
concept test
Which
form of testing compares a control page with one that is very different?
A)
template test
B) new
concept test
C)
funnel test
D)
system test
D) A/B
testing
A
template test is a form of which type of testing?
A) unit
testing
B)
system testing
C)
acceptance testing
D) A/B
testing
D) 8
When
using multivariate testing, if you wish to test two different versions of an
image, a button, and a piece of text, how many combinations will you need to
test?
A) 2
B) 4
C) 6
D) 8
C)
benchmarking.
The
process of comparing a website with that of its competitors in terms of
response speed, quality of layout, and design is known as:
A) split
testing.
B)
funnel testing.
C)
benchmarking.
D)
system testing.
C)
legacy corporate applications.
All of
the following might be part of a website's middle-tier layer except:
A) a
database server.
B) an ad
server.
C)
legacy corporate applications.
D) a
mail server.
A)
Apache.
The
leading web server software is:
A)
Apache.
B)
Microsoft Internet Information Server.
C) Sun
Solaris.
D)
Google Enterprise Server.
D) a
shopping cart.
All of
the following are basic functionality provided by web servers except:
A) site
management tools.
B) data
capture tools.
C)
security services.
D) a
shopping cart.
B)
Secure Sockets Layer/Transport Layer Security
Which of
the following is used to process certificates and private/public key
information?
A) HTTP
B)
Secure Sockets Layer/Transport Layer Security
C) File
Transfer Protocol
D) data
capture tools
D) site
management tools
Which of
the following would you use to verify that links on web pages are valid?
A) HTTP
B) FTP
C) data
capture tools
D) site
management tools
C)
Dreamweaver CC
All of the
following are examples of open source CMSs except:
A)
Joomla
B)
Drupal
C)
Dreamweaver CC
D)
WordPress
D)
client-side execution of programming.
Advantages
of dynamic page generation include all of the following except:
A)
lowered menu costs.
B)
market segmentation.
C)
nearly cost-free price discrimination.
D)
client-side execution of programming.
D) HTML
Which of
the following cannot be used to retrieve objects from a database?
A) CGI
B) ASP
C) JSP
D) HTML
A) proxy
server
Which of
the following monitors and controls access to a main web server, and implements
firewall protection?
A) proxy
server
B) list
server
C)
groupware server
D) mail
server
D) CMS
Which of
the following technologies is used to separate the design and presentation of
content from the content creation process?
A) CGI
B) proxy
server
C)
shopping cart
D) CMS
A) open
source database software
MySQL is
which of the following?
A) open
source database software
B) scripting
language embedded in HTML documents
C) web
server software
D)
website analytics software
B)
marketing analytics.
All of
the following are basic functionality provided by e-commerce merchant server
software except:
A) a
product catalog.
B)
marketing analytics.
C) a
shopping cart.
D)
credit card processing.
A)
Application servers
________
are a kind of middleware software that provides the glue connecting traditional
corporate systems to the customer as well as all the functionality needed to
conduct e-commerce.
A) Application servers
B) Web page servers
C) Database servers
D) Content management servers
B) ODBC
Which of
the following is a standard that makes it possible to access data from any
application regardless of the database and operating system software being
used?
A) CGI
B) ODBC
C) MySQL
D) HTTP
B) the
server does not have to maintain an ongoing dedicated interaction with the
client computer.
The term
stateless refers to the fact that:
A) no
one government entity controls the Internet.
B) the
server does not have to maintain an ongoing dedicated interaction with the
client computer.
C)
system performance degrades as more simultaneous users require service.
D) web servers
may maintain multiple instances of server software to handle requests.
C)
trading
Which of
the following types of sites typically require a high percentage of secure
pages?
A) web
services
B)
customer self-service
C)
trading
D)
publishing/subscription
A) file
sizes of web pages being served
Which of
the following is not a main factor in determining the overall demand on an
e-commerce site?
A) file
sizes of web pages being served
B)
number of simultaneous users in peak periods
C) speed
of legacy applications that are needed to supply data to web pages
D)
whether content is dynamic or static
C)
replacing static pages with dynamically generated pages.
All of
the following are steps one can take to right-size a website's hardware
platform and meet demands for service except:
A)
scaling hardware vertically.
B)
scaling hardware horizontally.
C)
replacing static pages with dynamically generated pages.
D)
improving processing architecture.
D)
adding web servers.
All of
the following are methods of improving the processing architecture of a website
except:
A)
separating static content from dynamic content.
B)
optimizing ASP code.
C)
optimizing the database schema.
D)
adding web servers.
B)
Python
Django
is based on which of the following?
A) PHP
B)
Python
C) Perl
D) Ruby
on Rails
B) CoC
Ruby on
Rails is based on which of the following philosophies?
A) SLDC
B) CoC
C) LAMP
D) Ajax
C) PHP
Which of
the following is the most commonly used server-side scripting language?
A) Ruby
on Rails
B)
Django
C) PHP
D) Perl
D)
multi-browser functionality.
All of
the following are website design features that annoy customers except:
A)
slow-loading pages.
B)
pop-under ads.
C)
splash pages.
D)
multi-browser functionality.
D)
adhering to privacy policies.
All of
the following are important factors in search engine optimization except:
A)
selecting keywords and page titles.
B)
encouraging other sites to link to your site.
C)
buying search engine ads.
D)
adhering to privacy policies.
A) CGI
________
provides a set of standards for communicating between a browser and a program
running on a server that allows for interaction between the user and server.
A) CGI
B) ColdFusion
C) JavaScript
D) VBScript
D) JavaScript
________
is a programming language invented by Netscape used to control the objects on
an HTML page and handle interactions with the browser.
A) VBScript
B) ActiveX
C) ColdFusion
D)
JavaScript
B)
cookies.
The
primary way a website is able to personalize the content presented to a visitor
is through the use of:
A)
privacy policies.
B)
cookies.
C)
accessibility rules.
D) site
management tools.
C)
Microsoft IIS
Which of
the following is not part of the LAMP open source web development model?
A) Linux
B)
Apache
C)
Microsoft IIS
D) PHP
C) DRY
Django
follows the ________ programming principle.
A) CoC
B)
WYSIWYG
C) DRY
D) LAMP
C)
coding by convention.
All of the
following are key design principles of responsive web design except:
A)
flexible grid-based layouts.
B) media
queries.
C)
coding by convention.
D)
flexible images and media.
B) AWD
Which of
the following is a server-side technique that detects the attributes of the
device making the request, and using predefined templates, loads a version of a
site optimized for the device?
A) LAMP
B) AWD
C)
mobile first design
D) RoR
A) RWD
works best for sites that have complex functionality.
Which of
the following statements about responsive web design (RWD) is not true?
A) RWD
works best for sites that have complex functionality.
B) RWD
tools include HTML5 and CSS3.
C) RWD
makes it possible to design a website that automatically adjusts its layout and
display according to the screen resolution of the device on which it is being
viewed.
D) RWD
can be costly.
B)
mobile website
Building
which of the following is the least expensive path to creating a mobile
presence?
A)
native app
B)
mobile website
C)
mobile web app
D)
hybrid HTTP
C)
Generally, mobile websites operate more quickly than traditional websites
viewed on a desktop computer connected to a broadband office network.
Which of
the following statements about mobile websites is not true?
A)
Mobile websites run on a firm's servers, just like a traditional website.
B)
Mobile websites can be built using standard web tools such as server-side HTML,
Linux, PHP and SQL.
C)
Generally, mobile websites operate more quickly than traditional websites
viewed on a desktop computer connected to a broadband office network.
D) Most
large firms today have mobile websites.
C)
mobile first design
Beginning
the e-commerce development process with a mobile presence rather than a desktop
website is referred to as which of the following?
A) RWD
B) AWD
C)
mobile first design
D) RESS
1) Which
of the following is a simple but powerful method for strategizing about a
business?
A)
benchmarking
B) SLDC
C) SWOT
analysis
D)
DevOps
Answer:
C
2) The
cost of hardware, software, and telecommunications services needed to build a
website have ________ over the last decade.
A)
increased dramatically
B)
increased moderately
C)
decreased dramatically
D)
decreased slightly
Answer:
C
3) Which
of the following types of e-commerce presence is best suited for creating an
ongoing conversation with one's customers?
A)
website
B)
e-mail
C)
social media
D)
offline media
Answer:
C
7) What
are the two most important management challenges in building a successful
e-commerce presence?
A)
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
B)
having an accurate understanding of your business environment and an achievable
business plan
C)
building a team with the right skill sets and closely managing the development
process
D)
identifying the key components of your business plan and selecting the right
software, hardware, and infrastructure for your site
Answer:
A
8) In
order from beginning to end, the major steps in the SDLC are:
A) systems
analysis/planning; systems design; building the system; testing; and
implementation.
B)
systems design; testing; building the system; and implementation.
C)
systems analysis/planning; systems design; building the system; implementation;
and testing.
D)
systems analysis/planning; implementation; building the system; and testing.
Answer:
A
9)
________ are the types of information systems capabilities needed to meet
business objectives.
A)
Information requirements
B)
System functionalities
C)
System design specifications
D)
Physical design specifications
Answer:
B
10)
Which of the following basic system functionalities is used to display goods on
a website?
A)
product database
B)
digital catalog
C)
shopping cart system
D)
customer database system
Answer:
B
11)
Which system functionality must your website have to be able to personalize or
customize a product for a client?
A) an ad
server
B) a
site tracking and reporting system
C) an
inventory management system
D)
customer on-site tracking
Answer:
D
12)
Which of the following are the two main components of a systems design?
A)
logical design and physical design
B)
behavioral design and technological design
C)
business objectives and technology requirements
D) front-end
systems and back-end systems
Answer:
A
13)
Which of the following helps you engage your customers in a conversation?
A)
shopping cart
B)
product database
C)
on-site blog
D) site
tracking and reporting system
Answer:
C
14)
Which of the following is not one of the basic business objectives for an
e-commerce site?
A)
display goods
B)
execute a transaction
C)
provide production and supplier links
D)
optimize system architecture
Answer:
D
15) All
of the following are basic information requirements for a product database
except:
A)
product descriptions.
B) stock
numbers.
C)
customer ID numbers.
D)
inventory levels
Answer:
C
16)
Which of the following typically includes a data flow diagram (DFD) to describe
the flow of information for an e-commerce site?
A)
physical design
B)
logical design
C)
testing plan
D)
co-location plan
Answer:
B
17)
Which of the following details the actual hardware components to be used in a
system?
A)
architecture plan
B)
system functionalities plan
C)
logical design
D) physical
design
Answer:
D
18)
Which of the following verifies that the business objectives of the system are
in fact working?
A)
system testing
B)
acceptance testing
C) unit
testing
D)
implementation testing
Answer:
B
19)
Which of the following involves testing a site's program modules one at a time?
A)
system testing
B)
acceptance testing
C) unit
testing
D)
implementation testing
Answer:
C
20) Most
of the time required to maintain an e-commerce site is spent on:
A)
debugging code.
B)
responding to emergency situations.
C)
general administration and making changes and enhancements to the system.
D)
changes in reports, data files, and links to backend databases
Answer:
C
21) All
of the following are simple steps for optimizing web page content except:
A)
reducing unnecessary HTML comments.
B)
segmenting computer servers to perform dedicated functions.
C) using
more efficient graphics.
D)
avoiding unnecessary links to other pages on the site.
Answer:
B
22)
Which of the following is the minimum system architecture requirement for an
e-commerce website that processes orders?
A)
single-tier architecture
B)
two-tier architecture
C)
three-tier architecture
D)
multi-tier architecture
Answer:
B
23) The
concept of a "sprint" is related to which of the following
development methodologies?
A)
prototyping
B) Scrum
C)
component-based development
D)
DevOps Apache
Answer:
B
24)
Which of the following involves creating a skeleton version that focuses on
functionality rather than design?
A) web
services
B)
wireframing
C) Scrum
D)
DevOps
Answer:
B
25)
Which form of testing compares a control page with one that is very different?
A)
template test
B) new
concept test
C)
funnel test
D)
system test
Answer:
B
26) A
template test is a form of which type of testing?
A) unit
testing
B)
system testing
C)
acceptance testing
D) A/B
testing
Answer:
D
27) When
using multivariate testing, if you wish to test two different versions of an
image, a button, and a piece of text, how many combinations will you need to
test?
A) 2
B) 4
C) 6
D) 8
Answer:
D
28) The
process of comparing a website with that of its competitors in terms of
response speed, quality of layout, and design is known as:
A) split
testing.
B)
funnel testing..
C)
benchmarking.
D) system
testing.
Answer:
C
29) The
SDLC methodology helps developers to understand the business objectives of a
system and design an appropriate solution.
TRUE
30)
Scrum is a type of agile development.
TRUE
31)
Using prebuilt templates is typically one of the most inexpensive options when
building an e-commerce site.
TRUE
32) In
general, the annual system maintenance cost will roughly parallel the
development cost.
TRUE
33) A
multi-tier architecture typically includes only a web server and a database
server.
FALSE
34) Web
services are loosely coupled, reusable software components based on XML and
other open protocols and standards that enable an application to communicate
with another application without requiring any custom programming.
TRUE
36) All
of the following might be part of a website's middle-tier layer except:
A) a
database server.
B) an ad
server.
C)
legacy corporate applications.
D) a
mail server.
Answer:
C
37) The
leading web server software is:
A)
Apache.
B) Microsoft
Internet Information Server.
C) Sun
Solaris.
D)
Google Enterprise Server.
Answer:
A
38) All
of the following are basic functionality provided by web servers except:
A) site
management tools.
B) data
capture tools.
C)
security services.
D) a
shopping cart.
Answer:
D
39)
Which of the following is used to process certificates and private/public key
information?
A) HTTP
B)
Secure Sockets Layer/Transport Layer Security
C) File
Transfer Protocol
D) data
capture tools
Answer:
B
40)
Which of the following would you use to verify that links on web pages are
valid?
A) HTTP
B) FTP
C) data
capture tools
D) site
management tools
Answer:
D
41) All
of the following are examples of open source CMSs except:
A)
Joomla
B)
Drupal
C)
Dreamweaver CC
D)
WordPress
Answer:
C
42)
Advantages of dynamic page generation include all of the following except:
A)
lowered menu costs.
B)
market segmentation.
C)
nearly cost-free price discrimination.
D)
client-side execution of programming.
Answer:
D
43)
Which of the following cannot be used to retrieve objects from a database?
A) CGI
B) ASP
C) JSP
D) HTML
Answer:
D
44)
Which of the following monitors and controls access to a main web server, and
implements firewall protection?
A) proxy
server
B) list
server
C)
groupware server
D) mail
server
Answer:
A
45)
Which of the following technologies is used to separate the design and
presentation of content from the content creation process?
A) CGI
B) proxy
server
C)
shopping cart
D) CMS
Answer:
D
46)
MySQL is which of the following?
A) open
source database software
B)
scripting language embedded in HTML documents
C) web
server software
D)
website analytics software
Answer:
A
47) All of
the following are basic functionality provided by e-commerce merchant server
software except:
A) a
product catalog.
B)
marketing analytics.
C) a
shopping cart.
D)
credit card processing.
Answer:
B
48)
________ are a kind of middleware software that provides the glue connecting
traditional corporate systems to the customer as well as all the functionality
needed to conduct e-commerce.
A) Application servers
B) Web page servers
C) Database servers
D) Content management servers
Answer:
A
49)
Which of the following is a standard that makes it possible to access data from
any application regardless of the database and operating system software being
used?
A) CGI
B) ODBC
C) MySQL
D) HTTP
Answer:
B
50) The
web server software used has a significant impact on how a website's web pages
look on a user's computer.
FALSE
51)
DHMTL is used to generate dynamic web pages
FALSE
52)
Dynamic page generation enables price discrimination.
TRUE
53)
Objects can be retrieved from the database using Java Server Pages.
TRUE
55) The
term stateless refers to the fact that:
A) no
one government entity controls the Internet.
B) the
server does not have to maintain an ongoing dedicated interaction with the
client computer.
C) system
performance degrades as more simultaneous users require service.
D) web
servers may maintain multiple instances of server software to handle requests.
Answer:
B
56)
Which of the following types of sites typically require a high percentage of
secure pages?
A) web
services
B)
customer self-service
C)
trading
D)
publishing/subscription
Answer:
C
57)
Which of the following is not a main factor in determining the overall demand
on an e-commerce site?
A) file
sizes of web pages being served
B)
number of simultaneous users in peak periods
C) speed
of legacy applications that are needed to supply data to web pages
D)
whether content is dynamic or static
Answer:
A
58) All
of the following are steps one can take to right-size a website's hardware
platform and meet demands for service except:
A)
scaling hardware vertically.
B)
scaling hardware horizontally.
C)
replacing static pages with dynamically generated pages.
D)
improving processing architecture.
Answer:
C
59) All
of the following are methods of improving the processing architecture of a
website except:
A)
separating static content from dynamic content.
B)
optimizing ASP code.
C)
optimizing the database schema.
D)
adding web servers.
Answer:
D
60) Upgrading
a server from a single processor to multiple processors is an example of
scaling a site vertically.
TRUE
61)
Storing HTML pages in RAM rather than on a server's hard drive is an expensive
way to fine-tune the processing architecture of a website.
FALSE
63)
Django is based on which of the following?
A) PHP
B)
Python
C) Perl
D) Ruby
on Rails
Answer:
B
64) Ruby
on Rails is based on which of the following philosophies?
A) SLDC
B) CoC
C) LAMP
D) Ajax
Answer:
B
65)
Which of the following is the most commonly used server-side scripting
language?
A) Ruby
on Rails
B)
Django
C) PHP
D) Perl
Answer:
C
66) All
of the following are website design features that annoy customers except:
A)
slow-loading pages.
B)
pop-under ads.
C)
splash pages.
D)
multi-browser functionality
Answer:
D
67) All
of the following are important factors in search engine optimization except:
A)
selecting keywords and page titles.
B)
encouraging other sites to link to your site.
C)
buying search engine ads.
D) adhering
to privacy policies
Answer:
D
68)
________ provides a set of standards for communicating between a browser and a
program running on a server that allows for interaction between the user and
server.
A) CGI
B)
ColdFusion
C)
JavaScript
D)
VBScript
Answer:
A
69)
________ is a programming language invented by Netscape used to control the
objects on an HTML page and handle interactions with the browser.
A) VBScript
B) ActiveX
C) ColdFusion
D)
JavaScript
Answer:
D
70) The
primary way a website is able to personalize the content presented to a visitor
is through the use of:
A)
privacy policies.
B)
cookies.
C)
accessibility rules.
D) site
management tools.
Answer:
B
71)
Which of the following is not part of the LAMP open source web development
model?
A) Linux
B)
Apache
C)
Microsoft IIS
D) PHP
Answer:
C
72)
Django follows the ________ programming principle.
A) CoC
B)
WYSIWYG
C) DRY
D) LAMP
Answer:
C
73) A security
hole known as Shellshock enabled hackers to target JavaScript running on Apache
web servers.
FALSE
77) All
of the following are key design principles of responsive web design except:
A)
flexible grid-based layouts.
B) media
queries.
C)
coding by convention.
D)
flexible images and media.
Answer:
C
78)
Which of the following is a server-side technique that detects the attributes
of the device making the request, and using predefined templates, loads a
version of a site optimized for the
device?
A) LAMP
B) AWD
C)
mobile first design
D) RoR
Answer:
B
79)
Which of the following statements about responsive web design (RWD) is not
true?
A) RWD
works best for sites that have complex functionality.
B) RWD
tools include HTML5 and CSS3.
C) RWD
makes it possible to design a website that automatically adjusts its layout and
display according to the screen resolution of the device on which it is being
viewed.
D) RWD
can be costly.
Answer:
A
80)
Building which of the following is the least expensive path to creating a
mobile presence?
A)
native app
B)
mobile website
C)
mobile web app
D)
hybrid HTTP
Answer:
B
81)
Which of the following statements about mobile websites is not true?
A) Mobile
websites run on a firm's servers, just like a traditional website.
B)
Mobile websites can be built using standard web tools such as server-side HTML,
Linux, PHP and SQL.
C)
Generally, mobile websites operate more quickly than traditional websites
viewed on a desktop computer connected to a broadband office network.
D) Most
large firms today have mobile websites.
Answer:
C
82)
Beginning the e-commerce development process with a mobile presence rather than
a desktop website is referred to as which of the following?
A) RWD
B) AWD
C)
mobile first design
D) RESS
Answer:
C
83) An
HTML5 app is one designed to specifically operate using a mobile device's
hardware and operating system.
FALSE
84)
Native web apps need to be developed for different mobile platforms
TRUE
In order
from beginning to end, the major steps in the SDLC are:
systems
analysis/planning; systems design; building the system; testing; and
implementation.
A
multi-tier architecture includes a web and database server.
False
Which of
the following is not one of the basic business objectives for an e-commerce
site?
optimize
system architecture
Microservices
are a very granular implementation of SOA.
True
A
template test is a form of which type of testing?
A/B
testing
Which of
the following is the preferred method of implementing a service-oriented
architecture?
web
services
Using
prebuilt templates is typically one of the most inexpensive options when
building an e-commerce site.
True
The cost
of hardware, software, and telecommunications services needed to build a
website have ________ over the last decade.
decreased
dramatically
Scrum is
a type of agile development.
True
Which of
the following involves testing a site's program modules one at a time?
unit
testing
Which of
the following typically includes a data flow diagram to describe the flow of
information for an e-commerce site?
logical
design
The
concept of a "sprint" is related to which of the following
development methodologies?
Scrum
Which of
the following is a simple but powerful method for describing a firm's strengths
and weaknesses?
SWOT
Analysis
Which of
the following basic system functionalities is used to display goods on a
website?
digital
catalog
Which
form of testing compares a control page with one that is very different?
new
concept test
What are
the two most important management challenges in building a successful
e-commerce presence?
developing
a clear understanding of business objectives and knowing how to choose the
right technology to achieve those objectives
Which
system functionality must your website have to be able to personalize or
customize a product for a client?
customer
on-site tracking
The SDLC
methodology helps developers to understand the business objectives of a system
and design an appropriate solution.
True
The
process of comparing a website with that of its competitors in terms of
response speed, quality of layout, and design is known as:
benchmarking
________
are the types of information systems capabilities needed to meet business
objectives.
System
functionalites
Which of
the following is the minimum system architecture requirement for an e-commerce
website that processes orders?
two-tier
architecture
In
general, the annual system maintenance cost will roughly parallel the
development cost.
True
All of
the following are simple steps for optimizing web page content except:
segmenting
computer servers to perform dedicated functions.
Which of
the following types of e-commerce presence is best suited for creating an
ongoing conversation with one's customers?
social
media
Which of
the following details the actual hardware components to be used in a system?
physical
design
Which of
the following involves creating a skeleton version that focuses on
functionality rather than design?
wireframing
All of
the following are basic information requirements for a product database except:
customer
ID numbers
Which of
the following are the two main components of a systems design?
logical
design and physical design
Which of
the following verifies that the business objectives of the system are in fact
working?
acceptance
testing
Which of
the following helps you engage your customers in a conversation?
on-site
blog
1.下列何者非數位匯流的概念?[單選]
B. 經由郵局寄送信件
2.Amazon.com提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一個概念?[單選]
A. 網路交易模式
3.請問下列何者非呈現式廣告的概念?[單選]
B. 又稱為關鍵字廣告
4.我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術是下列何者?[單選]
D. 影音串流
5.下列何者非數位匯流的概念?[單選]
B. 經由郵局寄送信件
6.Amazon.com提供更多樣的產品與快速的送貨服務,是屬於網路應用技術發展的哪一個概念?[單選]
A. 網路交易模式
7.讓使用者透過網路來通話、訊息傳遞、資訊往來或分享影像的系統,這是指下列何者?[單選]
C. 即時通訊
8.適地性服務(Location Based
Service,LBS)就屬於環境感知所延伸出的應用,請問此服務教符合下列何者應用?[單選]
B. 行動商務
9.下列何者非數位匯流的概念?(單選)
(B) 經由郵局寄送信件
10.讓使用者透過網路來通話、訊息傳遞、資訊往來或分享影像的系統,是指下列何者?(單選)
(C) 即時通訊
11.請問下列何者非呈現式廣告的概念?(單選)
(B) 又稱為關鍵字廣告
12.我們可以利用網路直接進行觀看,傳輸時就可以同步觀賞的技術是下列何者?(單選)
(D) 影音串流
13.Confidentiality
is sometimes confused with:
A)
privacy.
14.________
is the ability to ensure that e-commerce participants do not deny their online
actions.
A)
Nonrepudiation
15.________
is the ability to identify the person or entity with whom you are dealing on
the Internet.
B)
Authenticity
16.________
is the ability to ensure that an e-commerce site continues to function as
intended.
C)
Availability
17.Which
of the following is an example of an online privacy violation?
B) your
online purchasing history being sold to other merchants without your consent
18.Which
of the following is not a key factor for establishing e-commerce security?
A) data
integrity
19.According
to Ponemon Institute's 2019 survey, which of the following was not among the
causes of the costliest cybercrimes?
D)
botnets
20.Which
of the following statements about data breaches in 2019 is not true?
C)
According to the Identity Theft Resource Center, employee error was the leading
cause of data breaches.
21.Which
of the following is a brute force attack which hackers launch via botnets and
automated tools using known user name and password combinations?
A)
credential stuffing
22.Which
of the following is not an example of malicious code?
D)
sniffer
23.Beebone
is an example of which of the following?
B)
botnet
24.Which
of the following is not an example of a potentially unwanted program (PUP)?
C)
drive-by download
25.Which
of the following was designed to cripple Iranian nuclear centrifuges?
A)
Stuxnet
26.________
typically attack governments, organizations, and sometimes individuals for
political purposes.
D)
Hacktivists
27.A
Trojan horse appears to be benign, but then does something other than expected.
是非題 (2 分) 2分
A.O
28.Spoofing
is the attempt to hide a hacker's true identity by using someone else's e-mail
or IP address.
是非題 (2 分) 2分
A.O
29.A
drive-by download is malware that comes with a downloaded file that a user
intentionally or unintentionally requests.
是非題 (2 分) 2分
A.O
30.FREAK
is an example of a software vulnerability.
是非題 (2 分) 2分
A.O
31.The
Data Encryption Standard uses a(n) ________-bit key.
B) 56
32.All
of the following statements about public key cryptography are true except:
B)
public key cryptography ensures authentication of the sender.
33.All of
the following are features of WPA3 except:
B) it
enables the creation of a VPN.
34.All
of the following statements about PKI are true except:
C) PKI
guarantees that the verifying computer of the merchant is secure.
35.Which
of the following dimensions of e-commerce security is not provided for by
encryption?
B)
availability
36.A
________ is hardware or software that acts as a filter to prevent unwanted
packets from entering a network.
A)
firewall
37.Proxy
servers are also known as __________ because they have two network interfaces.
C) dual
home systems
38.Which
of the following statements is not true?
A)
Apple's Touch ID stores a digital replica of a user's actual fingerprint in
Apple's iCloud.
39.Face
ID is an example of which of the following?
是非題 (2 分) 2分
A)
biometrics
40.Which
of the following is the most common protocol for securing a digital channel of
communication?
是非題 (2 分) 2分
B) TLS
41.The
easiest and least expensive way to prevent threats to system integrity is to
install anti-virus software.
是非題 (2 分) 2分
A.O
42.What
is the first step in developing an e-commerce security plan?
C)
Perform a risk assessment.
43.Which
of the following statements is not true?
C) The
Cybersecurity Information Sharing Act was strongly supported by most large
technology companies and privacy advocates.
44.Which
of the following statements about blockchain is not true?
B) A
blockchain system is inherently centralized.
45.PCI-DSS
is a standard established by which of the following?
B) the
credit card industry
46.Which
of the following is a set of short-range wireless technologies used to share
information among devices within about two inches of each other?
B) NFC
47.All
of the following are examples of cryptocurrencies except:
C)
Zelle.
48.Bluetooth
is the primary enabling technology for mobile wallets.
是非題 (2 分) 2分
B.X
49.There
is a finite number of Bitcoins that can be created.
是非題 (2 分) 2分
A.O
50.According
to the most recent Fiserv survey, 65% of consumers in the United States have
used online bill payment.
是非題 (2 分) 2分
A.O
<第五章> 電子商務的應用技術發展
1.(B) 下列何者非數位匯流的概念?
B. 經由郵局寄送信件
2.(ABCD)
數位匯流可以包括哪四種不同的產業?
A. IT產業 B. 電信產業
C. 消費性電子產業 D. 娛樂產業
3.(A) Amazon.com
提供更多樣的產品與快速的送貨服務,是
屬於網路應用技術發展的哪一個概念?
A. 網路交易模式
4. (ABC)
第三方支付包括下列哪些特點?
A. 靈活的支付模式 B. 嚴格的監督機制
C. 保障的獨立機構
5.(C) 讓使用者透過網路來通話、訊息傳遞、資訊往來或分享
影像的系統,這是指下列何者?
C. 即時通訊
6.(ABCD)下列哪些屬於即時通訊?
A.
MSN B. Whatapp
C.
WeChat D. Line
7.(B) 請問下列何者非呈現式廣告的概念?
B. 又稱為關鍵字廣告
8.(D) 我們可以利用網路直接進行觀看,傳輸時就可以同步觀
賞的技術是下列何者?
D.影音串流
9.(ABC) 影音串流的三大平臺是指哪三個?
A.
Windows Media Player B. Real Player
C.
QuickTime Player
10.(ABCD)
社群網站的商業模式包括哪些?
A. 廣告收入模式 B. 使用者收費模式
C. 導購模式 D. 遊戲模式
11.(B) 適地性服務(Location Based Service,LBS) 就屬於環境
感知所延伸出的應用,請問此服務叫符合下列何者應用?
B. 行動商務
1)
Confidentiality is sometimes confused with:
A)
privacy.
2)
________ refers to the ability to ensure that e-commerce participants do not
deny their online actions.
A)
Nonrepudiation
3)
________ refers to the ability to identify the person or entity with whom you
are dealing on the Internet.
B)
Authenticity
4) Which
of the following is an example of an integrity violation of e-commerce
security?
D) An
unauthorized person intercepts an online communication and changes its
contents.
5)
________ refers to the ability to ensure that an e-commerce site continues to
function as intended.
C)
Availability
6) Which
of the following is an example of an online privacy violation?
B) your
online purchasing history being sold to other merchants without your consent
7)
________ refers to the ability to ensure that messages and data are only
available to those authorized to view them.
A)
Confidentiality
10) All
of the following experienced high-profile data breaches in 2015 except:
C)
Amazon.
11)
Bitcoins are an example of:
A)
digital cash.
13)
Which of the following has the Internet Advertising Bureau urged advertisers to
abandon?
C) Adobe
Flash
14)
Accessing data without authorization on Dropbox is an example of which of the
following?
B) cloud
security issue
15) All
of the following are prominent hacktivist groups except:
D) Avid
Life.
16)
Conficker is an example of a:
B) worm.
17)
Which of the following is the leading cause of data breaches?
C)
hackers
18)
Software that is used to obtain private user information such as a user's
keystrokes or copies of e-mail is referred to as:]
A)
spyware.
19) In
2016, Yahoo revealed that it had experienced which of the following?
A) a
high-profile data breach
20) What
is the most frequent cause of stolen credit cards and card information today?
B) the
hacking and looting of corporate servers storing credit card information
21)
Which dimension(s) of security is spoofing a threat to?
C)
integrity and authenticity
22)
________ is not an example of malicious code.
D) A
sniffer
23) The
attack on Dyn, Twitter, Amazon, and other major organizations in October 2016,
is an example of which of the following?
C) DDoS
attack
24)
Angler is an example of:
B) an
exploit kit.
25)
Malware that comes with a downloaded file requested by a user is called a:
C)
drive-by download.
26) Which
of the following is not an example of a PUP?
C)
drive-by download
27)
Which of the following was designed to cripple Iranian nuclear centrifuges?
A)
Stuxnet
28)
Automatically redirecting a web link to a different address is an example of:
C)
pharming.
29)
Shellshock is an example of which of the following?
B)
software vulnerability
30)
According to Ponemon Institute's 2015 survey, which of the following was not
among the causes of the costliest cybercrimes?
D)
botnets
31)
________ typically attack governments, organizations, and sometimes individuals
for political purposes.
D)
Hacktivists
44) Next
generation firewalls provide all of the following except:
C) the
ability to automatically update applications with security patches.
48) All
of the following statements about public key cryptography are true except:
B)
public key cryptography ensures authentication of the sender.
51) A
digital certificate contains all of the following except the:
A)
subject's private key.
52)
Which of the following dimensions of e-commerce security does not involve
encryption?
B)
availability
54) A
________ is a hardware or software component that acts as a filter to prevent
unwanted packets from entering a network.
A)
firewall
55)
Proxy servers are also known as:
C) dual
home systems.
56) All
of the following are used for authentication except:
D)
packet filters.
57) An
intrusion detection system can perform all of the following functions except:
D)
blocking suspicious activity.
58) Which
of the following is not an example of an access control?
C)
digital signatures
60)
Which of the following statements is not true?
A)
Apple's Touch ID stores a user's actual fingerprint.
61) A
fingerprint scan is an example of which of the following?
A)
biometrics
68) What
is the first step in developing an e-commerce security plan?
C)
Perform a risk assessment.
69) To
allow lower-level employees access to the corporate network while preventing
them from accessing private human resources documents, you would use:
B) an
authorization management system.
70)
Which of the following statements is not true?
C) The
Cybersecurity Information Sharing Act was strongly supported by most large
technology companies and privacy advocates.
71) All
of the following are examples of social/mobile peer-to-peer payment systems
except:
B) Bill
Me Later.
72) All
of the following statements about Apple Pay are true except which of the
following?
A) Apple
Pay is subject to recent regulations issued by the Bureau of Consumer Financial
Protection applicable to GPR transactions.
73)
PayPal is an example of a(n):
A)
online stored value payment system.
74)
PCI-DSS is a standard established by which of the following?
B) the
credit card industry
75)
Which of the following is not a major trend in e-commerce payments in
2016-2017?
A)
Mobile retail payment volume decreases.
76) All
of the following are limitations of the existing online credit card payment
system except:
B) cost
to consumers.
77)
Linden Dollars, created for use in Second Life, are an example of:
B)
virtual currency.
1)
Confidentiality is sometimes confused with:
A)
privacy.
B)
authenticity.
C)
integrity.
D)
nonrepudiation
a
2) ________
is the ability to ensure that e-commerce participants do not deny their online
actions.
A)
Nonrepudiation
B)
Authenticity
C)
Availability
D)
Integrity
a
3)
________ is the ability to identify the person or entity with whom you are
dealing on the Internet.
A)
Nonrepudiation
B)
Authenticity
C)
Availability
D)
Integrity
b
4) Which
of the following is an example of an integrity violation of e-commerce
security?
A) A
website is not actually operated by the entity the customer believes it to be.
B) A
merchant uses customer information in a manner not intended by the customer.
C) A
customer denies that he is the person who placed the order.
D) An
unauthorized person intercepts an online communication and changes its contents
d
5)
________ is the ability to ensure that an e-commerce site continues to function
as intended.
A)
Nonrepudiation
B)
Authenticity
C)
Availability
D)
Integrity
c
6) Which
of the following is an example of an online privacy violation?
A) your
e-mail being read by a hacker
B) your
online purchasing history being sold to other merchants without your consent
C) your
computer being used as part of a botnet
D) your
e-mail being altered by a hacker
b
7)
________ is the ability to ensure that messages and data are only available to
those authorized to view them.
A)
Confidentiality
B)
Integrity
C)
Privacy
D)
Availability
a
11)
Bitcoins are an example of:
A)
digital cash.
B)
virtual currency.
C) a
stored value payment system.
D) an
EBPP system.
a
12) The
overall rate of online credit card fraud is ________ of all online card
transactions.
A) less
than 1%
B)
around 5%
C)
around 10%
D)
around 15%
a
13)
Which of the following has the Internet Advertising Bureau urged advertisers to
abandon?
A) HTML
B) HTML5
C) Adobe
Flash
D) Adobe
Acrobat
c
14)
Accessing data without authorization on Dropbox is an example of a:
A)
social network security issue.
B) cloud
security issue.
C) mobile
platform security issue.
D)
sniffing issue
b
15)
Which of the following is not a key factor for establishing e-commerce
security?
A) data
integrity
B)
technology
C)
organizational policies
D) laws
and industry standards
a
16)
Conficker is an example of a:
A)
virus.
B) worm.
C)
Trojan horse.
D)
botnet
b
17)
Which of the following is the leading cause of data breaches?
A) theft
of a computer
B)
accidental disclosures
C)
hackers
D) DDoS
attacks
c
18)
Software that is used to obtain private user information such as a user's
keystrokes or copies of e-mail is referred to as:
A)
spyware.
B) a
backdoor.
C)
browser parasite.
D)
adware.
a
19) According
to Symantec, almost half of the e-mail addresses involved in business e-mail
compromise (BEC) phishing that it analyzed had an IP address originating in:
A)
China.
B)
Russia.
C)
Nigeria.
D) North
Korea
c
20) What
is the most frequent cause of stolen credit cards and card information today?
A) lost
cards
B) the
hacking and looting of corporate servers storing credit card information
C)
sniffing programs
D)
phishing attacks
b
21)
Which dimension(s) of security is spoofing a threat to?
A)
integrity
B)
availability
C)
integrity and authenticity
D)
availability and integrity
c
22)
Which of the following is not an example of malicious code?
A)
scareware
B)
Trojan horse
C) bot
D)
sniffer
d
23) The
attack on Dyn Inc., in October 2016 is an example of which of the following?
A) SQL
injection attack
B)
browser parasite
C) DDoS
attack
D) MitM
attack
c
24)
Angler is an example of which of the following?
A) worm
B)
exploit kit
C)
phishing
D)
hacktivism
b
25) Malware
that comes with a downloaded file that a user requests is called a:
A)
Trojan horse.
B)
backdoor.
C)
drive-by download.
D) PUP
c
26)
Which of the following is not an example of a PUP?
A)
adware
B)
browser parasite
C)
drive-by download
D)
spyware
c
27)
Which of the following was designed to cripple Iranian nuclear centrifuges?
A)
Stuxnet
B) Flame
C) Snake
D) Storm
a
28) Automatically
redirecting a web link to a different address is an example of which of the
following?
A)
sniffing
B)
social engineering
C)
pharming
D) DDoS
attack
c
29)
According to Symantec, the number of data breaches in 2016 increased by
________ compared to 2015.
A) 100%
B) 15%
C) 150%
D) 20%
d
30)
According to Ponemon Institute's 2017 survey, which of the following was not
among the causes of the most costly cybercrimes?
A)
malicious insiders
B)
malicious code
C)
denial of service
D)
botnets
d
31)
________ typically attack governments, organizations, and sometimes individuals
for political purposes.
A)
Crackers
B) White
hats
C) Grey
hats
D)
Hacktivists
d
44) Next
generation firewalls provide all of the following except:
A) an
application-centric approach to firewall control.
B) the
ability to identify applications regardless of the port, protocol, or security
evasion tools used.
C) the
ability to automatically update applications with security patches.
D) the
ability to identify users regardless of the device or IP address.
c
45)
Asymmetric key cryptography is also known as:
A)
public key cryptography.
B)
secret key cryptography.
C) PGP.
D) PKI
a
46) All the
following statements about symmetric key cryptography are true except:
A) in
symmetric key cryptography, both the sender and the receiver use the same key
to encrypt and decrypt a message.
B) the
Data Encryption Standard is a symmetric key encryption system.
C)
symmetric key cryptography is computationally slower.
D)
symmetric key cryptography is a key element in digital envelopes.
c
47) The
Data Encryption Standard uses a(n) ________-bit key.
A) 8
B) 56
C) 256
D) 512
b
48) All
of the following statements about public key cryptography are true except:
A)
public key cryptography uses two mathematically related digital keys.
B)
public key cryptography ensures authentication of the sender.
C)
public key cryptography does not ensure message integrity.
D)
public key cryptography is based on the idea of irreversible mathematical
functions.
b
49)
Which of the following is the current standard used to protect Wi-Fi networks?
A) WEP
B) TLS
C) WPA2
D) WPA3
c
50) All of
the following statements about PKI are true except:
A) the
term PKI refers to the certification authorities and digital certificate
procedures that are accepted by all parties.
B) PKI
is not effective against insiders who have a legitimate access to corporate
systems including customer information.
C) PKI
guarantees that the verifying computer of the merchant is secure.
D) the
acronym PKI stands for public key infrastructure.
c
What is
the most frequent cause of stolen credit cards and card information today?
the
hacking and looting of corporate servers storing credit card information
There is
a finite number of Bitcoins that can be created.
True
IoT
botnets became the preferred platform for launching DDoS attacks in 2017.
True
According
to Symantec, almost half of the e-mail addresses involved in business e-mail
compromise (BEC) phishing that it analyzed had an IP address originating in:
Nigeria.
Proxy
servers are also known as:
dual
home systems.
Which of
the following is an example of an online privacy violation?
your
online purchasing history being sold to other merchants without your consent
Which of
the following statements about blockchain is not true?
A
blockchain system is inherently centralized.
Which of
the following is an example of an integrity violation of e-commerce security?
An
unauthorized person intercepts an online communication and changes its
contents.
The
attack on Dyn Inc. in 2016 is an example of which of the following?
DDoS
attack
Which of
the following statements is NOT true?
Apple's
Touch ID stores a digital replica of a user's actual fingerprint in Apple's
iCloud.
________
is the ability to ensure that e-commerce participants do not deny their online
actions.
Nonrepudiation
All of the
following statements about PKI are true EXCEPT:
PKI
guarantees that the verifying computer of the merchant is secure.
A Trojan
horse appears to be benign, but then does something other than expected.
True
Which of
the following is the leading cause of data breaches?
Hackers
Beebone
is an example of which of the following?
Botnet
Which of
the following is a set of short-range wireless technologies used to share
information among devices within about two inches of each other?
NFC
A
digital certificate contains all of the following except the:
subject's
private key.
Exploit
kits can be purchased by users to protect their computers from malware.
False
What is
the first step in developing an e-commerce security plan?
Preform
a risk assessment
All the
following statements about symmetric key cryptography are true except:
symmetric
key cryptography is computationally slower
Software
that is used to obtain private user information such as a user's keystrokes or
copies of e-mail is referred to as:
Spyware
According
to Ponemon Institute's 2017 survey, which of the following was NOT among the
causes of the most costly cybercrimes?
Botnets
Which of
the following is NOT an example of an access control?
digital
signatures
Typically,
the more security measures added to an e-commerce site, the slower and more
difficult it becomes to use.
True
Accessing
data without authorization on Dropbox is an example of a:
Cloud
Security Issue
PayPal is
an example of what type of payment system?
online
stored value payment system.
Which of
the following dimensions of e-commerce security is NOT provided for by
encryption?
availability
Which of
the following did the Internet Advertising Bureau urge advertisers to abandon?
Adobe
Flash
Which of
the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet
All of
the following statements about Apple Pay are true except which of the
following?
Apple
Pay is the most popular alternative payment method in the United States.
Spoofing
is the attempt to hide a hacker's true identity by using someone else's e-mail
or IP address.
True
All of
the following are features of WPA3 except:
it
enables the creation of a VPN.
Bluetooth
is the primary enabling technology for mobile wallets.
False
To allow
lower-level employees access to the corporate network while preventing them
from accessing private human resources documents, you would use:
an
authorization management system.
The Data
Encryption Standard uses a(n) ________-bit key.
56
Automatically
redirecting a web link to a different address is an example of which of the
following?
pharming
Which of
the following statements is not true?
The
Cybersecurity Information Sharing Act was strongly supported by most large
technology companies and privacy advocates.
Which of
the following statements about data breaches in 2017 is not true?
According
to the Identity Theft Resource Center, employee error was the leading cause of
data breaches.
Today,
online bill payment accounts for ________ of all bill payments, while paper
checks account for ________.
more
than 55%; less than 20%
An
intrusion detection system can perform all of the following functions except:
blocking
suspicious activity.
According
to the Identity Theft Resource Center, the number of data breaches in 2017
increased by ________ compared to 2016.
55%
All of
the following are used for authentication except:
packet
filters.
Zelle is
an example of a P2P mobile payment app.
True
Which
dimension(s) of security is spoofing a threat to?
integrity
and authenticity
Which of
the following dimensions of e-commerce security is not provided for by
encryption?
availability
Which of
the following is not an example of malicious code?
sniffer
________
is the ability to ensure that messages and data are only available to those
authorized to view them.
Confidentiality
Which of
the following is not an example of an access control?
digital
signatures
Malware
that comes with a downloaded file that a user requests is called a:
drive-by
download.
Which of
the following is not a key factor for establishing e-commerce security?
data
integrity
Conficker
is an example of a:
worm.
The
overall rate of online credit card fraud is ________ of all online card
transactions.
less
than 1%
Which of
the following is not an example of a potentially unwanted program (PUP)?
drive-by
download
Phishing
attacks rely on browser parasites.
False
The creation
of Bitcoins consumes a significant amount of energy.
True
SSL/TLS
cannot provide irrefutability.
True
Which of
the following statements about data breaches in 2017 is not true?
According
to the Identity Theft Resource Center, employee error was the leading cause of
data breaches.
All of
the following are limitations of the existing online credit card payment system
except:
cost to
consumers.
Which of
the following statements about Bitcoin is NOT true?
Bitcoins
are completely secure.
Which of
the following is a brute force attack which hackers launch via botnets and
automated tools using known user name and password combinations?
credential
stuffing
Automatically
redirecting a web link to a different address is an example of which of the
following?
pharming
Beebone
is an example of which of the following?
botnet
What is
the most frequent cause of stolen credit cards and card information today?
the
hacking and looting of corporate servers storing credit card information
Accessing
data without authorization on Dropbox is an example of a:
cloud
security issue
________
is the ability to ensure that an e-commerce site continues to function as
intended.
Availability
Which
dimensions of security is spoofing a threat to?
integrity
and authenticity
Typically,
the more security measures added to an e-commerce site, the slower and more
difficult it becomes to use.
True
Which of
the following technologies is aimed at reducing e-mail address spoofing and
phishing?
DMARC
FREAK is
an example of a software vulnerability.
True
Which of
the following is not a key factor for establishing e-commerce security?
data
integrity
Software
that is used to obtain private user information such as a user's keystrokes or
copies of e-mail is referred to as:
spyware
The
attack against Dyn servers is an example of a(n):
DDoS
attack
________
typically attack governments, organizations, and sometimes individuals for
political purposes.
Hacktivists
Phishing
attacks rely on browser parasites.
False
Which of
the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet
Which of
the following is an example of an online privacy violation?
your
online purchasing history being sold to other merchants without your consent
Which of
the following did the Internet Advertising Bureau urge advertisers to abandon?
Adobe
Flash
A
drive-by download is malware that comes with a downloaded file that a user
intentionally or unintentionally requests.
True
Exploit
kits can be purchased by users to protect their computers from malware.
False
Which of
the following is not an example of a potentially unwanted program (PUP)?
drive-by
download
Which of
the following types of attacks enabled hackers to take control of the Twitter
accounts of dozens of America's most prominent political, entertainment and
technology leaders?
social
engineering
Which of
the following is the leading cause of data breaches?
hackers
________
is the ability to identify the person or entity with whom you are dealing on
the Internet.
Authenticity
WannaCry
is an example of ransomware.
True
________
is the ability to ensure that e-commerce participants do not deny their online
actions.
Nonrepudiation
Malware
that comes with a downloaded file requested by a user is called a:
drive-by
download
Confidentiality
is sometimes confused with:
privacy
Spoofing
is the attempt to hide a hacker's true identity by using someone else's e-mail
or IP address.
True
A Trojan
horse appears to be benign, but then does something other than expected.
True
Which of
the following is not an example of malicious code?
sniffer
Conficker
is an example of a:
worm
According
to Ponemon Institute's 2019 survey, which of the following was not among the
causes of the costliest cybercrimes?
botnets
Which of
the following is an example of an integrity violation of e-commerce security?
An
unauthorized person intercepts an online communication and changes its
contents.
Which of
the following is not an example of a PUP?
Drive-by
download
BLANK
refers to the ability to identify the person or entity with whom you are
dealing on the Internet:
Authenticity
Online
bill payments are believed to cost BLANK to process compared to BLANK for paper
bills:
20 to 30
cents, 3 to 7
Which of
the following is not a key point of vulnerability when dealing with e-commerce?
The
credit card companies
All of
the following statements about PKI are true except:
PKI
guarantees that the verifying computer of the merchant is secure
Botnets
are typically used for all of the following except:
phishing
attacks
Linden Dollars,
created for use in Second Life, are an example of:
virtual
currency
A BLANK
is hardware or software that acts as a filter to prevent unwanted packets from
entering a network:
Firewall
none of
the following payment systems offers immediate monetary value except:
Store
value/debit card
Most of
the world's spam is delivered via which of the following?
Botnets
All of
the following are examples of an access control?
Digital
signatures
The
research firm Cybersource estimated that online credit card fraud in the United
States amounted to about BLANK in 2012:
3.5
billion
Software
that is used to obtain private user information such as a user's keystrokes or
copies of e-mail is referred to as:
spyware
All of
the following are factors in contributing to the increase in cybercrime except:
The
Internet's similarity to telephone networks
Which of
the following did Dropbox implement after a series of security snafus in 2011
and 2012?
two-factor
authenticiation
Which of
the following is the current standard used to protect Wi-Fi networks?
WPA2
A BLANK
is a hardware or software that acts as a filter to prevent unwanted packets
from entering a network:
Firewall
Malware
that comes with a downloaded file that a user requests is called a:
Drive-by
download
What is
the first step in developing an e-commerce security plan?
Perform
a risk assessment
The six
dimensions to e-commerce security are nonrepudiation, authenticity,
availability, integrity, privacy, and:
Confidentiality
Which of
the following dimensions of e-commerce security is not provided for by
encryption?
Availability
BLANK
refers to the ability to ensure that messages and data are only available to
those authorized to view them:
Privacy
Online
bill payments now accounts for BLANK of all bill payments:
50%
Bitcoins
are an example of:
Digital
cash
Software
that is used to obtain private user information such as a user's keystrokes or
copies of e-mail is referred to as:
Checking
network traffic to see if it matches certain patterns or preconfigured rules
Which of
the following is an example of an integrity violation of e-commerce security?
An
unauthorized person intercepts an online communication and changes its contents
Which of
the most frequent cause of stolen credit cards and card information today?
The
hacking and looting of corporate servers storing credit card information
Botnets
are typically used for all of the following except:
phishing
attacks
Which of
the following countries has been found to have engaged in cyberespionage
against Google?
China
The
overall rate of online credit card fraud is BLANK% of all online card
transactions
Less
than 1
In the
United States, the primary form of online payment is:
credit
cards
BLANK
refers to the ability to identify the person or entity with whom you are
dealing on the Internet.
Nonrepudiation
Which of
the following is an example of an integrity violation of e-commerce security?
An
unauthorized person intercepts an online communication and changes its
contents.
An
example of a privacy violation of e-commerce security is:
Your
online purchasing history being sold to other merchants without your consent.
Which of
the following is not a key point of vulnerability when dealing with e-commerce?
The
credit card companies
Which of
the following did Dropbox implement after a series of security snafus in 2011
and 2012?
Two-factor
authentication
Most of
the world's spam is delivered via which of the following?
botnets
Software
that is used to obtain private user information such as user's keystrokes or
copies of e-mail is referred to as:
Spyware
What is
the most frequent cause of stolen credit cards and card information today?
The
hacking and looting of corporate servers storing credit card information
Which
dimensions of security is spoofing a threat to?
Integrity
and authenticity
All of
the following statements about symmetric key encryption are true except:
symmetric
key encryption is computationally slower
The Data
Encryption Standard uses a BLANK bit key
56
All of
the following statements about public key encryption are true except:
Public
key encryption ensures authentication of the sender
A
digital certificate contains all of the following except the:
Subject's
private key
All of
the following are used for authentication except:
Packet
filters
What is
the first step in developing an e-commerce security plan?
Perform
a risk assessment
An
intrusion detection system can perform all of the following functions except:
blocking
suspicious activity
Which of
the following left the WikiLeaks Web site effectively inoperable in August
2012?
DDoS
attack
The research
firm Cybersource estimated that online credit card fraud in the United States
amounted to about BLANK in 2012.
3.5
billion
P2P
payment systems are a variation on what type of payment system?
Stored
value payment system
Rustock
is an example of which of the following?
botnet
All of
the following are limitations of the existing online credit card payment
systems except:
Cost to
consumers
Which of
the following is a set of short-range wireless technologies used to share
information among devices within about 2 inches of each other?
NFC
51) A
digital certificate contains all of the following except the:
A)
subject's private key.
B)
subject's public key.
C)
digital signature of the certification authority.
D)
digital certificate serial number
a
52)
Which of the following dimensions of e-commerce security is not provided for by
encryption?
A)
confidentiality
B)
availability
C)
message integrity
D)
nonrepudiation
b
53) All
of the following are methods of securing channels of communication except:
A)
SSL/TLS.
B)
digital certificates.
C) VPN.
D) FTP
d
54) A
________ is hardware or software that acts as a filter to prevent unwanted
packets from entering a network.
A)
firewall
B)
virtual private network
C) proxy
server
D) PPTP
a
55) Proxy
servers are also known as:
A)
firewalls.
B)
application gateways.
C) dual
home systems.
D)
packet filters
c
56) All
of the following are used for authentication except:
A)
digital signatures.
B)
certificates of authority.
C)
biometric devices.
D)
packet filters
d
57) An
intrusion detection system can perform all of the following functions except:
A)
examining network traffic.
B)
setting off an alarm when suspicious activity is detected.
C)
checking network traffic to see if it matches certain patterns or preconfigured
rules.
D)
blocking suspicious activity.
d
58)
Which of the following is not an example of an access control?
A)
firewalls
B) proxy
servers
C)
digital signatures
D) login
passwords
c
59)
Which of the following statements is not true?
A) A VPN
provides both confidentiality and integrity.
B) A VPN
uses both authentication and encryption.
C) A VPN
uses a dedicated secure line.
D) The
primary use of VPNs is to establish secure communications among business
partners.
c
60)
Which of the following statements is not true?
A)
Apple's Touch ID stores a digital replica of a user's actual fingerprint in
Apple's iCloud.
B)
Biometric devices reduce the opportunity for spoofing.
C) A
retina scan is an example of a biometric device.
D)
Biometric data stored on an iPhone is encrypted.
a
61) Face
ID is an example of which of the following?
A)
biometrics
B)
encryption
C) IDS
D)
firewall
a
62)
Which of the following is the most common protocol for securing a digital
channel of communication?
A) DES
B) SSL/TLS
C) VPN
D) HTTP
b
68) What
is the first step in developing an e-commerce security plan?
A)
Create a security organization.
B)
Develop a security policy.
C)
Perform a risk assessment.
D)
Perform a security audit.
c
69) To allow
lower-level employees access to the corporate network while preventing them
from accessing private human resources documents, you would use:
A)
access controls.
B) an
authorization management system.
C)
security tokens.
D) an
authorization policy.
b
70)
Which of the following statements is not true?
A) A
majority of states require companies that maintain personal data on their
residents to publicly disclose when a security breach affecting those residents
has occurred.
B) The
USA Patriot Act broadly expanded law enforcement's investigative and
surveillance powers.
C) The
Cybersecurity Information Sharing Act was strongly supported by most large
technology companies and privacy advocates.
D) The
Federal Trade Commission has asserted that it has authority over corporations'
data security practices.
c
71) All
of the following are examples of social/mobile peer-to-peer payment systems
except:
A)
Venmo.
B) Bill
Me Later.
C)
Square Cash.
D)
Google Wallet
b
72) All
of the following statements about Apple Pay are true except which of the
following?
A) Apple
Pay is subject to regulations issued by the Bureau of Consumer Financial
Protection applicable to GPR transactions.
B) Apple
Pay is based on Touch ID biometric fingerprint scanning.
C) Apple
Pay can be used for mobile payments at the point of sale at a physical store.
D) Apple
Pay relies on NFC chip technology
a
73)
PayPal is an example of what type of payment system?
A)
online stored value payment system
B)
digital checking system
C)
accumulating balance system
D)
digital credit card system
a
74)
PCI-DSS is a standard established by which of the following?
A) the
banking industry
B) the
credit card industry
C) the
federal government
D) the
retail industry
b
75) Which
of the following is not a major trend in e-commerce payments in 2017-2018?
A)
Mobile retail payment volume decreases.
B)
PayPal remains the most popular alternative payment method.
C)
Google refocuses Google Wallet solely on sending and receiving money.
D)
Payment by credit and/or debit card remains the dominant form of online
payment.
a
76) All
of the following are limitations of the existing online credit card payment
system except:
A) poor
security.
B) cost
to consumers.
C) cost
to merchant.
D)
social equity.
b
77)
Linden Dollars, created for use in Second Life, are an example of:
A)
digital cash.
B)
virtual currency.
C) EBPP.
D)
peer-to-peer payment systems.
b
78)
Which of the following is a set of short-range wireless technologies used to
share information among devices within about two inches of each other?
A) DES
B) NFC
C) IM
D) text
messaging
b
84) Today,
online bill payment accounts for ________ of all bill payments, while paper
checks account for ________.
A) less
than 10%; less than 25%
B) about
25%; about 10%
C) more
than 55%; less than 20%
D) 100%;
0%
c
1)
Typically, the more security measures added to an e-commerce site, the slower
and more difficult it becomes to use.
TRUE
2) A
worm does not need to be activated by a user in order for it to replicate
itself.
TRUE
3) A
Trojan horse appears to be benign, but then does something other than expected.
TRUE
4)
Phishing attacks rely on browser parasites.
FALSE
5)
Insiders present a greater security threat to e-commerce sites than outsiders.
TRUE
6)
Spoofing involves attempting to hide a true identity by using someone else's
e-mail or IP address.
True
7)
Drive-by downloads are now the most common method of infecting computers.
TRUE
8)
Smishing attacks exploit SMS messages.
TRUE
9) TLS
does not guarantee server-side authentication.
FALSE
10) The
easiest and least expensive way to prevent threats to system integrity is to
install anti-virus software.
TRUE
11) The
U.S. federal government has historically not been in favor of the development
and export of strong encryption systems.
TRUE
12) Credit
cards are the dominant form of online payment throughout the world.
FALSE
13) In
order to accept payments by credit card, online merchants typically must have a
merchant account established with a bank or financial institution.
TRUE
14)
Digital cash is legal tender that is instantly convertible into other forms of
value without the intermediation of any third parties.
FALSE
15)
PayPal requires the recipient of a payment to have a PayPal account to receive
funds.
TRUE
A)
privacy.
Confidentiality
is sometimes confused with:
A)
privacy.
B)
authenticity.
C)
integrity.
D)
nonrepudiation.
A)
Nonrepudiation
________
is the ability to ensure that e-commerce participants do not deny their online
actions.
A)
Nonrepudiation
B)
Authenticity
C)
Availability
D)
Integrity
B)
Authenticity
________
is the ability to identify the person or entity with whom you are dealing on
the Internet.
A)
Nonrepudiation
B)
Authenticity
C)
Availability
D)
Integrity
D) An
unauthorized person intercepts an online communication and changes its
contents.
Which of
the following is an example of an integrity violation of e-commerce security?
A) A website
is not actually operated by the entity the customer believes it to be.
B) A
merchant uses customer information in a manner not intended by the customer.
C) A
customer denies that he is the person who placed the order.
D) An
unauthorized person intercepts an online communication and changes its
contents.
C)
Availability
________
is the ability to ensure that an e-commerce site continues to function as
intended.
A)
Nonrepudiation
B)
Authenticity
C)
Availability
D)
Integrity
B) your
online purchasing history being sold to other merchants without your consent
Which of
the following is an example of an online privacy violation?
A) your
e-mail being read by a hacker
B) your
online purchasing history being sold to other merchants without your consent
C) your
computer being used as part of a botnet
D) your
e-mail being altered by a hacker
A)
Confidentiality
________
is the ability to ensure that messages and data are only available to those
authorized to view them.
A)
Confidentiality
B)
Integrity
C)
Privacy
D)
Availability
C)
According to the Identity Theft Resource Center, employee error was the leading
cause of data breaches.
Which of
the following statements about data breaches in 2017 is not true?
A)
According to the Identity Theft Resource Center, the number of breaches in 2017
increased by almost 45% from 2016.
B)
According to the Identity Theft Resource Center, over 50% of data breaches
involved social security numbers.
C)
According to the Identity Theft Resource Center, employee error was the leading
cause of data breaches.
D)
According to the Identity Theft Resource Center, data breaches involving the
business sector represented over 55% of all breaches.
C)
Zelle.
All of the
following are examples of cryptocurrencies except:
A)
Ethereum.
B)
Ripple.
C)
Zelle.
D)
Monero.
A) less
than 1%
The
overall rate of online credit card fraud is ________ of all online card
transactions.
A) less
than 1%
B)
around 5%
C)
around 10%
D)
around 15%
C) Adobe
Flash
Which of
the following did the Internet Advertising Bureau urge advertisers to abandon?
C) Adobe
Flash
1.79)
Which of the following statements about responsive web design (RWD) is not
true?
A
.
A) RWD
works best for sites that have complex functionality.
B
.
B) RWD
tools include HTML5 and CSS3.
C
.
C) RWD
makes it possible to design a website that automatically adjusts its layout and
display according to the screen resolution of the device on which it is being
viewed.
D
.
D) RWD
can be costly.
正確答案: A
2.1. 下列敘述何者錯誤?(單選)
A
.
(A) 供應鏈是指從製造產品的原料、原物料、半成品,到製成品送至消費者手中的過程,包括供應商、製造商、配銷商、物流商等不同的企業,以處理產品由原物料到運送至消費者手中所需解決的金流、物流等問題
B
.
(B) 供應鏈導源於流通,原指軍方的後勤補給活動,隨著商業的蓬勃發展,逐漸推廣應用到商業活動上,其泛指能夠滿足消費者需求的產品流通過程,包括上、下游相關廠商都可納入供應鏈的範疇中
C
.
(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果
D
.
(D) 供應鏈管理具有協同整合、非核心業務外包、減少長鞭效應和即時、最佳化四種特性
正確答案: C
3.有關專利權的敘述,下列何者正確?[單選]
A
.
A. 可永久保護所研發的專利
B
.
B. 在非營利情況下使用具專利權保護的新發明屬於違反專利權
C
.
C. 專利權只限於申請的國家,出了國境就不受保護
D
.
D. 專利權不具獨占性,每個人都能生產與仿冒
正確答案: C
4.45)
All of the following statements about public key cryptography are true except:
A
.
A) public
key cryptography uses two mathematically related digital keys.
B
.
B)
public key cryptography ensures authentication of the sender.
C
.
C)
public key cryptography does not ensure message integrity.
D
.
D)
public key cryptography is based on the idea of irreversible mathematical
functions.
正確答案: B
5.31)
The incremental cost of building the next unit of a good is called the:
A
.
A) Law
of One Price.
B
.
B)
variable cost.
C
.
C)
marginal cost.
D
.
D) fixed
cost.
正確答案: C
6.63)
Django is based on which of the following?
A
.
A) PHP
B
.
B)
Python
C
.
C) Perl
D
.
D) Ruby
on Rails
正確答案: B
7.78)
View-to-cart ratio is a measure of the: 回答錯誤
A
.
A) percentage
of visitors who indicate an interest in a site's products by registering or
visiting a product's pages.
B
.
B)
percentage of views that lead to an add-to-cart action.
C
.
C)
percentage of existing customers who continue to buy on a regular basis.
D
.
D)
percentage of shoppers who do not return within a year after their initial
purchase.
正確答案: B
8.82)
Which of the following is a programming language introduced by Apple
specifically for developing iOS applications?
A
.
A)
Objective-C
B
.
B) C
C
.
C) C++
D
.
D) Swift
正確答案: D
9.83)
Applications for Android operating system-based smartphones are typically
written in which of the following?
A
.
A) Swift
B
.
B) Java
C
.
C) ActiveX
D
.
D)
ColdFusion
正確答案: B
10.4. 小駱是個很認真的保險業務員,每當拜訪舊顧客時,總會拿出顧客從前留下的資料加以研讀,藉此提供最符合顧客需求的保險建議。請問這是屬於下列何種概念?(單選)
A
.
(A) 企業資源規劃
B
.
(B) 知識管理
C
.
(C) 商業智慧
D
.
(D) 顧客關係管理
正確答案: D
11.30)
The NIKEiD program is an example of which of the following marketing
techniques?
A
.
A)
customer co-production
B
.
B) transactive
content
C
.
C) price
discrimination
D
.
D)
permission marketing
正確答案: A
12.24.阿傑是個Apple的重度使用者,每天都會逛Apple的App Store搜尋最新的應用程式,請問App Store豐富的數位化內容是屬於網路商業模式的哪種特性? [單選]
A
.
服務面
B
.
核心面
C
.
策略面
D
.
客訴面
正確答案: B
13.23)
Which of the following is not a primary source of ad fraud?
A
.
A)
browser extensions that insert ads into a premium publisher's website and then
list the ads as available on a programmatic ad exchange
B
.
B) ad
targeting firms that create bots that imitate the behavior of real shoppers and
then charge advertisers
C
.
C)
botnets hired by publishers to click on web pages to create phony traffic
D
.
D)
native advertising that is displayed on a social media site
正確答案: D
14.1. 下列何者非企業電子化的主要應用範圍?(單選)
A
.
(A) 六個標準差
B
.
(B) SCM
C
.
(C) CRM
D
.
(D) ERP
正確答案: A
15.9. 阿斌是 Apple 的瘋狂粉絲,在 iPad mini 尚未在台灣上市時,就透過拍賣網站先買到,請問這是屬於 C to C 網路交易模式帶來的何種效益?(單選)
A
.
(A) 獲利性
B
.
(B) 特殊性
C
.
(C) 低價性
D
.
(D) 流動性
正確答案: B
16.9. 在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)
A
.
(A) 駭客
B
.
(B) 網路專家
C
.
(C) 釣客
D
.
(D) 網路作家
正確答案: A
17.25)
Which of the following statements about CAN-SPAM is not true?
A
.
A)
CAN-SPAM went into effect in January 2004.
B
.
B)
CAN-SPAM prohibits unsolicited e-mail (spam).
C
.
C)
CAN-SPAM prohibits the use of deceptive subject lines and false headers.
D
.
D) Large
spammers are among CAN-SPAM's biggest supporters.
正確答案: B
18.42. 女鞋業者Grace Gift利用素人以及知名部落客合作,推出其專屬商品,成功擄獲消費者的心而使商品大賣,請問Grace Gift是考慮到網路商業模式的哪種特性?[單選] 回答錯誤
A
.
服務面
B
.
核心面
C
.
策略面
D
.
業務面
正確答案: A
19.1. 網站藉由銷售商品、資訊或服務給消費者而從中賺取價差,這是屬於下列哪一種收益模式?(單選)
A
.
(A) 廣告收益模式
B
.
(B) 訂閱收益模式
C
.
(C) 手續費收益模式
D
.
(D) 銷售收益模式
正確答案: D
20.供應鏈上基於資訊回饋困難與前置時間的延遲,造成許多決策者容易做出 重複訂購或臨時取消訂單的決策,而產生需求放大(或縮小)的效果。請問上 述是指哪個問題?[單選]
A
.
A. 長鞭效應
B
.
B. 長尾理論
C
.
C. 成本加成理論
D
.
D. 浮動訂單理論
正確答案: A
21.26)
Which form of testing compares a control page with one that is very different?
A
.
A)
template test
B
.
B) new
concept test
C
.
C)
funnel test
D
.
D)
system test
正確答案: B
22.68)
Which of the following is an example of an e-commerce first mover that failed?
A
.
A) Etsy
B
.
B) eToys
C
.
C) eBay
D
.
D)
E*Trade
正確答案: B
23.下列何者不是顧客關係管理的關鍵成功因素?[單選]
A
.
A. 整合內部的資訊
B
.
B. 強化溝通的管道
C
.
C. 上、下游廠商配合度
D
.
D. 處理變革的抗拒
正確答案: C
24.11. 在電子商務的六個流中,消費者直接透過網路進行消費時,會將信用卡資料直接傳送給廠商,這是屬與電子商務構面中的哪一種?[單選]
A
.
商流
B
.
服務流
C
.
金流
D
.
資訊流
正確答案: C
25.21)
Amazon's Associates program is an example of which of the following?
A
.
A) viral
marketing
B
.
B) local
marketing
C
.
C) affiliate
marketing
D
.
D) lead
generation marketing
正確答案: C
26.6) A
firm's ________ describes how a firm will produce a superior return on invested
capital.
A
.
A) value
proposition
B
.
B)
revenue model
C
.
C)
market strategy
D
.
D)
competitive advantage
正確答案: B
27.將傳統拍賣方式轉換到網際網路上來進行,此模式稱為?[單選] 回答錯誤
A
.
Internet
B
.
Intranet
C
.
Extranet
D
.
Outranet
正確答案: D
28.5. 供應鏈管理的發展流程為以下何者?(單選)
A
.
(A) 物流管理階段→運籌管理階段→單一企業階段→供應鏈管理階段
B
.
(B) 單一企業階段→物流管理階段→運籌管理階段→供應鏈管理階段
C
.
(C) 供應鏈管理階段→單一企業階段→物流管理階段→運籌管理階段
D
.
(D) 運籌管理階段→單一企業管理階段→物流管理階段→供應鏈管理階段
正確答案: B
29.小泰規劃著他與小仙的甜蜜旅行,並且打算在晶華酒店住下並求婚,為了以防萬一,他使用晶華酒店的線上訂房服務,請問晶華酒店提供線上訂房的服務是屬於網路交易市場的哪個角色?
A
.
電子資料交換
B
.
基本的電子商務
C
.
電子交易市集
D
.
協同商務
正確答案: B
30.49) Which
of the following is a standard that makes it possible to access data from any
application regardless of the database and operating system software being
used?
A
.
A) CGI
B
.
B) ODBC
C
.
C) MySQL
D
.
D) HTTP
正確答案: B
31.8)
The Internet Layer of TCP/IP is responsible for which of the following?
A
.
A)
placing packets on and receiving them from the network medium
B
.
B)
addressing, packaging, and routing messages
C
.
C)
providing communication with the application by acknowledging and sequencing
the packets to and from the application
D
.
D)
providing a variety of applications with the ability to access the services of
the lower layers
正確答案: B
32.「ERP」是指?[單選]
A
.
A. 企業資源規劃
B
.
B. 供應鏈管理
C
.
C. 顧客關係管理
D
.
D. 知識管理
正確答案: A
33.14)
Which of the following did the Internet Advertising Bureau urge advertisers to
abandon? 回答錯誤
A
.
A) HTML
B
.
B) HTML5
C
.
C) Adobe
Flash
D
.
D) Adobe
Acrobat
正確答案: C
34.Morgan
Stanley 認為電子市集經營模式可分成四種,其中由具有市場獨占優勢或大型賣方所建?的交?市集,稱為?[單選]
A
.
吸引人潮
B
.
發展交易
C
.
匯聚人潮
D
.
獲得錢潮
正確答案: C
35.8. 下列何者不受著作權法的保護?(單選)
A
.
(A) 三歲小孩的畫作
B
.
(B) 中華民國憲法
C
.
(C) 學校的試題
D
.
(D) 學校的網頁
正確答案: B C D
36.3. 下列哪些是常見的網路犯罪?(複選)
A
.
(A) 網路販賣盜版光碟
B
.
(B) 網路販賣贓物
C
.
(C) 入侵他人網站
D
.
(D) 散發電腦病毒
正確答案: A B C
37.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
A
.
(A) 隱私權
B
.
(B) 著作權
C
.
(C) 專利權
D
.
(D) 商標權
正確答案: B C D
38.3. 有關電子商務的定義,下列哪些錯誤?(複選)
A
.
(A) 電子商務就是不用在網路上做生意
B
.
(B) 電子商務就是把傳統的商業活動搬到網際網路上來進行
C
.
(C) 電子商務一定要透過網路線來傳遞
D
.
(D) 電子商務是商業交易或工作流程自動化的技術應用
正確答案: A C
39.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
A
.
(A) 隱私權
B
.
(B) 著作權
C
.
(C) 專利權
D
.
(D) 商標權
正確答案: B C D
40.6. 有關網路禮儀,下列哪些正確?(複選)
A
.
(A) 電腦禮儀的基本原則是「尊重」
B
.
(B) 雖是未經證實的消息,也要先讓大家知道
C
.
(C) 轉載別人的文章時,最好註明出處
D
.
(D) 最好取得原作者的同意後再進行轉載
正確答案: A C D
41.C)72)
The emergence of mobile, social, and local e-commerce occurred during the
Consolidation period of e-commerce.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
42.84) The
information systems discipline spans the technical and behavioral approaches to
e-commerce.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
43.8) A
roughly equal percentage of men and women in the United States use the Internet
today.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
44.80)
Bluetooth is the primary enabling technology for mobile wallets.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
45.45)
Lead generation marketing firms specialize in inbound marketing.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
46.39) E-commerce
technologies provide a unique, many-to-many model of mass communication.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
47.73)
The current versions of most web browsers no longer support Java applets.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
48.59)
All of the following are methods of improving the processing architecture of a
website except:
是非題 (2 分) 2分
A
.
A)
separating static content from dynamic content.
B
.
B)
optimizing ASP code.
C
.
C)
optimizing the database schema.
D
.
D) adding
web servers.
正確答案: D
49.56)
Bluetooth is a high-speed, fixed broadband wireless local area network for
commercial and residential use.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
50.65)
SaaS and PaaS providers can typically provide services at lower costs through
scale economies.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
B) cloud
security issue.
Accessing
data without authorization on Dropbox is an example of a:
A)
social network security issue.
B) cloud
security issue.
C) mobile
platform security issue.
D)
sniffing issue.
A) data
integrity
Which of
the following is not a key factor for establishing e-commerce security?
A) data
integrity
B)
technology
C)
organizational policies
D) laws
and industry standards
B) worm.
Conficker
is an example of a:
A)
virus.
B) worm.
C)
Trojan horse.
D)
botnet.
C)
hackers
Which of
the following is the leading cause of data breaches?
A) theft
of a computer
B)
accidental disclosures
C)
hackers
D) DDoS
attacks
A)
spyware.
Software
that is used to obtain private user information such as a user's keystrokes or
copies of e-mail is referred to as:
A)
spyware.
B) a
backdoor.
C)
browser parasite.
D)
adware.
C)
Nigeria.
According
to Symantec, almost half of the e-mail addresses involved in business e-mail
compromise (BEC) phishing that it analyzed had an IP address originating in:
A)
China.
B)
Russia.
C)
Nigeria.
D) North
Korea.
B) the
hacking and looting of corporate servers storing credit card information
What is
the most frequent cause of stolen credit cards and card information today?
A) lost
cards
B) the
hacking and looting of corporate servers storing credit card information
C)
sniffing programs
D)
phishing attacks
C)
integrity and authenticity
Which
dimension(s) of security is spoofing a threat to?
A)
integrity
B)
availability
C)
integrity and authenticity
D)
availability and integrity
D)
sniffer
Which of
the following is not an example of malicious code?
A)
scareware
B)
Trojan horse
C) bot
D)
sniffer
C) DDoS
attack
The
attack on Dyn Inc. in 2016 is an example of which of the following?
A) SQL
injection attack
B)
browser parasite
C) DDoS
attack
D) MitM
attack
B)
botnet
Beebone is
an example of which of the following?
A) worm
B)
botnet
C)
phishing
D)
hacktivism
C)
drive-by download.
Malware
that comes with a downloaded file that a user requests is called a:
A)
Trojan horse.
B)
backdoor.
C)
drive-by download.
D) PUP.
C)
drive-by download
Which of
the following is not an example of a potentially unwanted program (PUP)?
A)
adware
B)
browser parasite
C)
drive-by download
D)
spyware
A)
Stuxnet
Which of
the following was designed to cripple Iranian nuclear centrifuges?
A)
Stuxnet
B)
Shamoon
C) Snake
D) Storm
C)
pharming
Automatically
redirecting a web link to a different address is an example of which of the
following?
A)
sniffing
B)
social engineering
C)
pharming
D) DDoS
attack
C) 55%
According
to the Identity Theft Resource Center, the number of data breaches in 2017
increased by ________ compared to 2016.
A) 15%
B) 45%
C) 55%
D) 75%
D)
botnets
According
to Ponemon Institute's 2017 survey, which of the following was not among the
causes of the most costly cybercrimes?
A)
malicious insiders
B)
malicious code
C)
denial of service
D)
botnets
D)
Hacktivists
________
typically attack governments, organizations, and sometimes individuals for
political purposes.
A)
Crackers
B) White
hats
C) Grey
hats
D)
Hacktivists
C) the
ability to automatically update applications with security patches.
Next
generation firewalls provide all of the following except:
A) an
application-centric approach to firewall control.
B) the
ability to identify applications regardless of the port, protocol, or security
evasion tools used.
C) the
ability to automatically update applications with security patches.
D) the ability
to identify users regardless of the device or IP address.
A)
public key cryptography.
Asymmetric
key cryptography is also known as:
A)
public key cryptography.
B)
secret key cryptography.
C) PGP.
D) PKI.
C)
symmetric key cryptography is computationally slower.
All the
following statements about symmetric key cryptography are true except:
A) in
symmetric key cryptography, both the sender and the receiver use the same key
to encrypt and decrypt a message.
B) the
Data Encryption Standard is a symmetric key encryption system.
C)
symmetric key cryptography is computationally slower.
D)
symmetric key cryptography is a key element in digital envelopes.
B) 56
The Data
Encryption Standard uses a(n) ________-bit key.
A) 8
B) 56
C) 256
D) 512
B)
public key cryptography ensures authentication of the sender.
All of
the following statements about public key cryptography are true except:
A)
public key cryptography uses two mathematically related digital keys.
B)
public key cryptography ensures authentication of the sender.
C)
public key cryptography does not ensure message integrity.
D)
public key cryptography is based on the idea of irreversible mathematical
functions.
B) it
enables the creation of a VPN.
All of
the following are features of WPA3 except:
A) it
implements a more robust key exchange protocol.
B) it
enables the creation of a VPN.
C) it
provides a more secure way to connect IoT devices.
D) it
features expanded encryption for public networks.
C) PKI guarantees
that the verifying computer of the merchant is secure.
All of
the following statements about PKI are true except:
A) the
term PKI refers to the certification authorities and digital certificate
procedures that are accepted by all parties.
B) PKI
is not effective against insiders who have a legitimate access to corporate
systems including customer information.
C) PKI
guarantees that the verifying computer of the merchant is secure.
D) the
acronym PKI stands for public key infrastructure.
A)
subject's private key.
A
digital certificate contains all of the following except the:
A)
subject's private key.
B)
subject's public key.
C)
digital signature of the certification authority.
D)
digital certificate serial number.
B)
availability
Which of
the following dimensions of e-commerce security is not provided for by
encryption?
A)
confidentiality
B)
availability
C)
message integrity
D)
nonrepudiation
D) FTP.
All of
the following are methods of securing channels of communication except:
A)
SSL/TLS.
B)
digital certificates.
C) VPN.
D) FTP.
A)
firewall
A
________ is hardware or software that acts as a filter to prevent unwanted
packets from entering a network.
A)
firewall
B)
virtual private network
C) proxy
server
D) PPTP
C) dual
home systems.
Proxy servers
are also known as:
A)
firewalls.
B)
application gateways.
C) dual
home systems.
D)
packet filters.
D)
packet filters.
All of
the following are used for authentication except:
A)
digital signatures.
B)
certificates of authority.
C)
biometric devices.
D)
packet filters.
D)
blocking suspicious activity.
An
intrusion detection system can perform all of the following functions except:
A)
examining network traffic.
B)
setting off an alarm when suspicious activity is detected.
C)
checking network traffic to see if it matches certain patterns or preconfigured
rules.
D)
blocking suspicious activity.
C)
digital signatures
Which of
the following is not an example of an access control?
A)
firewalls
B) proxy
servers
C)
digital signatures
D) login
passwords
C) A VPN
uses a dedicated secure line.
Which of
the following statements is not true?
A) A VPN
provides both confidentiality and integrity.
B) A VPN
uses both authentication and encryption.
C) A VPN
uses a dedicated secure line.
D) The primary
use of VPNs is to establish secure communications among business partners.
A)
Apple's Touch ID stores a digital replica of a user's actual fingerprint in
Apple's iCloud.
Which of
the following statements is not true?
A)
Apple's Touch ID stores a digital replica of a user's actual fingerprint in
Apple's iCloud.
B)
Biometric devices reduce the opportunity for spoofing.
C) A
retina scan is an example of a biometric device.
D)
Biometric data stored on an iPhone is encrypted.
A)
biometrics
Face ID
is an example of which of the following?
A)
biometrics
B)
encryption
C) IDS
D)
firewall
B)
SSL/TLS
Which of
the following is the most common protocol for securing a digital channel of
communication?
A) DES
B) SSL/TLS
C) VPN
D) HTTP
B) an
authorization management system.
To allow
lower-level employees access to the corporate network while preventing them
from accessing private human resources documents, you would use:
A) a
firewall.
B) an
authorization management system.
C)
security tokens.
D) an
authorization policy.
C) The
Cybersecurity Information Sharing Act was strongly supported by most large
technology companies and privacy advocates.
Which of
the following statements is not true?
A) A majority
of states require companies that maintain personal data on their residents to
publicly disclose when a security breach affecting those residents has
occurred.
B) The
USA Patriot Act broadly expanded law enforcement's investigative and
surveillance powers.
C) The
Cybersecurity Information Sharing Act was strongly supported by most large
technology companies and privacy advocates.
D) The
Federal Trade Commission has asserted that it has authority over corporations'
data security practices.
B) A
blockchain system is inherently centralized.
Which of
the following statements about blockchain is not true?
A) A
blockchain system is composed of a distributed network of computers.
B) A
blockchain system is inherently centralized.
C) A
blockchain system is a transaction processing system.
D)
Cryptocurrencies are based on blockchain technology.
A) Apple
Pay is the most popular alternative payment method in the United States.
All of
the following statements about Apple Pay are true except which of the
following?
A) Apple
Pay is the most popular alternative payment method in the United States.
B) Apple
Pay is an example of a universal proximity mobile wallet.
C) Apple
Pay can be used for mobile payments at the point of sale at a physical store.
D) Apple
Pay has more users than either Google Pay or Samsung Pay.
A)
online stored value payment system
PayPal
is an example of what type of payment system?
A)
online stored value payment system
B)
digital checking system
C)
accumulating balance system
D)
digital credit card system
B) the
credit card industry
PCI-DSS
is a standard established by which of the following?
A) the
banking industry
B) the
credit card industry
C) the
federal government
D) the
retail industry
A) Mobile
retail payment volume decreases.
Which of
the following is not a major trend in e-commerce payments in 2018-2019?
A)
Mobile retail payment volume decreases.
B)
PayPal remains the most popular alternative payment method.
C) Large
banks enter the mobile wallet and P2P payments market.
D)
Payment by credit and/or debit card remains the dominant form of online
payment.
B) cost
to consumers.
All of
the following are limitations of the existing online credit card payment system
except:
A) poor
security.
B) cost
to consumers.
C) cost
to merchant.
D)
social equity.
B)
Bitcoins are completely secure.
Which of
the following statements about Bitcoin is not true?
A) The
computational power required to mine Bitcoins has increased over time.
B)
Bitcoins are completely secure.
C)
Bitcoins are illegal in some countries.
D) In
2018, Bitcoin reprsented just under 40% of the full market for
cryptocurrencies.
B) NFC
Which of
the following is a set of short-range wireless technologies used to share
information among devices within about two inches of each other?
A) DES
B) NFC
C) IM
D) text
messaging
C) more
than 55%; less than 20%
Today,
online bill payment accounts for ________ of all bill payments, while paper
checks account for ________.
A) less
than 10%; less than 25%
B) about
25%; about 10%
C) more
than 55%; less than 20%
D) about
95%; about 5%
(T/F)A
Trojan horse appears to be benign, but then does something other than expected.
True
A _______
is hardware or software that acts as a filter to prevent unwanted packets from
entering a network.
-virtual
private network
-proxy
server
-firewall
-PPTP
Firewall
A
digital certificate contains all of the following EXCEPT the:
-digital
certificate serial number
-digital
signature of the certification authority
-subject's
private key
-subject's
public key
Subject's
private key
(T/F) A
drive-way download is malware that comes with a downloaded file that a user
intentionally or unintentionally requests.
True
Accessing
data without authorization on Dropbox is an example of a:
-social
network security issue
-sniffing
issue
-mobile
platform security issue
-cloud
security issue
Cloud
security issue
(T/F)
According to the most recent Fiserv's survey, 65% of consumers in the United
States have used online bill payment.
True
According
to Ponemon Institute's 2019 survey, which of the following was NOT among the
causes of the costliest cybercrimes?
-malicious
insiders
-denial
of service
-web-based
attacks
-botnets
Botnets
All of
the following are examples of cryptocurrencies EXCEPT:
-Monero
-Zelle
-Ethereum
-Ripple
Zelle
All of
the following are features of WPA3 EXCEPT:
-it
implements a more robust key exchange protocol.
-it
features expanded encryption for public networks.
-it
provides a more secure way to connect IoT devices.
-it
enables the creation of a VPN.
it
enables the creation of a VPN.
All of
the following ae limitations of the existing online credit card payment system
EXCEPT:
-cost to
the consumers.
-cost to
the merchant.
-poor
security.
-social
equity.
Cost to
the consumers.
All of
the following are methods of securing channels of communication EXCEPT:
-digital
certificates.
-FTP.
-VPN.
-TLS.
FTP
All of
the following are used for authentication EXCEPT:
-biometric
devices.
-digital
signatures.
-packet
filters.
-certificates
of authority.
Packet
filters.
All of
the following statements about Apple Pay are true EXCEPT which of the
following?
-Apple Pay
is an example of a universal mobile wallet.
-Apple
Pay is the most popular alternative payment method in the United States.
-Apple
Pay can be used for mobile payments at the point of sale at a physical store.
-Apple
Pay had more users than either Google Pay or Samsung Pay.
Apple
Pay is the most popular alternative payment method in the United States.
All of
the following about PKI are true EXCEPT:
-PKI is
not effective against insiders who have a legitimate access to corporate
systems including customer information.
-the
term PKI refers to the certification authorities and digital certificate
procedures that are accepted by all parties.
-PKI
guarantees that the verifying computer of the merchant is secure.
-the
acronym PKI stands for public key infrastructure.
PKI
guarantees that the verifying computer of the merchant is secure.
All of
the following statements about symmetric key cryptography are true EXCEPT:
-the
Data Encryption Standard is a symmetric key encryption system.
-symmetric
key cryptography is a key element in digital envelopes.
-symmetric
key cryptography is computationally slower.
-in
symmetric cryptography, both the sender and the receiver use the same key to
encrypt and decrypt a message.
Symmetric
key cryptography is computationally slower.
An
intrusion detection system can perform all of the following functions EXCEPT:
-examining
network traffic.
-setting
off an alarm when suspicious activity is detected.
-checking
network traffic to see if it matches certain patterns or preconfigured rules.
-blocking
suspicious activity.
Blocking
suspicious activity.
Asymmetric
key cryptography is also known as:
-secret
key cryptography
-public
key cryptography
-PGP
-PKI
Public
key cryptography
Automatically
redirecting a web link to a different address is an example of which of the
following?
-DDoS
attack.
-pharming.
-social
engineering.
-sniffing.
Pharming.
Beebone
is an example of which of the following?
-phishing
-botnet
-worm
-hacktivism
Botnet
(T/F)
Bluetooth is the primary enabling technology for mobile wallets.
False.
Conficker
is an example of a:
-botnet
-virus
-worm
-Trojan
horse
Worm
Confidentiality
is sometimes confused with:
-integrity
-authenticity
-privacy
-nonrepudiation
Privacy
(T/F) Exploit
kits can be purchased by users to protect their computers from malware.
False.
(T/F)
FREAK is an example of a software vulnerability.
True.
Face ID
is an example of which of the following?
-biometrics
-firewall
-IDS
-encryption
Biometrics
Malware
that comes with a downloaded file requested by a user is called a:
-backdoor.
-PUP.
-drive-by
download.
-Trojan
horse.
Drive-by
download.
Mint
Bills is an example of which of the following EBPP business models?
-consolidator
-biller-direct
-online
banking
-mobile
Consolidator
(T/F)
Most computers and mobile devices today have built-in encryption software that
users can enable.
Ture.
Next
generation firewalls provide all of the following EXCEPT:
-the
ability to identify users regardless of the device or IP address.
-the
ability to automatically update applications on a client computer with security
patches.
-the
ability to identify applications regardless of the port, protocol, or security
evasion tools used.
-an application-centric
approach to firewall control.
The
ability to automatically update applications on a client computer with security
patches.
PCI-DSS
is a standard established by which of the following?
-the
banking industry
-the
credit card industry
-the
retail industry
-the
federal government
The
credit card industry
PayPal
is an example of which of the following types of payment system?
-digital
checking system.
-online
stored value payment system.
-accumulating
balance system.
-digital
credit card system.
Online
stored value payment system.
(T/F)
Phishing attacks rely on browser parasites.
False.
Proxy
servers are also known as ______ because they have two network interfaces.
-firewalls
-application
gateways
-packet
filter
-dual
home systems
Dual
home systems
Software
that is used to obtain private user information such as a user's keystrokes or
copies of e-mail is referred to as:
-adware
a
browser parasite
-spyware
-a
backdoor
Spyware
(T/F)
Spoofing is the attempt to hide a hacker's true identity by using someone
else's e-mail or IP address.
True.
The Data
Encryption Standard uses a(n) _____-bit key.
-8
-56
-256
-512
56
The
attack against DYN servers is an example of a(n):
-browser
parasite
-SQL
injection attack
-MitM
attack
-DDoS
attack
DDoS attack
(T/F)
The easiest and least expensive way to prevent threats to system integrity is
to install anti-virus software.
True.
(T/F)
There is finite number of Bitcoins that can be created.
True.
To allow
lower-level employees access to the corporate network while preventing them
from accessing private human resources documents, you would use:
-an
authorization management system.
-a
firewall.
-an
authorization policy.
-security
tokens.
An
authorization management system.
(T/F)
Typically, the more security measures added to an e-Commerce site, the slower
and more difficult it becomes to use.
True.
(T/F)
WannaCry is an example of ransomware.
True.
1.在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
2.智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
3.下列哪些是常見的網路犯罪?(複選)
(A) 網路販賣盜版光碟
(B) 網路販賣贓物
(C) 入侵他人網站
正確答案: A B C
4.智慧財產權法想要保護的是下列何者?(單選)
(A) 人類腦力辛勤創作的結晶
5.任何能用來識別、找出或聯絡個人的資料,稱為?(單選)
(D) 個人可識別資訊
6.有關網路禮儀,下列哪些正確?(複選)
(A) 電腦禮儀的基本原則是「尊重」
(C) 轉載別人的文章時,最好註明出處
(D) 最好取得原作者的同意後再進行轉載
正確答案: A C D
7.擅自拷貝網站會員個人資料檔的行為可能觸犯下列哪一項法律?(單選)
(D) 電腦處理個人資料保護法
正確答案: D
8.下列何者不受著作權法的保護?(單選)
複選題 (2 分) 0分
(B) 中華民國憲法
(C) 學校的試題
(D) 學校的網頁
正確答案: B C D
9.在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)
(A) 駭客
10.網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關係?(單選)
(C) 網站是否提供線上購物的服務
11.Approximately
________ of U.S. Internet users research online but do not buy.
B) 10%
12.A
roughly equal percentage of men and women in the United States use the Internet
today.
是非題 (2 分) 2分
A.O
13.Online
traffic is partially driven by offline brands and traditional shopping.
是非題 (2 分) 2分
A.O
14.Which
of the following forms of online advertising is expected to grow the most
between 2020 and 2024?
D) video
15.Which
of the following search engine algorithm updates targets websites that violate
Google’s guidelines?
D) Fred
16.Pinterest’s
Lens is an example of which of the following?
D)
visual search
17.Amazon's
Associates program is an example of which of the following?
C)
affiliate marketing
18.Ad
blockers operate in a manner similar to which of the following?
B)
firewalls
19.Which
of the following is not a primary source of ad fraud?
D)
native advertising that is displayed on a social media site
20.Which
of the following statements about CAN-SPAM is not true?
B)
CAN-SPAM prohibits unsolicited e-mail (spam).
21.Which
of the following statements about Canada's anti-spam law is not true?
B) The law
has no impact on companies located within the United States.
22.Which
of the following is the most important tool in establishing a relationship with
the customer?
A)
company website
23.All
of the following are "traditional" online marketing tools except:
C)
social marketing.
24.All
of the following are among those most frequently affected by ad-blocking
except:
D)
online retailers.
25.The
NIKEiD program is an example of which of the following marketing techniques?
A)
customer co-production
26.The
incremental cost of building the next unit of a good is called the:
C)
marginal cost.
27.Which
of the following involves getting customers to pass along a company's marketing
message to friends, family, and colleagues?
B) viral
marketing
28.Group
M, the world’s largest advertising buyer, requires which of the following in
order for an ad to be considered viewable?
C) 100%
of the pixels must be in view for at least one second
29.Which
of the following statements about native advertising is not true?
B) Most
consumers are able to easily distinguish editorial content from native
advertising.
30.Which
of the following is an automated, auction-based method for matching demand and
supply for online display ads?
C)
programmatic advertising
31.Research
has found that most of the ad impressions served across display advertising
platforms are not viewable.
是非題 (2 分) 2分
A.O
32.A
significant percentage of online ad impressions served are not actually viewed
or even viewable.
是非題 (2 分) 2分
A.O
33.Lead
generation marketing firms specialize in inbound marketing.
是非題 (2 分) 2分
A.O
34.The
concept of "customer satisfaction" is broader than the concept of
"customer experience."
是非題 (2 分) 2分
B.X
35.Bundling
is the process of selling two or more products together for a price that is
less than the sum of the two product's individual prices.
是非題 (2 分) 2分
A.O
36.Which
of the following features of e-commerce technology decreases the cost of
delivering marketing messages and receiving feedback from users?
B)
universal standards
37.All
of the following statements about cookies are true except:
B) the
data typically stored in cookies includes a unique ID and e-mail address.
38.________
is an open source database that can store and analyze both structured and
unstructured data.
C)
Hadoop
39.A
________ is a repository of customer information that records all contacts that
a customer has with a firm and generates a customer profile available to
everyone in the firm with a need to know the customer.
B) CRM
system
40.The
marketing technique known as ________ involves merchants offering many products
for which there is little demand.
A) long
tail marketing
41.Transaction
logs are built into client software and not the web server software.
是非題 (2 分) 2分
B.X
42.Regular
in-app cookies can be shared between apps.
是非題 (2 分) 2分
B.X
43.Cross-platform
attribution refers to:
A) how to
assign credit to different marketing initiatives.
44.VTR
measures the ________ response rate to an ad.
D)
30-day
45.What
kinds of ads have the lowest CTR?
D)
banner display ads
46.Which
of the following measures the average length of stay at a website?
B)
stickiness
47.View-to-cart
ratio is a measure of the:
B)
percentage of views that lead to an add-to-cart action.
48.Which
of the following measures the ratio of items purchased to product views?
C)
browse-to-buy ratio
49.Which
of the following is the most meaningful metric for video ads?
C)
completion rate
50.The
average abandonment rate is highest for shopping carts accessed via
smartphones.
是非題 (2 分) 2分
B.X
1.網路蟑螂行為主要侵犯哪一種權利?[單選]
D. 網域名稱權
2.關於專利權的特性,下列敘述何者錯誤?[單選]
A. 識別性
3.網路蟑螂行為主要侵犯哪一種權利?[單選]
D. 網域名稱權
4.有關專利權的敘述,下列何者正確?[單選]
C. 專利權只限於申請的國家,出了國境就不受保護
5.如果要在自己的網頁引用他人的文章,必須得到原作者同意,以免侵犯到 下列何者?[單選]
D. 著作權
6.在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
7.智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
正確答案: B C D
8.下列哪些是常見的網路犯罪?(複選)
(A) 網路販賣盜版光碟
(B) 網路販賣贓物
(C) 入侵他人網站
正確答案: A B C
9.智慧財產權法想要保護的是下列何者?(單選)
(A) 人類腦力辛勤創作的結晶
10.任何能用來識別、找出或聯絡個人的資料,稱為?(單選)
(D) 個人可識別資訊
11.有關網路禮儀,下列哪些正確?(複選) 回答錯誤
複選題 (2 分) 0分
(A) 電腦禮儀的基本原則是「尊重」
(C) 轉載別人的文章時,最好註明出處
(D) 最好取得原作者的同意後再進行轉載
正確答案: A C D
12.擅自拷貝網站會員個人資料檔的行為可能觸犯下列哪一項法律?(單選)
(D) 電腦處理個人資料保護法
13.下列何者不受著作權法的保護?(單選)
(B) 中華民國憲法
(C) 學校的試題
(D) 學校的網頁
正確答案: B C D
14.網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關係?(單選)
(C) 網站是否提供線上購物的服務
15.What
was the approximate Internet penetration rate in 2019 for individuals that have
attained less than a high-school education?
C) 71%
16.Approximately
________ of U.S. Internet users research online but do not buy.
B) 10%
17.Research
shows the two key factors shaping the decision to purchase online are utility
and trust.
是非題 (2 分) 2分
A.O
18.Consumers
choose the online channel primarily due to social media influence.
是非題 (2 分) 2分
B.X
19.Online
traffic is partially driven by offline brands and traditional shopping.
是非題 (2 分) 2分
A.O
20.Which
of the following online advertising formats attracted the least amount of
spending in 2020?
D)
e-mail
21.Which
of the following search engine algorithm updates targets websites that violate
Google’s guidelines?
D) Fred
22.Which
of the following is a Google algorithm update related to local search?
D)
Possum
23.Amazon's
Associates program is an example of which of the following?
C)
affiliate marketing
24.Ad
blockers operate in a manner similar to which of the following?
B)
firewalls
25.The
percentage of all e-mail that is spam averaged around ________ in 2020.
A) 55%
26.Which
of the following statements about Canada's anti-spam law is not true?
B) The
law has no impact on companies located within the United States.
27.All
of the following are among those most frequently affected by ad-blocking
except:
D)
online retailers.
28.The
incremental cost of building the next unit of a good is called the:
C)
marginal cost.
29.Which
of the following statements about a free pricing strategy is not true?
B) The
free pricing strategy was born in the early days of the Web.
30.Group
M, the world’s largest advertising buyer, requires which of the following in
order for an ad to be considered viewable?
C) 100%
of the pixels must be in view for at least one second
31.Which
of the following industries accounted for the highest percentage of spending on
online advertising in 2019?
B)
retail
32.Which
of the following statements about native advertising is not true?
B) Most
consumers are able to easily distinguish editorial content from native
advertising.
33.Research
has found that most of the ad impressions served across display advertising
platforms are not viewable.
是非題 (2 分) 2分
A.O
34.The
highest amount of online advertising spending is for online video ads.
是非題 (2 分) 2分
B.X
35.Lead
generation marketing firms specialize in inbound marketing.
是非題 (2 分) 2分
A.O
36.The
concept of "customer satisfaction" is broader than the concept of
"customer experience."
是非題 (2 分) 2分
B.X
37.Bundling
is the process of selling two or more products together for a price that is
less than the sum of the two product's individual prices.
是非題 (2 分) 2分
A.O
38.Which
of the following is an open source software framework used to collect and
analyze a company's big data?
B)
Hadoop
39.Which
of the following statements about the Internet's impact on marketing is not
true?
B) The
Internet has decreased the impact of brands.
40.Which
of the following features of e-commerce technology enables marketers to engage
customers in a dialog and dynamically adjust the experience to the consumer?
D)
interactivity
41.Which
of the following features of e-commerce technology decreases the cost of
delivering marketing messages and receiving feedback from users? 回答錯誤
B)
universal standards
42.A web
beacon is:
D) a
tiny graphics file embedded in an e-mail or web page.
43.The marketing
technique known as ________ involves merchants offering many products for which
there is little demand.
A) long
tail marketing
44.Transaction
logs are built into client software and not the web server software.
是非題 (2 分) 2分
B.X
45.VTR
measures the ________ response rate to an ad.
D)
30-day
46.Uber
has been criticized for using which of the following?
C) surge
pricing
47.Which
of the following measures the average length of stay at a website?
B)
stickiness
48.Acquisition
rate is a measure of the:
A)
percentage of visitors who indicate an interest in a site's products by
registering or visiting a product's pages.
49.Recency
refers to the:
B) time
elapsed since the last visit made by a customer.
50.Which
of the following measures the percentage of times an ad is clicked?
是非題 (2 分) 2分
B) CTR
網路行銷與經營管理
評量題庫與解答
選擇題
易
1. (1)電子憑證是? (1) 網路購物的身分證明 (2) 軟體的序號 (3) 應用軟體的開發
商 (4) 作業系統中使用者的帳號和密碼
2. (1)下列何者不是電子付款的安全保密要求? (1) 本人 (2) 身分認證 (3) 完整性
(4) 防止拒付
3. (4)下列何者不屬於網路信用卡交易的參與者? (1) 持卡者 (2) 商家 (3) 發卡銀
行 (4) 政府
4. (2)下列何者不屬於電子現金的特性? (1) 不易被複製或篡改 (2) 不可轉換性(3)
具匿名性 (4) 不可回溯性
5. (4)在 SET 機制中,除認證授權者、商家 (特約商店)、持卡者外,還有哪個重
要個體? (1) 發卡者 (2) 取得者(3) 信用卡品牌 (4) 付款閘道
6. (4)關於電子付款機制,下列何者有誤? (1) 數位簽章具有交易者身分的識別 (2)
防火牆是針對資料庫的保護而設計 (3) 電子簽章具有不可否認性(4) 電子錢包一般
適合處理大額付款
7. (4)關於 SET 的敘述,下列何者有誤? (1) 可確認在 Internet 線上交易,每個節
點之訊息傳遞都是安全的(2) 可確保顧客資料輸入的隱密性(3) 可確認商店及持卡
人雙方身分的正確性(4) 確認在 SET 通訊協定中,商店可看到顧客端之個人資
訊,以確保交易進行
8. (2)「只要透過個人電腦,結合『晶片金融卡』及『晶片卡讀卡機』連結至銀行
網站,即可隨時隨地在網際網路上享有銀行所提供之 ATM 金融服務。」這是
指? (1) iCash (2)
Web ATM(3) Mondex (4) MasterCard
9. (4)電子現金的哪一個特性,可經由不同的存、提款設備,將電子現金儲存在
不同的設備中? (1) 匿名性 (2) 可分性(3) 離線付款 (4) 可轉換性
11. (1)B2B 電子商務付款較常使用下列哪種方式? (1) EFT (2) SET
(3) VAN (4)
EDI
12. (1)由字義上來看,「商務」的目的就是希望對內降低營運成本、提高作業效率,對外
吸引更多的顧客上門,以增加企業的利潤;而「電子」則是指資訊科技,主要是:
(1)Internet
與 Web (2)Internet 與 HTML (3)HTML 與 JAVA (4)Web 與 Database 的技術。
13. (4)網路拍賣是屬於何種類型的電子商務?(1)B2B (2)B2C
(3)C2B (4)C2C。
14. (2)關於電子商務三流的敘述何者錯誤?(1)EC 三流是指金流、物流與資訊流 (2)「物
流」是指產品從製造商移轉到經銷商、消費者的整個流通過程,在 EC 中是核心部分 (3)
產品規格、詢報價、訂單、發票等企業間各種資料的交換是屬於「資訊流」的範疇 (4)付
款、與金融機構連線、信用查詢、交易安全認證機制等是屬於「金流」的範疇。
15. (4)哪些項目可能是「虛擬社群網站」的獲利模式?(1)會員費、使用費 (2)廣告收益、
交易佣金 (3)出售會員資料 (4)以上皆是。
16. (3)企業網站系統基礎設施不包含以下哪個項目?(1)網站伺服器 (2)資料庫系統伺服器
(3)網誌(Blog)系統伺服器 (4)應用系統伺服器。
17. (3)網域名稱的命名原則有一定的規範,想要使用.com.tw 的網址,其申請對象必須是
從事商業活動的:(1)個人 (2)非營利組織 (3)公司行號 (4)產業公協會。
18. (1)要架設一個網路商店可以採用下列哪四種方式:(1)租用網路商店、租用虛擬主
機、主機代管、自行架設 (2)租用網路商店、租用虛擬主機、主機自管、自行架設 (3)租
用網路商店、租用實體主機、主機代管、自行架設 (4)租用實體店面、租用虛擬主機、主
機代管、自行架設。
19. (1)有關商品圖片的使用,何者敘述錯誤?(1)商品圖片可以用中文命名,以方便管理
(2)不可以使用 bmp 格式的圖片來做為商品圖片 (3)商品圖片的名稱為英文時,中間不可
以出現空格 (4)不可以直接使用放置在桌面上的圖片檔案來做為商品圖片。
20. (3)對電子商務安全機制的描述,下列何者不正確? (1) 認證中心是整個電子商
務的核心關鍵(2) 金鑰有公開金鑰 (Public Key) 與私有金鑰 (Private Key) 兩種(3)
所謂電子簽章就是把手寫筆跡數位化(4) 加密方式目前大多採用 DES 或 RSA 演算
法
21. (1)防火牆通常建置在哪裡? (1) 私用網路與公用網路連接點 (2) 公用網路與公
用網路連接點 (3) 私用網路與私用網路連接點 (4) 網際網路與公用網路連接點
22. (2)網域名稱中,代表商業機構或公司的是下列何者? (1) .net (2)
.com (3) .org
(4) .edu
23. (2)下列哪一種電子商務應用技術的發展時間最早? (1) HTML (2) EDI
(3) Java
(4) XML
24. (4)何者不屬於電子商務後端資料庫系統? (1) Oracle (2)
MySQL (3) MS SQL (4)
Linux
25. (1)Apache 是屬於? (1) 網頁伺服器 (2) 資料庫伺服器 (3) FTP 伺服器 (4) SMTP
伺服器
26. (2)下列哪一種網路寬頻技術主要利用「第四台電視纜線」做為傳輸媒介? (1)
ADSL
(Asymmetric Digital Subscriber Line) (2) Cable Modem (3) Direct PC (4) FTTH
(Fiber
To The Home)
27. (4)下列哪一種網路寬頻技術主要利用「光纖」做為傳輸媒介? (1) ADSL
(Asymmetric
Digital Subscriber Line) (2) Cable Modem (3) Direct PC (4) FTTH (Fiber
To The
Home)
28. (3)下列哪一種網路寬頻技術主要利用「衛星」做為傳輸媒介? (1) ADSL
(Asymmetric
Digital Subscriber Line) (2) Cable Modem (3) Direct PC (4) FTTH (Fiber
To The
Home)
(4)網際網路服務提供者 (ISP) 最主要提供下列何種服務? (1) 線上購物 (2) 線上團
購 (3) 線上拍賣 (4) 連線服務
適中
29. (3)HTTP 的預設連接埠 (Port) 之值為何? (1) 21 (2) 25 (3) 80 (4)
143
30. (1)下列何者不是正確的 IP 位址? (1)
257.25.26.22 (2) 101.101.101.101 (3)
168.95.1.1
(4) 127.0.0.1
31. (3)瀏覽器是用何種通訊協定與網頁伺服器進行溝通? (1) SMTP (2) FTP
(3)
HTTP (4)
HTML
32. (2)一般靜態網頁設計所用的語法為下列何者? (1) HTTP (2)
HTML (3) XML (4)
SXML
33. (2)目前大部分電子郵件「收信」時所使用的通訊協定為下列何者? (1) SNMP
(2) POP3
(3) HTTP (4) SMTP
34. (4)目前大部分電子郵件傳送附件檔案時,最常用的編碼方式為下列何者? (1)
ZIP (2)
SMTP (3) POP3 (4) MIME
35. (4)目前在網路上傳輸最佔用頻寬的是下列哪一種資料類型? (1) 文字檔 (2)
圖形檔 (3) 音樂檔 (4) 視訊檔
36. (4)下列哪一個程式語言比較適合用來撰寫直接產出 HTML 網頁的應用程式?
(1) C
(2) Basic (3) Java (4) PHP
37. (1)下列哪一項網頁程式的功能不是在瀏覽器端直接執行? (1) 執行 CGI 程式 (2)
執行 JavaScript 的程式 (3) 顯示 HTML 文件中的圖形 (4) 傳遞使用者輸入的資料
38. (2)下列何者不是網頁上使用的語言? (1) HTML (2)
ML(3) WML (4) XML
39. (4)網路蟑螂的行為主要侵犯哪一種權利? (1) 隱私權 (2) 著作權 (3) 專利權 (4)
網域名稱權
40. (1)智慧財產權法想要保護的是下列何者? (1) 人類腦力辛勤創作的結晶 (2) 商
業機密 (3) 商業利益 (4) 一般人知的權利
41. (4)擅自拷貝網站會員個人資料檔的行為可能觸犯下列哪一項法律? (1) 商標法
(2) 隱私權法 (3) 消費者保護法 (4) 電腦處理個人資料保護法
42. (2)下列何者不受著作權法的保護? (1) 三歲小孩的畫作 (2) 中華民國憲法 (3)
學校的試題 (4) 學校的網頁
43. (1)在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為? (1) 駭
客 (2) 網路專家 (3) 釣客 (4) 網路作家
44. (3)網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關
係? (1) 可否應當事人的要求,停用該當事人的會員資料 (2) 網站是否標示個人
資料的使用目的 (3) 網站是否提供線上購物的服務 (4) 網站未經本人同意,是否
會將個人資料轉讓給第三者
45. (4)行動設備包括下列何者? (1) 智慧型手機 (2) PDA (3) 小筆電 (4) 以上皆是
46. (4)行動商務中的「行動」是指? (1) 行動設備 (2) 行動通訊(3) 無線網路 (4) 以
上皆是
47. (4)下列何者為行動商務模式的特性? (1) 易變性 (2) 不可儲存性 (3) 分享性 (4)
互動性
48. (3)下列何者不是行動商務的應用? (1) 簡訊應用 (2) 行動購物 (3) 拍照 (4) 行動
遊戲
49. (4)下列何者為行動商務的阻礙? (1) 病毒威脅 (2) 資料外洩 (3) 頻寬不足 (4) 以
上皆是
50. (3)下列何者不是行動商務的成功因素? (1) 便利性 (2) 使用性(3) 炫耀性 (4) 豐
富性
51. (4)行動商務的效益包含下列何者? (1) 傳輸無線化 (2) 連線快速化 (3) 追蹤便
捷化 (4) 以上皆是
52. (1)行動通訊的發展共有幾個階段? (1) 六個 (2) 五個(3) 四個 (4) 三個
53. (2)第 1 代行動通訊為下列何者? (1) 數位式 (2) 類比式 (3) 高速封包存取系統
(4) 分碼多重存取系統
54. (2)第 2.5 代行動通訊其傳輸速度可達多少? (1) 56 Kbps (2)
150 Kbps (3) 256
Kbps (4)
512 Kbps
55. (4)第 3 代行動通訊其傳輸速度可達多少? (1) 1 M (2) 512
Kbps (3) 256 Kbps (4)
2 M
56. (4)無線網路的技術規格是以下列何者為主? (1) 802.12 (2)
802.10 (3) 801.11 (4)
802.11
57. (3)下列何者為 802.11 b 的別稱? (1) RFID (2) WiMAX (3)
Wi-Fi (4) Bluetooth
58. (3)WiMAX 為下列何者的應用範疇之一? (1) 3 GS
(2) 2 G (3) 4 G (4) 3 G
59. (2)WiMAX 傳遞距離可以長達多少? (1) 500 公尺 (2) 50 公里(3) 10 公里 (4) 100
公里
60. (4)藍芽的傳遞距離大約為多少? (1) 1 公尺內 (2) 1 公里內 (3) 500 公尺內 (4) 10
公尺內
61. (4)無線射頻辨識系統 (RFID) 包括以下何者? (1) 電子標籤 (2) 讀取器 (3) 天線
(4) 以上皆是
62. (2)「訂單處理」屬於網路商店運作的:(1)前台作業 (2)後台作業 (3)準備作業 (4)服務作
業 項目。
63. (3)公司組織型態不包括:(1)獨資 (2)合夥 (3)加盟連鎖 (4)股份有限公司。
64. (4)創業的資金來源不包含以下哪個項目?(1)個人出資 (2)他人出資 (3)銀行貸款 (4)股
票融資。
65. (3)網友註冊新帳號時,密碼不得少於幾個字?(1)三個字 (2)四個字 (3)五個字 (4)六個
字。
66. (2)(1)會員登入 (2)管理者登入 (3)管理者註冊 (4)管理者註冊 是使用「後台管理工具」
時必經的身份辨識步驟,後台管理是經營網路商店非常重要的工作。
67. (3)管理帳號頁面的:(1)管理員登入 (2)管理次數 (3)登入次數 (4)累積次數 是顯示管理
者操作「後台管理工具」的總次數,請留意此數字與您使用的次數是否相符,如果大過
您使用的次數太多,可能密碼已遭他人盜用。
68. (3)如果要讓顧客可以切換至不同語系以觀看商品,在輸入「新增商品」時,哪兩個
項目一定要輸入不同語系的資料?(1)品名、商品圖片 (2)商品廠商、品名 (3)品名、商品
說明 (4)商品圖片、商品說明。
難
69. (4)M 化系統的可分為哪些? (1) 離線型、線上型、隨機型 (2) 離線型、簡易
型、搭配型 (3) 線上型、隨機型、離線型 (4) 離線型、線上型、搭配型
70. (1)M 化系統的過程中常會產生一些問題包括下列哪些? (1) 企業面、員工面、
系統面 (2) 企業面、顧客面、服務面 (3) 業務面、員工面、系統面 (4) 客訴面、服
務面、業務面
71. (3)M 化系統正確的導入步驟為下列何者? (1) 定義 M 化需求→選擇系統廠商
→建立控制機制→進行內部溝通與訓練教育 (2) 選擇系統廠商→建立控制機制→
定義 M 化需求→進行內部溝通與訓練教育 (3) 定義 M 化需求→選擇系統廠商→
進行內部溝通與訓練教育→建立控制機制 (4) 選擇系統廠商→進行內部溝通與訓
練教育→定義 M 化需求→建立控制機制
72. (4)下列何者是手機 3.75 G 通訊協定技術? (1) WiMAX
(Worldwide
Interoperability
for Microwave Access) (2) GPRS (General Packet Radio Service)
73. (3)HSDPA (High Speed Downlink
Packet Access) (4) HSUPA (High-Speed Uplink
Packet
Access)
74. (3)WiMAX 無線通訊屬於下列哪一種標準? (1) IEEE 802.11
(2) IEEE 802.15
(3) IEEE
802.16 (4) IEEE 802.20
75. (3)如果 Windows 系統已經啟動了 IIS 服務,將會造成後續無法正常啟動 Apache
Server 的狀況。其主要原因是兩者都會佔用到 TCP/IP 網路協定的:(1)21 (2)25 (3)80
(4)101 通訊埠,所以你必須先把 IIS 的服務停止才能正常啟動 Apache。
76. (2)關於安裝 AppServ 軟體的敘述何者正確?(1)安裝時若使用預設的字集(如 latin1)
而不變更,則網站一樣會顯示繁體中文 (2)要將 Server Name 的名稱從 localhost 改為
Domain
name 或 IP address 才能讓其他人看到你的網站 (3)如果沒有申請 Domain name 則
不能架設網站 (4)Apache 網站的 Port 為 21。
77. (2)在 Windows XP 的環境下要查出 PC 的 IP Address 可以使用下列那個指令:
(1)ipdisplay
(2)ipconfig (3)netconfig (4)netstat。
78. (1)AppServ 軟體的安裝包含那些項目?(1)Apache、MySQL、PHP (2)Apache、SQL
Server、PHP (3)Apache、MySQL、JSP (4)Apache、MySQL、osCommerce。
79. (4)AppServ 安裝完成啟動後會在螢幕右下角出現紅綠燈(亮綠燈)的小圖示,表示何
種功能已執行?(1)Apache Server
(2)Web Server (3)SMTP Server (4)MySQL Server。
80. (1)在安裝 osCommerce 的 PC 上,想要執行「後台管理」的功能,必須在瀏覽器的
「網址」處鍵入:(1)http://localhost/catalog/admin
(2)http://localhost/catalog
(3)http://localhost/admin
(4)http://localhost/catalog/manage
81. (3)使用本地主機安裝時,前台 Logo 的位置在:(1)C:/AppServ/www/images
(2)C:/AppServ/www/catalog/images/logo
(3)C:/AppServ/www/catalog/images
(4)C:/AppServ/www/catalog/admin/images。
82. (4)使用本地主機安裝時,後台 Logo 的位置在:(1)C:/AppServ/www/admin/images
(2)C:/AppServ/www/catalog/images/logo
(3)C:/AppServ/www/catalog/images
(4)C:/AppServ/www/catalog/admin/images。
簡答題
易
1. 請說明按照維護方式的差異,可以區分為哪幾種架設網站的方式?
答案:租用網路商店、租用虛擬主機、主機代管、自行架設。
2. 採用租用網路商店開店有何優點?
答案:不必處理技術問題,只要處理商店管理的部分,也能快速開立網路商店。
3. 採用主機代管方式架設網站,其優點為何?
答案:因為是直接使用 ISP 機房的網路,所以可以獲得較大的網路頻寬。
4. 說明何謂虛擬主機?
答案:廠商提供一個分組的網路主機空間,因為可以設立獨立的網路位址,以及獨立的
硬碟空間,所以運作上跟租用了一台網路上的主機相似,因此稱之為虛擬主機。
5. 採用自行架設的方式建置網站,有哪些項目是要由自己來維護的?
答案:包括商店、網站、主機、線路等所有項目都要由自己維護。
6. 請說明架設網站方式的選擇,可以按照哪幾個方向來考量?
答案:整體成本費用、服務品質的要求、管理的方便性、資料的安全性。
7.
Kalakota 與 Whinston 等學者對電子商務所下的定義為何?
答案:Kalakota 與 Whinston(1997)認為,所謂電子商務(EC)是指利用網際網路進行
購買、銷售或交換產品與服務。功能在降低成本、縮短產品的生命週期、加速得到顧客
的回應,及增加服務的品質。
8. 如果根據 EC 買賣雙方的參與對象來區分,EC 可包含哪四大基本類型?
答案:B2C 企業對企業、B2C 企業對消費者、C2B 消費者對企業以及 C2C 消費者對消費
者。
9. 什麼是 Intranet?
答案:Intranet(企業內部網路)指的是:企業內部利用 Internet 及 Web 的技術,設置於
防火牆內,支援內部員工知識與資訊的存取、傳遞與內部溝通協調合作的一個企業內部
網路系統。
10. 什麼是 Extranet?
答案:Extranet(企業間網路或商際網路)指的是:企業利用 Internet 的技術來與外部相
關的供應商、顧客、策略夥伴相連結,以提升彼此之間的資訊分享與協同合作績效的網
路系統。
11. 什麼是經營模式?
答案:基本上,所謂經營模式是指一個組織在複雜而競爭劇烈的環境中,企圖塑造自己
的差異化優勢。簡單的說就是:「一個企業為了獲利、成長與存活,其所設計的一組市場
定位、產品提供、資源配置與財務結構的架構藍圖」
12. 線上購物的經營模式有哪些項目?
答案:線上購物網站的經營模式:
(1)提供線上直接訂購商品、(2)提供訂貨及付款方式資訊、(3)提供商品一次購足的服務、
(4)提供實體產品的線上展示、(5)利用網頁橫幅廣告方式宣傳、(6)掌握顧客上網與交易情
形。
13. 網路拍賣的六步驟為哪些項目?
答案:(1)選擇拍賣網站、(2)註冊成為會員、(3)賣家登錄「信用卡資料」確認身份、(4)
刊登物品、(5)開始進行拍賣交易、(6)金流與物流作業。
14. 網路商店開店八步驟為何?
答案:(1)辦理網域名稱申請、(2)決定網路商店架設方式、(3)採購電腦軟硬體設施、(4)
設計或選用網路商店軟體系統、(5)規劃後台作業程序、(6)連線測試、(7)至搜尋引擎做網
站登錄、(8)正式營運與宣傳。
15. 對創業者而言,營運計畫書有哪些功能?
答案:檢視創意的可行性、釐清事業藍圖、認清經營模式、協助募集資金。
16. 一份完整供網路創業時使用的營運計畫書,必須包括哪四個主要的部分?
答案:創業類型、經營管理架構、機會的評估及利用、資源的運用及配置。
17. 由外而內說明架設網站的設備有哪幾種?
答案:網際網路線路、ATU-R、頻寬分享器、集線器/交換器、個人電腦。
18. 請從網站的角度來說明下載及上傳頻寬。
答案:網站的下載頻寬是指從客戶端傳遞資料到網站的頻寬;上傳頻寬則是由網站傳遞
資料到客戶端的頻寬。
19. 說明租用網際網路線路時的固定及浮動 IP 位址分別指什麼?
答案:固定 IP 位址是指每次線路與 ISP 廠商連結時都會被指定同一個 IP 位址;浮動 IP
位址則是沒有分配固定的 IP 位址,每次與 ISP 連線都重新分配一個目前閒置的 IP 位
址。
20. 租用 ADSL 線路時,在 ATU-R 前端接的分歧器作用為何?
答案:分歧器的作用為分離低頻的電話訊號與高頻的網路訊號,加掛分歧器才能讓上網
與電話同時使用。
21. 頻寬分享器可以將單機型的 ADSL 線路提供給多台電腦上網,其運作原理為何?
答案:頻寬分享器主要運作原理是利用網路位址轉換(NAT)技術,將多個私有 IP 位址對
應到公共正式的 IP 位址,因此只要有一個公共正式 IP 位址,都可以分享給多個私有 IP
使用,讓多台電腦透過 IP 分享器,以同一組公共正式 IP 上網。
22. 網站運作時,電腦主機中會持續運轉的機械式動作零件包含哪些?
答案:硬碟、電源供應器、散熱風扇。
23. 建置網站常用的描述語言,請說明其執行的方式。
答案:網站的描述語言一般是由網站系統以直譯的方式來執行,也就是以原始程式直接
執行,因此放在網站的執行檔都是原始的程式檔。
24. 一般國內的網域名稱,由右至左各段文字所代表的意義為何?
答案:國碼、類別碼、網域、主機名
25. 國內網域名稱的管理及申請單位為何?
答案:管理單位為台灣網路資訊中心 TW-NIC,申請單位為台灣網路資訊中心授權的網
域服務代理商,如:SEED Net、PCHome、HiNet、台灣固網、Yahoo 奇摩等。
26. IP 位址與網域名稱對應的數量原則為何?
答案:一個網域名稱只能對應到一個 IP 位址,一個 IP 位址則可以對應到多個網域名
稱。
適中
27. 目前虛擬主機提供的主機控制有哪幾種?
答案:主要有兩種,一種是支援直接以 telnet 或 ssh 等協定軟體來與主機連結操作,另一
種則是透過 Web 介面提供主機的控制。
28. 帳號新增已完成,但網路商店無法寄出確認信函的原因為何?
答案:造成的原因是後台管理工具【系統管理→系統設定→電子郵件選項→傳送電子郵
件】的內容設定為 true,但伺服器電腦又沒有設定送件電子郵件伺服器(SMTP)的緣
故。
29. 請問「商品評論」的用途為何?要輸入的內容有三個項目?
答案:「商品評論」可以顯示其他顧客對此商品的建議。輸入的內容有:評論人、商品評
論及評等三項。
30. 商品「評等」分成幾個等級?
答案:「評等」由「差」到「好」分五個等級,由會員自由評分。
31. 撰寫商品評論時要注意什麼事情?
答案:評論的字數不可少於 25 個字。
32. 請問「購物車管理」的用途為何?
答案:「購物車管理」讓顧客在進入「結帳作業」前隨時可以查看目前已挑選的商品數量
與總金額等資訊,就如同大賣場的手推車功能一樣,不過網路商店的購物車是虛擬的,
由電腦程式組合而成。
33. 「購物車管理」的使用時機有哪兩項?
答案:(1)顧客查看購物車的內容時;(2)顧客修改購物車內已挑選的商品時。
34. 「購物車管理」的功能有哪四項?
答案:(1)移除商品;(2)修改數量;(3)自動計算總計與小計;(4)繼續購物。
35. 「出貨資訊」中的「送貨地址」是否一定要由顧客自己重新填寫?
答案:送貨地址預設為會員的中文姓名及地址,如送貨地址另有他處,可按「變更出貨
地址」修改之。
36. 「確認訂單-我準備好要買了」會顯示本次線上購物的訂單內容,請問「訂單內容」包
括哪六個項目?
答案:出貨地址、出貨方式、商品、帳單資訊、付款資訊、訂單意見欄。
37. 「我的帳號」內容包括哪些項目?
答案:(1)簡述:顯示全部訂單;(2)我的帳號:檢視或修改帳號資訊、檢視或修改我的通
訊錄、變更帳號密碼;(3)我的訂單:檢視我的訂單;(4)E-Mail 通知:訂閱或取消訂閱電
子信、檢視或修改商品通知清單。
38. 請設定前台客戶註冊畫面,在客戶註冊時必須填寫生日資料。
答案:登入後台,選擇選單 「系統設定」 → 「客戶帳號資訊」,將「生日」參數設定為
true。
39. 請設定前台商品列表畫面,依順序顯示商品圖片、品名、型號、價格、馬上買等項目。
答案:登入後台,選擇選單 「系統設定」 → 「商品列表」,分別設定「顯示商品圖
片」、「顯示品名」、「顯示商品型號」、「顯示商品價格」、「顯示馬上買」等參數為非零的
數字,並將其他參數設定為零。
40. 請設定前台點選某商品分類後的商品列表畫面,每頁顯示 10 個商品。
答案:登入後台,選擇選單 「系統設定」 → 「最大值設定」,將「搜尋結果筆數」參數
設定為 10。
41. 「商品上架」的使用時機為何?
答案:(1)網路商店新店開張,管理員要將銷售之商品放入商品目錄時;(2)要設定商品主
分類目錄或次分類目錄時;(3)有新進的商品需要放入商品目錄時。
42. 新增「次分類目錄」的使用時機為何?
答案:是在「主分類目錄」之下,還可以再細分出其他項目時才使用。
43. 輸入「新增商品」時,能否在「商品說明」的文字方塊內加入 HTML 格式的內容?
答案:可以。
44. 「商品移動」的使用時機為何?
答案:假如新增商品之後由於商品分類的調整,必須將商品從原來的商品分類目錄搬移
到新的商品分類時,就可以使用「商品移動」的功能來處理。
45. 為什麼需要讓商品在多組商品分類中出現?
答案:商品分類的主要目的是讓顧客能夠找到所要購買的商品,因此商品分類命名必須
符合顧客對商品分類的習慣,才能方便顧客儘快找到所要商品完成商品的訂購。但有時
候會遇到不同顧客對商品的分類不一致的情況,比如說「蕃茄」這項商品是屬於蔬菜還
是水果?每位顧客習慣分法可能有所不同。在虛擬的網路商店只要增加蕃茄商品與蔬菜
分類跟水果分類的連結就可以,這也是為什麼有需要讓商品在多組商品分類中出現的原
因。
46. 網路商店進貨有哪兩種策略可應用?各項策略需要注意何種條件?
答案:進貨有「大量進貨」與「零庫存接單」兩種策略應用。「大量進貨」可以降低進貨
的價格,但要考慮供應商提供的條件、商品的保存特性以及實際的銷貨情況。「零庫存接
單」因為沒有預先進貨的庫存,所以要注意到訂單履行品質以及商品供應特性。
47. 請問特價商品的使用時機為何?
答案:網路商店店主要以「折扣」或「低價」的方式促銷商品時使用。
48. 設定「特價商品」時需要輸入哪三項資料?
答案:商品、特價及特價結束日。
49. 某件商品原價為 100 元,如果將它設定成特價商品時,在特價欄內直接輸入 20%,請問
該特價商品的售價會是多少元?
答案:80 元。
50. 「特價結束日」若為空白,表示何種意義?
答案:表示特價沒有結束日期,一直特價到將該特價商品刪除為止。
51. 請說明網路商店管理者,在選擇合適的付款方式時,可以考慮付款方式的哪幾種特性?
答案:付款時間點、手續費負擔、延遲現金支付。
52. 你認為首次交易的客戶,對於付款時間點的主要考量會是什麼?
答案:在首次交易的情況下,因為客戶無法確認商家是否值得信賴,有可能不願意使用
出貨前付款的付款方式。首次交易的客戶可能會對於收到貨品當時或收到商品之後才付
款的方式比較安心。
53. 你認為使用信用卡付款對高單價商品的商店比較有助益;還是對低單價商品的商店比較
有助益?為什麼?
答案:對高單價商品的商店比較有助益。因為客戶使用信用卡付款可以延遲現金支付,
會提高客戶對購買高單價商品的意願。
54. 付款模組安裝後的設定中,有一個顯示順序欄位,說明這個設定欄位的作用。
答案:顯示順序欄位是設定該付款模組,在結帳畫面中所有付款方式之間的顯示順序,
數字越小的會在越前面。
55. 說明網路商店管理者,在選擇出貨方式時,可以考慮出貨方式的哪幾種特性?
答案:運送商品限制、運送地區限制、運送時間、貨運成本負擔、理賠金額。
56. 各類型的運送方式對於運送商品內容是否會有限制?請舉例說明。
答案:部分的運送方式對於運送貨品的內容會有限制,比如郵局的規定便不能寄送液體
或易碎的玻璃製品。
57. 貨運業者對於運送商品遺失或損壞,是否都會照價賠償?這點對於出貨方式的考量有何
影響?
答案:貨運業者都會定出商品理賠的上限金額,因此網路商店管理者必須考量萬一商品
有所損失,所獲得理賠的金額與商品本身價值的比例。假如銷售的是高價的商品,甚至
要考慮使用專門的運送方式或由商家自行運送。
58. 完整的顧客訂貨所需要的程序,包括了哪些作業項目?
答案:前端的訂單輸入、訂單處理、揀貨與包裝、送貨以及處理顧客退貨事宜。
59. 「訂單處理」是在訂單輸入到發出通知至倉儲之間的一連串作業,這些作業包括了哪三
個項目?
答案:(1)訂單批次作業;(2)揀貨及送貨作業之指派;(3)訂單處理進度報告以及訂單改
變。
60. 「已被瀏覽商品」所顯示的結果可以供 EC 經營者做為哪些後續應用?
答案:(1)調整「最佳被觀看商品」網頁的擺放位置順序,讓點選次數高者更容易被會員
看到。(2)比對「已被瀏覽商品」次數高者與「已賣商品」數量大者之間是否有關聯,原
因為何。(3)檢討某些商品從未被瀏覽的原因並考慮下架。
61. 「已賣商品」所顯示的結果可以供 EC 經營者做為哪些後續應用?
答案:(1)找出店內熱賣的人氣商品有那些?這些商品為什麼受歡迎?(2)瞭解商品的銷售
狀況以便備貨,並將人氣商品的庫存量適度提高。(3)比對「已被瀏覽商品」次數高者與
「已賣商品」數量大者之間是否有關聯,原因為何。
62. 「客戶購物排行榜」所顯示的結果可以供 EC 經營者做為哪些後續應用?
答案:(1)找出店裡的重要顧客,對他們加強個別化服務(譬如增加折扣率、提供客製化
的商品…等)。(2)比對「重要顧客」所買的商品是哪些,可以做為進行後續的交叉銷
售。
難
63. 假設在月初 1 號做資料庫備份,有某位客戶 A 在該月 10 號註冊新資料,而在該月 20 號
時發生客戶資料表錯誤,請問你用該月 1 號的備份資料還原資料庫後,A 客戶的註冊資
料是否還在資料庫中?為什麼?
答案:A 客戶的註冊資料不在資料庫中。
因為資料還原時間差的問題,在 1 號備份的資料裡面並沒有 A 客戶的資料,而當資料庫
發生錯誤以 1 號備份的資料還原後,資料庫便還原到月初 1 號時的資料內容,因此沒有
A 客戶的資料。
64. 什麼是「直效行銷」?直效行銷與「資料庫行銷」的關係為何?
答案:(1)「直效行銷」是指審慎地選定個別目標顧客,然後與其進行直接溝通,期望能
獲得他們立即的回應並藉此培養可長可久的顧客關係。(2)「資料庫行銷」是一種新的直
效行銷模式。
65. 請問學者 Kotler 對「資料庫行銷」下的定義為何?
答案:資料庫行銷係指維持與建立顧客長久關係的過程,並且使用顧客資料庫與其他資
料庫(有關產品、供應商及中間商等的資料),以達到接觸顧客且與其交易的目的。
66. 企業進行資料庫行銷時可利用哪些工具?
答案:企業進行資料庫行銷,可利用的工具,除了銷售人員與顧客的直接接觸外,還包
括:電視廣告、平面廣告(包括報紙、雜誌)、直接信函(DM)、網際網路 E-mail 行
銷…等。
67. 「顧客區隔」的目的為何?區隔的方式有哪兩種?
答案:「顧客區隔」是進行資料庫行銷的首要工作,區隔的目的是希望制定不同內容的
「行銷策略」與「顧客服務政策」。區隔的方式有:「一維分群」及「二維分群」兩種。
68. 請問對「顧客忠誠度高」與「顧客忠誠度低」的黃金級顧客,制定的行銷策略有何不
同?
答案:對「忠誠度高」的黃金級顧客,應該提供尊榮的專屬服務,並維持長久的良好關
係。對「忠誠度低」的黃金級顧客,應該盡力運用各種強化顧客忠誠的方法留住顧客,
因為高價值的顧客對企業的貢獻度很大。
69. REM 分析的 R、F、M 各代表什麼隱含意義?
答案:(1) R:最近購買日期,R 的時間距現時愈近,隱含著該顧客再次選購此產品的購
買程度愈高;若 R 距離現時愈遠,隨著時間的拉長該顧客持續購買慾隨之降低,則表示
著此顧客的購買行為可能改變或是變節至他處消費。(2) F:購買頻率,F 愈高代表此顧
客與企業互動程度愈高。購買紀錄中若購買某產品的 F 愈高,表示該顧客對此產品有愈
高的熱衷程度,持續購買之動機亦較強。(3) M:購買總金額,某顧客對某產品消費愈多
的金額,代表該顧客大量購買此產品,對此商品具有大量的需求。
70. 何謂顧客淨值(Customer Equity,
CE)?
答案:一個或一群企業的顧客,在存續期間內對企業所貢獻的收益,扣除為獲取、發展
及維繫該(群)顧客所產生的成本後,所獲得的淨現金流量稱之為顧客淨值,又叫做顧
客關係價值(CRV)或顧客獲利(CP)。
71. 顧客交易資料分析的過程可分成哪四個步驟?
答案:(1)資料來源、(2)資料加工、(3)資料儲存、(4)分析處理。
72. 顧客交易資料分析的「資料來源」可能有哪些項目?
答案:「資料來源」指得是存放顧客交易資料的原始紀錄,它可能是任何格式的電子檔案
(如 Word、Excel…等)或應用系統(如電子商務網站系統、POS 銷售點系統、進銷存
管理系統、ERP 系統的銷售模組…等)使用的資料庫管理系統(如 Access、MySQL、
SQL
Server、Oracle、Sybase…等 DBMS)。
73. 資料加工主要的工作是 ETL,它包括哪三個項目?
答案:資料萃取(Data Extraction)、資料轉換(Data
Transformation)與資料載入(Data
Loading)。
74. 請問什麼是線上即時分析處理(On-Line
Analytical Processing, OLAP)?
答案:OLAP 可操作儲存在資料倉儲內廣泛的資料,透過快速、一致、互動式的介面對
同一資料提供各種不同觀點或角度的呈現方式,供不同層面的使用者使用。
75. 請問資料探勘(Data Mining)的定義為何?
答案:資料探勘是指:「從大量資料中,尋找事前未知、有效且可以付諸行動的規則或知
識。」它提供企業從龐大的資料倉儲系統中,發掘出顧客感興趣或是有意義的資訊。
76. 物流學者 Frezelle 認為顧客活動剖析檔案應該包括三個主要項目,請問是哪三個項目?
答案:顧客銷售活動輪廓檔案(Customer Sales
Activity Profile, CSAP)、產品品項銷售活
動輪廓檔案(Item Sales
Activity Profile, ISAP)及顧客-產品品項銷售活動輪廓檔案
(Customer Item
Sales Activity Profile, CISAP)。
77. 想要自己動手來進行網路商店系統擴充,必須具備幾種電腦技能?
答案:PHP 網路程式語言的撰寫能力,以及 MySQL 資料庫管理系統的操作經驗。
78. 在修改程式或安裝外掛之前,應該先做好備份的工作,請說明原因。
答案:先做好備份工作,可以在修改或安裝外掛出現錯誤時,將程式系統還原為原來正
常運作的狀態。
在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
3. 下列哪些是常見的網路犯罪?(複選)
(A) 網路販賣盜版光碟
(B) 網路販賣贓物
(C) 入侵他人網站
智慧財產權法想要保護的是下列何者?(單選)
(A) 人類腦力辛勤創作的結晶
12. 關於隱私權的敘述,下列哪些正確?[複選]
(A) 隱私權是一種不受干擾的權利
(B) 垃圾郵件是一種常見的侵犯隱私權行為
(C) 無故打開他人的電子郵件也是一種侵犯隱私權行為
13. 經營電子商務網站,需注意的網站資訊政策有哪些?[複選]
(A) 網站的使用規則
(B) 隱私權政策
(C) 會員資料使用說明
15. 有關著作權的敘述,下列哪些不正確?[複選]
(A) 著作權人死前均受著作權保護
(B) 在不知情情況下代為重製未經授權的他人著作物是無罪的(D) 著作權保護長達 100 年
17. 關於專利權的特性,下列敘述何者錯誤?[單選]
(A) 識別性
18. 有關專利權的敘述,下列何者正確?[單選]
(C) 專利權只限於申請的國家,出了國境就不受保護
19. 商標權的功能包括下列那些項目?[複選]
(A) 區別商品或服務
(B) 表彰商品或服務的來源
20. 在電子商務中所謂的「智慧財產權」,不包括下列何者?[單選]
(D) 隱私權
在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(B) 著作權
(C) 專利權
(D) 商標權
3. 下列哪些是常見的網路犯罪?(複選)
(A) 網路販賣盜版光碟
(B) 網路販賣贓物
(C) 入侵他人網站
智慧財產權法想要保護的是下列何者?(單選)
(A) 人類腦力辛勤創作的結晶
12. 關於隱私權的敘述,下列哪些正確?[複選]
(A) 隱私權是一種不受干擾的權利
(B) 垃圾郵件是一種常見的侵犯隱私權行為
(C) 無故打開他人的電子郵件也是一種侵犯隱私權行為
13. 經營電子商務網站,需注意的網站資訊政策有哪些?[複選]
(A) 網站的使用規則
(B) 隱私權政策
(C) 會員資料使用說明
15. 有關著作權的敘述,下列哪些不正確?[複選]
(A) 著作權人死前均受著作權保護
(B) 在不知情情況下代為重製未經授權的他人著作物是無罪的(D) 著作權保護長達 100 年
17. 關於專利權的特性,下列敘述何者錯誤?[單選]
(A) 識別性
18. 有關專利權的敘述,下列何者正確?[單選]
(C) 專利權只限於申請的國家,出了國境就不受保護
19. 商標權的功能包括下列那些項目?[複選]
(A) 區別商品或服務
(B) 表彰商品或服務的來源
20. 在電子商務中所謂的「智慧財產權」,不包括下列何者?[單選]
(D) 隱私權
1) Which
of the following statements about Internet usage in the United States is not
true?
A) In
2020, around 290
million people of all ages had access to the Internet.
B) In
2020, the growth in
the number of new online users was around 1.5%.
C) Over
90% of all U.S. Internet users access the Internet using a mobile device.
D)
Adults in the 25-to-54-age group have the highest percentage of Internet use.
Answer:
D
2) Which
of the following is not one of the main stages of the online purchasing
process?
A)
post-purchase service and loyalty
B)
awareness
C)
engagement
D)
conversation
Answer:
D
3) What
was the approximate Internet penetration rate in 2019 for individuals that have
attained less than a high-school education?
A) 51%
B) 61%
C) 71%
D) 81%
Answer:
C
4) All of
the following are online communications used to support the evaluation of
alternatives stages of the consumer decision process except:
A)
search engines.
B)
online catalogs.
C)
social networks.
D)
targeted banner ads.
Answer:
D
5)
Approximately ________ of U.S. Internet users research online but do not buy.
A) 7.5%
B) 10%
C) 25%
D) 80%
Answer:
B
6) In
modeling online consumer behavior, the concept of "consumer skills"
refers to the:
A)
education level of the consumer.
B)
communication skills of the consumer.
C)
knowledge consumers have about how to conduct online transactions.
D)
product evaluation skills of the consumer.
Answer:
C
7)
Research shows the two key factors shaping the decision to purchase online are
utility and trust.
Answer:
TRUE
8) A
roughly equal percentage of men and women in the United States use the Internet
today.
Answer:
TRUE
9)
Consumers choose the online channel primarily due to social media influence.
Answer:
FALSE
10)
Online traffic is partially driven by offline brands and traditional shopping.
Answer:
TRUE
11) The
majority of online shoppers find vendors by clicking on display ads.
Answer:
FALSE
13) Which
of the following online advertising formats attracted the least amount of
spending in 2020?
A)
search
B)
classifieds
C) rich
media
D)
e-mail
Answer:
D
14)
Google introduced which of the following changes to its search algorithm to
weed out low quality sites from search results?
A)
Penguin
B)
Hummingbird
C) Panda
D)
Knowledge Graph
Answer:
C
15)
Which of the following forms of online advertising is expected to grow the most
between 2020 and 2024?
A) paid
search
B)
sponsorships
C)
search engines
D) video
Answer:
D
16)
Which of the following is not one of the four main methods advertisers use to
behaviorally target ads?
A)
Nielsen ratings
B) data
collected from social networks
C)
integration of online data with offline data
D)
clickstream data
Answer:
A
17)
Which of the following search engine algorithm updates targets websites that
violate Google's guidelines?
A) Panda
B)
Penguin
C)
Hummingbird
D) Fred
Answer:
D
18) Which
of the following is a Google algorithm update related to local search?
A)
Penguin
B)
Hummingbird
C) Panda
D)
Possum
Answer:
D
19)
Pinterest's Lens is an example of which of the following?
A)
keyword advertising
B) SEO
C) voice
search
D)
visual search
Answer:
D
20)
Which of the following is not a practice that degrades the results and
usefulness of search engines?
A)
social search
B) link
farms
C)
content farms
D) click
fraud
Answer:
A
21)
Amazon's Associates program is an example of which of the following?
A) viral
marketing
B) local
marketing
C)
affiliate marketing
D) lead
generation marketing
Answer:
C
22) Ad
blockers operate in a manner similar to which of the following?
A)
anti-virus software
B)
firewalls
C) Flash
cookies
D) anonymous
browsing
Answer:
B
23)
Which of the following is not a primary source of ad fraud?
A)
browser extensions that insert ads into a premium publisher's website and then
list the ads as available on a programmatic ad exchange
B) ad
targeting firms that create bots that imitate the behavior of real shoppers and
then charge advertisers
C)
botnets hired by publishers to click on web pages to create phony traffic
D)
native advertising that is displayed on a social media site
Answer:
D
24) The
percentage of all e-mail that is spam averaged around ________ in 2020.
A) 55%
B) 65%
C) 75%
D) 85%
Answer:
A
25)
Which of the following statements about CAN-SPAM is not true?
A)
CAN-SPAM went into effect in January 2004.
B)
CAN-SPAM prohibits unsolicited e-mail (spam).
C)
CAN-SPAM prohibits the use of deceptive subject lines and false headers.
D) Large
spammers are among CAN-SPAM's biggest supporters.
Answer:
B
26)
Which of the following statements about Canada's anti-spam law is not true?
A)
Canada's law is based on an opt-in model.
B) The
law has no impact on companies located within the United States.
C) The
first phase of the law went into effect in 2014.
D) The
law applies to e-mail, texts, and social media messaging.
Answer:
B
27)
Which of the following is the most important tool in establishing a
relationship with the customer?
A)
company website
B)
company CRM system
C)
Facebook
D)
search engine display ads
Answer:
A
28) All
of the following are "traditional" online marketing tools except:
A)
affiliate marketing.
B)
e-mail and permission marketing.
C)
social marketing.
D)
sponsorship marketing.
Answer:
C
29) All
of the following are among those most frequently affected by ad-blocking
except:
A)
gaming sites.
B)
newsgroup\forums.
C)
social network sites.
D)
online retailers.
Answer:
D
30) The
NIKEiD program is an example of which of the following marketing techniques?
A)
customer co-production
B)
transactive content
C) price
discrimination
D)
permission marketing
Answer:
A
31) The
incremental cost of building the next unit of a good is called the:
A) Law
of One Price.
B)
variable cost.
C)
marginal cost.
D) fixed
cost.
Answer:
C
32)
Which of the following statements about a free pricing strategy is not true?
A) Free
products and services can knock out potential and actual competitors.
B) The
free pricing strategy was born in the early days of the Web.
C) It is
difficult to convert free customers into paying customers.
D) Free
products and services can help build market awareness.
Answer:
B
33)
Creating multiple variations of information goods and selling these to
different market segments at different prices is called:
A)
bundling.
B)
customization.
C)
dynamic pricing.
D)
versioning.
Answer:
D
34) All
of the following are fixed price strategies except:
A)
bundling.
B)
versioning.
C) free
pricing.
D) yield
management.
Answer:
D
35)
Which of the following involves getting customers to pass along a company's
marketing message to friends, family, and colleagues?
A)
affiliate marketing
B) viral
marketing
C)
native advertising
D) lead
generation marketing
Answer:
B
36)
Group M, the world's
largest advertising buyer, requires which
of the following in order for an ad to be considered viewable?
A) 50%
of the pixels must be in view for at least one second.
B) 50%
of the pixels must be in view for at least two seconds.
C) 100%
of the pixels must be in view for at least one second
D) 100%
of the pixels must be in view for at least two seconds
Answer:
C
37)
Which of the following is based on the idea of complete price transparency in a
perfect information marketplace?
A) the
Law of One Price
B)
dynamic pricing
C) price
discrimination
D)
versioning
Answer:
A
38)
Which of the following industries accounted for the highest percentage of
spending on online advertising in 2019?
A)
financial services
B)
retail
C)
automotive
D)
entertainment
Answer:
B
39)
Which of the following statements about native advertising is not true?
A)
Almost all of social network ad spending is native advertising.
B) Most
consumers are able to easily distinguish editorial content from native
advertising.
C)
Native advertising's share of mobile display revenues has grown to 85% in 2020.
D)
Consumers look at native ads more frequently than they look at display ads.
Answer:
B
40)
Which of the following is an automated, auction-based method for matching demand and
supply for online display ads?
A)
retargeting
B)
behavioral targeting
C)
programmatic advertising
D)
keyword advertising
Answer:
C
41)
Research has found that most of the ad impressions served across display
advertising platforms are not viewable.
Answer:
TRUE
42) The
highest amount of online advertising spending is for online video ads.
Answer:
FALSE
43)
Evidence suggests that real-time customer chat increases the dollar value of
transactions.
Answer:
TRUE
44) A significant
percentage of online ad impressions served are not actually viewed or even
viewable.
Answer:
TRUE
45) Lead
generation marketing firms specialize in inbound marketing.
Answer:
TRUE
46) The
concept of "customer satisfaction" is broader than the concept of
"customer experience."
Answer:
FALSE
47)
Bundling is the process of selling two or more products together for a price
that is less than the sum of the two product's individual prices.
Answer:
TRUE
51)
Which of the following is an open source software framework used to collect and
analyze a company's big data?
A) data
warehouse
B)
Hadoop
C) SQL
D)
profiling
Answer:
B
52)
Which of the following statements about the Internet's impact on marketing is
not true?
A) The
Internet has broadened the scope of marketing communications.
B) The
Internet has decreased the impact of brands.
C) The
Internet has increased the richness of marketing communications.
D) The
Internet has expanded the information intensity of the marketplace.
Answer:
B
53)
Which of the following features of e-commerce technology enables marketers to
engage customers in a dialog and dynamically adjust the experience to the
consumer?
A)
ubiquity
B)
richness
C)
information density
D)
interactivity
Answer:
D
54)
Which of the following features of e-commerce technology decreases the cost of
delivering marketing messages and receiving feedback from users?
A)
personalization\customization
B)
universal standards
C)
ubiquity
D)
interactivity
Answer:
B
55) The richness
made possible by e-commerce technologies does which of the following?
A) It
reduces the cost of delivering marketing messages and receiving feedback from
users.
B) It
allows consumers to become co-producers of the goods and services being sold.
C) It
allows video, audio, and text to be integrated
into a single marketing message and consuming experience.
D) It
enables worldwide customer service and marketing communications.
Answer:
C
56) All
of the following statements about cookies are true except:
A)
cookies can be used to create cross-site profiles of users.
B) the
data typically stored in cookies includes a unique ID and e-mail address.
C)
cookies make shopping carts possible by allowing a site to keep track of a
user's actions.
D) the
more cookies are deleted, the less
accurate ad server metrics become.
Answer:
B
57) A
web beacon is:
A) a
cookie that carries a virus.
B) an
executable cookie.
C) an
automated applet for performing web searches.
D) a
tiny graphics file embedded in an e-mail or web page.
Answer:
D
58)
________ is an open source database that can store and analyze both structured
and unstructured data.
A) ASP
B) PHP
C)
Hadoop
D) JSP
Answer:
C
59) A
________ is a repository of customer information that records all contacts that
a customer has with a firm and generates a customer profile available to
everyone in the firm with a need to know the customer.
A)
customer service chat system
B) CRM
system
C) data
warehouse
D)
transactive content system
Answer:
B
60) The marketing
technique known as ________ involves merchants offering many products for which
there is little demand.
A) long
tail marketing
B) flash
marketing
C) yield
management
D)
bait-and-switch
Answer:
A
61)
Which of the following provides web marketers with a very quick means of
identifying a customer and understanding his or her behavior at a site?
A)
transaction logs
B)
cookies
C)
registration forms
D) data
warehouses
Answer:
B
62)
Transaction logs are built into client software and not the web server
software.
Answer:
FALSE
63)
Regular in-app cookies can be shared between apps.
Answer:
FALSE
68) If
you want to determine the size of your website's audience, the metric you will use for
the most accurate measurement will be:
A) page views.
B) unique visitors.
C) hits.
D)
reach.
Answer:
B
69)
Cross-platform attribution refers to:
A) how
to assign credit to different marketing initiatives.
B)
understanding why visitors to a website purchase a product.
C) understanding
how impressions lead to visits.
D)
understanding why people click on ads.
Answer:
A
70) VTR
measures the ________ response rate to an ad.
A)
30-minute
B)
24-hour
C) 7-day
D)
30-day
Answer:
D
71) Uber
has been criticized for using which of the following?
A) flash
marketing
B)
bundling
C) surge
pricing
D)
malware
Answer:
C
72) What
kinds of ads have the lowest CTR?
A) video
ads
B)
e-mails to an in-house list
C)
social network display ads
D)
banner display ads
Answer:
D
73)
Purchasing an online ad on a CPA basis means that the advertiser:
A) pays
for impressions in 1,000 unit lots.
B) pays
a pre-negotiated fee for each click an ad receives.
C) pays
only for those users who perform a specific action, such as registering, purchasing, etc.
D)
exchanges something of equal value for the ad space.
Answer:
C
74) eCPM
measures the ROI of an ad by dividing the total earnings of the ad by which of
the following?
A) the
total number of impressions
B) the total
number of impressions in hundreds
C) the
total number of impressions in thousands
D) the
total number of impressions in millions
Answer:
C
75)
Which of the following measures the average length of stay at a website?
A)
loyalty
B)
stickiness
C) page
views
D)
retention rate
Answer:
B
76)
Acquisition rate is a measure of the:
A)
percentage of visitors who indicate an interest in a site's products by
registering or visiting a product's pages.
B)
percentage of visitors who become customers.
C)
percentage of existing customers who continue to buy on a regular basis.
D)
percentage of shoppers who do not return within a year after their initial
purchase.
Answer:
A
77)
Recency refers to the:
A)
percentage of customers who do not return during the next year after an initial
purchase.
B) time
elapsed since the last visit made by a customer.
C)
percentage of existing customers who continue to buy on a regular basis.
D)
percentage of customers who return to the site within a year to make additional
purchases.
Answer:
B
78)
View-to-cart ratio is a measure of the:
A)
percentage of visitors who indicate an interest in a site's products by
registering or visiting a product's pages.
B)
percentage of views that lead to an add-to-cart action.
C)
percentage of existing customers who continue to buy on a regular basis.
D)
percentage of shoppers who do not return within a year after their initial
purchase.
Answer:
B
79)
Which of the following measures the ratio of items purchased to product views?
A) conversion
rate
B) cart
conversion rate
C)
browse-to-buy ratio
D)
view-to-cart ratio
Answer:
C
80)
Which of the following measures the percentage of e-mails that could not be
delivered?
A)
abandonment rate
B)
unsubscribe rate
C)
bounce-back rate
D)
attrition rate
Answer:
C
81)
Which of the following is the most meaningful metric for video ads?
A) view
time
B) CTR
C)
completion rate
D) skip
rate
Answer:
C
82)
Which of the following measures the percentage of times an ad is clicked?
A)
retention rate
B) CTR
C)
loyalty rate
D)
conversion rate
Answer:
B
83) The
average abandonment rate is highest for shopping carts accessed via
smartphones.
Answer:
FALSE
-------------
1.5)
________ is the ability to ensure that an e-commerce site continues to function
as intended.
A
.
A)
Nonrepudiation
B
.
B)
Authenticity
C
.
C)
Availability
D
.
D)
Integrity
正確答案: C
2.11)
Which system functionality must your website have to be able to personalize or
customize a product for a client?
A
.
A) an ad
server
B
.
B) a site
tracking and reporting system
C
.
C) an
inventory management system
D
.
D)
customer on-site tracking
正確答案: D
3.19)
Which of the following uses a subscription-based sales revenue model?
A
.
A) Yahoo
B
.
B) eBay
C
.
C)
MyPoints
D
.
D) Dollar
Shave Club
正確答案: D
4.下列敘述何者有誤?[單選]
A
.
A. 變動性較低、需求固定的市場,可採用拉式基礎的供應鏈
B
.
B. 推式基礎的供應鏈是預測市場的需求
C
.
C. 接單生產的模式為拉式基礎的供應鏈
D
.
D. 目前可先準備半成品,等顧客下單後再進行生產為推式+拉式之混合模式
正確答案: A
5.7) What
are the two most important management challenges in building a successful
e-commerce presence?
A
.
A)
developing a clear understanding of business objectives and knowing how to
choose the right technology to achieve those objectives
B
.
B) having
an accurate understanding of your business environment and an achievable
business plan
C
.
C)
building a team with the right skill sets and closely managing the development
process
D
.
D)
identifying the key components of your business plan and selecting the right
software, hardware, and infrastructure for your site
正確答案: A
6.77)
Above all, e-commerce is a ________ phenomenon.
A
.
A)
technology driven
B
.
B)
finance-driven
C
.
C)
sociological
D
.
D)
government-driven
正確答案: A
7.13. 在電子商務交易中,買賣雙方皆為企業,為下列何種型態?[單選]
A
.
B2B2C
B
.
B2C
C
.
C2C
D
.
B2B
正確答案: D
8.18)
________ is a utility program that allows you to check the connection between
your client and a TCP/IP network.
A
.
A) Ping
B
.
B)
Telnet
C
.
C)
Tracert
D
.
D)
Finger
正確答案: A
9.請問下列何者非呈現式廣告的概念?[單選]
A
.
A. 主要是在網路發展的早期
B
.
B. 又稱為關鍵字廣告
C
.
C. 要傳遞的內容擺置在網頁的上方(橫幅式廣告)
D
.
D. 跳出新網頁的彈出式廣告
正確答案: B
10.「SCM」是指?[單選]
A
.
A. 企業資源規劃
B
.
B. 供應鏈管理
C
.
C. 顧客關係管理
D
.
D. 知識管理
正確答案: B
11.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線 速度,造成使用者點選網頁時需要花很久的時間,再加上添購電子化設備費用 昂貴,最後導致成效不如預期而收編。由上述案例來看,除了外部影響外, NOVA在內部還遇到哪個困難?[單選]
A
.
A. 導入時程過長
B
.
B. 系統無法整合
C
.
C. 導入費用過高
D
.
D. 系統流程僵化
正確答案: C
12.14) The
existence of many competitors in any one market segment may indicate:
A
.
A) an
untapped market niche.
B
.
B) the
market is saturated.
C
.
C) no
one firm has differentiated itself within that market.
D
.
D) a
market that has already been tried without success.
正確答案: B
13.台灣銀行在民國86年1月底開始提供電子轉帳服務,透過IC卡、電子簽章、密碼與非對稱加密的模式來保障電子轉帳交易之安全,這屬於B to B電子商務發展的哪一個階段?[單選]
A
.
電子資料交換
B
.
基本的電子商務
C
.
電子交易市集
D
.
協同商務
正確答案: A
14.2) Which
of the following uses a subscription revenue model for books?
A
.
A)
Spotify
B
.
B)
Amazon Kindle Unlimited
C
.
C)
eHarmony
D
.
D)
Pandora
正確答案: B
15.52)
Proxy servers are also known as __________ because they have two network
interfaces.
A
.
A)
firewalls
B
.
B)
application gateways
C
.
C) dual
home systems
D
.
D)
packet filters
正確答案: C
16.37)
All of the following might be part of a website's middle-tier layer except:
A
.
A) a
database server.
B
.
B) an ad
server.
C
.
C) legacy
corporate applications.
D
.
D) a
mail server.
正確答案: C
17.52)
All of the following are involved in the effort to create standards for IoT
except: 回答錯誤
A
.
A)
AllSeen Alliance.
B
.
B)
Industrial Internet Consortium.
C
.
C) Open
Connectivity Foundation.
D
.
D) W3C.
正確答案: D
18.將傳統拍賣方式轉換到網際網路上來進行此模式稱為?[單選]
A
.
人際關係
B
.
交易
C
.
幻想
D
.
興趣
正確答案: D
19.22. 冷門產品的需求量不高,但匯聚多樣的冷門產品所產生之效果會大於傳統熱門產品所產生的效果,這是指?[單選] 回答錯誤
A
.
12 組
B
.
15 組
C
.
20 組
D
.
30 組
正確答案: B
20.13) ________
is a model of computing in computer processing, storage, software, and other
services which are provided as a shared pool of virtualized resources over the
Internet.
A
.
A)
Client/server computing
B
.
B) P2P
computing
C
.
C)
Mobile computing
D
.
D) Cloud
computing
正確答案: D
21.30)
________ typically attack governments, organizations, and sometimes individuals
for political purposes.
A
.
A)
Crackers
B
.
B) Tiger
teams
C
.
C)
Bounty hunters
D
.
D)
Hacktivists
正確答案: D
22.34. 在電子商務的交易模式中,由賣方事先設定好產品價格的商務交易,這是屬於?[單選]
A
.
需求整合式價格
B
.
目錄式價格
C
.
拍賣式價格
D
.
逆拍賣式價格
正確答案: B
23.導入CRM之各個時期都必須獲得公司各部門鼎力合作才能真正成功,這 是在解決顧客關係管理的哪項失敗因素?[單選]
A
.
A. 與原系統間的整合不易
B
.
B. 初期效益不明顯
C
.
C. 廠商能力不足
D
.
D. 缺乏人才與共識
正確答案: D
24.40)
Which of the following would you use to verify that links on web pages are
valid? 回答錯誤
A
.
A) HTTP
B
.
B) FTP
C
.
C) data
capture tools
D
.
D) site
management tools
正確答案: D
25.24)
The percentage of all e-mail that is spam averaged around ________ in 2020.
A
.
A) 55%
B
.
B) 65%
C
.
C) 75%
D
.
D) 85%
正確答案: A
26.博客來網路書店承諾「中午前訂,隔天7-11取貨」,此符合B to C電子商務影響因素中的哪一個?[單選]
A
.
充足的信任機制
B
.
易用的網站功能
C
.
特殊的使用經驗
D
.
便捷的運送服務
正確答案: D
27.29)
Which of the following types of attacks enabled hackers to take control of the
Twitter accounts of dozens of America’s most prominent political, entertainment
and technology leaders?
A
.
A) DDoS
attack
B
.
B)
ransomware
C
.
C)
social engineering
D
.
D)
sniffing
正確答案: C
28.44)
Which of the following is an example of a company using the content provider
model?
A
.
A)
Priceline
B
.
B)
Netflix
C
.
C) Dell
D
.
D) eBay
正確答案: B
29.由Call Center轉為顧客關係管理時,原先利用電話蒐集到的顧客資訊無法 和網頁整合,此時造成顧客在詢問或購買時不方便,這是屬於顧客關係管理可 能會遇到的困難的哪一種?[單選]
A
.
A. 廠商能力不足
B
.
B. 與原系統整合不易
C
.
C. 初期效益不彰
D
.
D. 缺乏人才及共識
正確答案: B
30.37)
Which of the following is based on the idea of complete price transparency in a
perfect information marketplace? 回答錯誤
A
.
A) the
Law of One Price
B
.
B)
dynamic pricing
C
.
C) price
discrimination
D
.
D)
versioning
正確答案: A
31.27) A
template test is a form of which type of testing?
A
.
A) unit
testing
B
.
B)
system testing
C
.
C)
acceptance testing
D
.
D) A/B
testing
正確答案: D
32.46)
In general, the key to becoming a successful content provider is to:
A
.
A) own
the content being provided.
B
.
B) own the
technology by which content is created, presented, and distributed.
C
.
C)
provide online content for free.
D
.
D)
provide other services as well as online content.
正確答案: A
33.50)
M-commerce is the type of e-commerce that generates the most revenue.
A
.
A
B
.
B
正確答案: B
34.4. 智慧財產權法想要保護的是下列何者?(單選)
A
.
(A) 人類腦力辛勤創作的結晶
B
.
(B) 商業機密
C
.
(C) 商業利益
D
.
(D) 一般人知的權利
正確答案: A
35.3. 下列哪些是常見的網路犯罪?(複選)
A
.
(A) 網路販賣盜版光碟
B
.
(B) 網路販賣贓物
C
.
(C) 入侵他人網站
D
.
(D) 散發電腦病毒
正確答案: A B C
36.1. 在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
A
.
(A) 隱私權
B
.
(B) 著作權
C
.
(C) 專利權
D
.
(D) 商標權
正確答案: B C D
37.8. 下列何者不受著作權法的保護?(單選)
A
.
(A) 三歲小孩的畫作
B
.
(B) 中華民國憲法
C
.
(C) 學校的試題
D
.
(D) 學校的網頁
正確答案: B C D
38.2. 智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
A
.
(A) 隱私權
B
.
(B) 著作權
C
.
(C) 專利權
D
.
(D) 商標權
正確答案: B C D
39.6. 有關網路禮儀,下列哪些正確?(複選)
A
.
(A) 電腦禮儀的基本原則是「尊重」
B
.
(B) 雖是未經證實的消息,也要先讓大家知道
C
.
(C) 轉載別人的文章時,最好註明出處
D
.
(D) 最好取得原作者的同意後再進行轉載
正確答案: A C D
40.3. 有關電子商務的定義,下列哪些錯誤?(複選)
A
.
(A) 電子商務就是不用在網路上做生意
B
.
(B) 電子商務就是把傳統的商業活動搬到網際網路上來進行
C
.
(C) 電子商務一定要透過網路線來傳遞
D
.
(D) 電子商務是商業交易或工作流程自動化的技術應用
正確答案: A C
41.58)
Face ID is an example of which of the following?
是非題 (2 分) 2分
A
.
A)
biometrics
B
.
B)
encryption
C
.
C) IDS
D
.
D)
firewall
正確答案: A
42.59) WLAN-based
Internet access derives from the same technological foundations as
telephone-based wireless Internet access.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
43.38)
Personalization involves targeting marketing messages to specific individuals
by adjusting the message based upon a consumer's preferences or past purchasing
behavior.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
44.35) Exploit
kits can be purchased by users to protect their computers from malware.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
45.76)
Scale economies are efficiencies that result from increasing the size of the
business.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
46.7) Research
shows the two key factors shaping the decision to purchase online are utility
and trust.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
47.79) Interactivity
that enables product customization alters industry structure by decreasing the
threat of substitutes.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
48.58)
The United States has the world’s highest average Internet connection
speed.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
49.34) A
multi-tier architecture includes a web and database server.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: B
50.10) Online
traffic is partially driven by offline brands and traditional shopping.
是非題 (2 分) 2分
A
.
A
B
.
B
正確答案: A
1.想要跟台塑往來的廠商必須透過台塑網的電子化採購平台,請問這是屬於 企業電子化時應考慮的哪個因素?[單選]
B. 相關廠商的配合姓
2.「ERP」是指?[單選]
A. 企業資源規劃
3.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線 速度,造成使用者點選網頁時需花很久的時間,再加上添購電子化設備費用昂 貴,最後導致成效不如預期而收編。由上可知,NOVA沒有考慮到什麼問題? [單選]
C. 基礎設備的完整性
4.自 2009 年以來,便利商店紛紛提供電子化票券的服務,涵蓋遊樂園、交通、展覽等,將訂票的流程簡化,並利用促銷的方法吸引消費者接受與採用,像在 ibon 購票,憑票根就有咖啡買一送一的優惠。請問上述是屬於企業電子化的哪一個策略?(單選)
(B) 創新產業的形成
5.Both
mobile and social advertising spending are expected to double from 2017 to
2021.
A.O
6.Ads
that appear in a Facebook user's News Feed are called:
C) Page
Post Ads.
7.Which
of the following Twitter marketing tools involves a coupon or other promotional
offer that appears in users' Twitter timeline?
D)
Twitter Card
8.Which
of the following allows Facebook to track user behavior on other sites?
B) Like
button
9.Which
of the following is most similar to Pinterest?
B)
Instagram
10.Which
of the following involves using a variety of tools to encourage users to
interact with content and brand?
B)
engagement
11.People
spend the most time doing which of the following when using a mobile device?
C)
listening to music
12.Which
of the following is not a major provider of mobile display advertising?
D)
Webtrends
13.A
cell phone's GPS is accurate to within five feet of the actual location of the
phone.
B.X
14.「減少供應商數量、提高出貨管理、付款管理及銷售部門效率」這是指何 者對電子商務的作用?[單選]
C. 供應鏈管理
15.Which
of the following is not one of the four basic principles shared by ethical
schools of thought in western culture?
A
.
A)
accountability
B
.
B)
privacy
C
.
C)
responsibility
D
.
D)
liability
正確答案: B
16.Which
ethical principle states that when confronted with an ethical dilemma, an
individual should take the action that produces the least harm, or the least
potential cost?
A
.
A)
Slippery Slope
B
.
B) Risk
Aversion
C
.
C) No
Free Lunch
D
.
D) The Collective
Utilitarian Principle
正確答案: B
17.A
social consequence of the richness of Internet information is:
A
.
A) an
increase in shallowness.
B
.
B) an increase
in the ease of creating misleading information.
C
.
C) very
persuasive messages might reduce the need for multiple independent sources of
information.
D
.
D) an
increase in vulnerability to hacking attacks.
正確答案: C
18.Which
of the following is used to track individuals as they move among thousands of
websites?
A
.
A)
first-party cookies
B
.
B)
digital wallets
C
.
C)
advertising networks
D
.
D)
shopping carts
正確答案: C
19.What is
the FTC recommendation regarding choice as it relates to personally
identifiable information (PII)?
A
.
A)
Require firms to have consumers affirmatively opt-in before PII is collected.
B
.
B)
Require firms to allow consumers to opt-out before PII is collected.
C
.
C) Make
collection of PII illegal.
D
.
D)
Require robust notice only before PII is collected.
正確答案: A
20."Do
Not Track" falls under which of the following principles in the FTC's
current privacy framework?
A
.
A)
Privacy by Design
B
.
B)
Simplified Choice
C
.
C)
Greater Transparency
D
.
D) Scope
正確答案: B
21.Which
of the following technologies reduces the ability to merge different files and
de-anonymize consumer data?
A
.
A)
anonymous surfing
B
.
B)
anonymous remailers
C
.
C) differential
privacy software
D
.
D)
public key encryption
正確答案: C
22.According
to data from Pew Research Center, which of the following is the action which
the highest percentage of Internet users has taken to preserve their privacy
online?
A
.
A) used
an anonymous web browsing service
B
.
B)
encrypted their communications
C
.
C)
cleared web browser history and cookies
D
.
D)
posted comments online anonymously
正確答案: C
23.Which
of the following protects original forms of expression in a tangible medium?
A
.
A) trade
secret law
B
.
B)
copyright law
C
.
C)
patent law
D
.
D)
trademark law
正確答案: B
24.Which
case was instrumental in paving the way for Internet business methods patents?
A
.
A)
Bilski et al. v. Kappos
B
.
B) State
Street Bank & Trust Co. v. Signature Financial Group, Inc.
C
.
C) Alice
Corporation Pty. Ltd. v. CLS Bank International
D
.
D)
Ticketmaster Corp. v. Tickets.com
正確答案: B
25.Registering
a domain name similar or identical to a trademark of a legitimate site to
divert web traffic to the infringing site is an example of:
A
.
A)
keywording.
B
.
B)
cyberpiracy.
C
.
C)
framing.
D
.
D)
metatagging.
正確答案: B
26.Which
of the following involves bypassing the target site's home page and going
directly to a content page?
A
.
A)
cybersquatting
B
.
B)
metatagging
C
.
C)
framing
D
.
D) deep
linking
正確答案: D
27.Which
of the following involves the issue of social control?
A
.
A)
information rights
B
.
B)
governance
C
.
C)
public safety and welfare
D
.
D)
property rights
正確答案: B
28.Which
of the following Supreme Court cases established that states can compel online
retailers to collect and remit sales taxes even if they do not have a physical
presence within the state?
A
.
A) South
Dakota v. Wayfair
B
.
B) Bilski et al. v. Kappos
C
.
C) Quill
v. North Dakota
D
.
D) Alice
Corporation v. CLS Bank International
正確答案: A
29.Net
neutrality refers to the idea that Internet service providers (ISPs), including
cable Internet and wireless carriers, should treat all data on the Internet in
the same manner, and not discriminate or price differentially by content,
protocol, platform, hardware, or application.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
30.The
Children's Internet Protection Act (CIPA) has been struck down by the U.S.
Supreme Court as unconstitutional.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
31.Online
gambling is now legal throughout the United States.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
32.阿仁很喜歡上Facebook看網友們分享的一些有趣的經驗,但麻煩的是, 一定要按讚才能看到內容。請問這屬於顧客關係管理的哪個階段?[單選] 回答錯誤
A
.
A. 技術與策略階段
B
.
B. 蒐集與接觸階段
C
.
C. 互動與修改階段
D
.
D. 區隔與價值階段
正確答案: A
33.東森購物一開始開台時,利用叫賣的方式來吸引消費者上門,雖達到銷售 的成效,但也帶來大量的退、換貨成本。營運一段時間後,東森累積了一定程 度的顧客資料,也開始分析其擁有的顧客資訊以找出消費者的可能需求,開發 出真正符合顧客需求的產品。由上述例子可知,東森購物克服了什麼困難?[單 選]
A
.
A. 初期效益不明顯
B
.
B. 廠商能力不足
C
.
C. 缺乏人才及共識
D
.
D. 與原系統間的整合不易
正確答案: A
34.由Call Center轉為顧客關係管理時,原先利用電話蒐集到的顧客資訊無法 和網頁整合,此時造成顧客在詢問或購買時不方便,這是屬於顧客關係管理可 能會遇到的困難的哪一種?[單選]
A
.
A. 廠商能力不足
B
.
B. 與原系統整合不易
C
.
C. 初期效益不彰
D
.
D. 缺乏人才及共識
正確答案: B
35.The online
retail sector of the retail industry is most similar to the ________ sector.
A
.
A)
specialty stores
B
.
B)
general merchandise
C
.
C) mail
order/telephone order (MOTO)
D
.
D)
consumer durables
正確答案: C
36.Which
of the following enabled MOTO firms to make an easier transition to e-commerce?
A
.
A) the
national toll-free call system
B
.
B) the
fact that they already had efficient customer order fulfillment processes
C
.
C) falling
long distance telecommunications prices
D
.
D) the
growth of the credit card industry
正確答案: B
37.All
of the following have introduced social commerce functionality, such as buy
buttons, shoppable ads, and marketplaces, except:
A
.
A)
Facebook.
B
.
B)
Pinterest.
C
.
C)
Instagram.
D
.
D)
Tumblr.
正確答案: D
38.Online
retailing provides an example of the powerful role that intermediaries continue
to play in retail trade.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
39.The existence
of substitute products is a key industry strategic factor.
A
.
O
B
.
X
正確答案: A
40.The
term supply-push refers to:
A
.
A)
making products prior to orders being received based on estimated demand.
B
.
B)
waiting for orders to be received before building a product.
C
.
C)
channel conflict.
D
.
D)
multi-channel manufacturers who sell directly online to consumers.
正確答案: A
41.All
of the following are examples of the challenges that traditional manufacturers
experience when using the Internet to sell directly to the consumer except:
A
.
A)
moving to a demand-pull model.
B
.
B)
high-cost structures.
C
.
C)
developing a fast-response online order and fulfillment system.
D
.
D)
channel conflict.
正確答案: B
42.Which
of the following occurs when retailers of products must compete on price and
currency of inventory directly against the manufacturer?
A
.
A)
disintermediation
B
.
B)
localization
C
.
C)
channel conflict
D
.
D)
hypermediation
正確答案: C
43.Approximately
________ % of the United States labor force is involved in providing services.
A
.
A) 50
B
.
B) 60
C
.
C) 70
D
.
D) 80
正確答案: D
44.All of
the following statements about the online insurance industry are true except:
A
.
A) the
Internet has lowered search costs, increased price comparison, and decreased
prices to consumers for all forms of insurance.
B
.
B)
websites of almost all the major firms provide the ability to obtain an online
quote.
C
.
C) the
wave of interest in fintech companies is starting to filter into the insurance
industry.
D
.
D) the
industry has been very successful in attracting visitors searching for
information about prices and terms of insurance policies.
正確答案: A
45.In
2020, almost 75% of the adult U.S. population was expected to use online
banking.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
46.The online
mortgage industry has transformed the process of obtaining a mortgage.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
47.Which
of the following job recruitment companies is not a job listing aggregator?
A
.
A)
Indeed
B
.
B)
SimplyHired
C
.
C)
Glassdoor
D
.
D)
CareerBuilder
正確答案: D
48.Which
of the following is not a major trend in the online recruitment services
industry?
A
.
A)
disintermediation
B
.
B) video
and remote recruiting
C
.
C)
social recruiting
D
.
D) use of
artificial intelligence technologies in the hiring process
正確答案: A
49.The
Children's Internet Protection Act (CIPA) has been struck down by the U.S.
Supreme Court as unconstitutional.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
50.Section
230 of the Communications Decency Act (CDA) provides immunity for providers and
users of interactive computer services (such as ISPs and websites) from being
considered a publisher that might be liable for harmful content posted by
others.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
1.想要跟台塑往來的廠商必須透過台塑網的電子化採購平台,請問這是屬於 企業電子化時應考慮的哪個因素?[單選]
A
.
A. 網路使用的安全性
B
.
B. 相關廠商的配合姓
C
.
C. 基礎設備的完整性
D
.
D. 目標市場的廣泛性
正確答案: B
2.NOVA在2000年的電子化經營除了未考慮到網路連線速度外,也未考慮 到當時使用者尚未習慣網路購物,這是忽略企業電子化時應考慮的哪個因素? [單選] 回答錯誤
D. 目標市場的廣泛性
3.匯豐汽車藉由資訊科技將複雜的汽車維修流程建立標準化程序,如此一來 能提高工作與管理效率。請問這屬於下列何種概念?[單選]
A
.
A. 企業流程再造
B
.
B. 顧客關係管理
C
.
C. 商業智慧
D
.
D. 知識管理
正確答案: A
4.EZTABLE將合作的餐廳位置、數量傳到網站,這是屬於下列何種概念?[單 選] 回答錯誤
D. 企業電子化
5.開發工業自從引進了某套系統之後,清楚地整合工廠及上、下游的供應商、 企業內部的營運流程、零售商與顧客,因而提升整個生產鏈的競爭力。請問上 述是指哪一套系統?[單選]
B. 供應鏈管理
6.企業導入ERP前之認知,下列何者為誤?[單選]
A
.
A. ERP著重的是企業的整體規劃
B
.
B. ERP需全體員工的總動員
C
.
C. ERP為IT部門之責任
D
.
D. ERP儘量減少客製化
正確答案: C
7.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線 速度,造成使用者點選網頁時需花很久的時間,再加上添購電子化設備費用昂 貴,最後導致成效不如預期而收編。由上可知,NOVA沒有考慮到什麼問題? [單選]
A
.
A. 網路使用的安全性
B
.
B. 相關廠商的配合姓
C
.
C. 基礎設備的完整性
D
.
D. 目標市場的廣泛性
正確答案: C
8.一年一度的同學會又到了,為了以防萬一,柔柔立刻打開家中的桌上型電腦,上EZTABLE 網站將餐廳訂好。請問這個動作是屬於下列哪一個概念的範疇?(單選)
A
.
(A) 電子商務
B
.
(B) 產業電子化
C
.
(C) 企業電子化
D
.
(D) 行動商務
正確答案: A
9.自 2009 年以來,便利商店紛紛提供電子化票券的服務,涵蓋遊樂園、交通、展覽等,將訂票的流程簡化,並利用促銷的方法吸引消費者接受與採用,像在 ibon 購票,憑票根就有咖啡買一送一的優惠。請問上述是屬於企業電子化的哪一個策略?(單選)
A
.
(A) 目標市場的選擇
B
.
(B) 創新產業的形成
C
.
(C) 聯盟夥伴的成立
D
.
(D) 企業需求的了解
正確答案: B
10.統一超商導入銷售時點系統 (POS),藉此系統來即時記錄顧客購買的產品、時間、年齡等資訊,以改善傳統人工記錄的不便,並提供管理者在制定決策時的參考。請問上述是屬於企業電子化帶來的何種效益?(單選)
A
.
(A) 流程技術的改革
B
.
(B) 顧客關係的發展
C
.
(C) 知識創新的提升
D
.
(D) 銷售管道的創立
正確答案: A
11.In
2020, the amount spent on local (digital) marketing is expected to exceed the
amount spent on mobile marketing. 回答錯誤
B.X
12.Pinterest’s
Shopping Pins requires a merchant to have a product catalog uploaded to
Pinterest.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
13.Brand
pages on Facebook typically attract more visitors than a brand's website.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
14.Pinterest's
users are predominantly women.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
15.Which
of the following statements about Google is not true?
A
.
A)
Google has seven of the top 15 apps in terms of percentage of reach.
B
.
B) The
prices Google can charge for mobile ads are higher than what it can charge for
desktop computer ads.
C
.
C)
Facebook surpassed Google in mobile advertising revenue for the first time in
2018.
D
.
D) About
65 % of all mobile search ad revenue is generated by Google.
正確答案: B
16.Which
of the following has been a leader in enabling augmented reality for mobile
marketing?
A
.
A)
Twitter
B
.
B)
Google
C
.
C)
Snapchat
D
.
D) Apple
正確答案: C
17.Which
of the following account for the vast majority of location-based mobile
marketing?
A
.
A)
Google and Twitter
B
.
B)
Google and Facebook
C
.
C)
Facebook and Twitter
D
.
D)
Facebook and Instagram
正確答案: B
18.A cell
phone's GPS is accurate to within five feet of the actual location of the
phone.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
19.Dell電腦與全世界各地的電腦代工廠合作,由Dell接單後再將此電腦的 單據交給代工廠進行生產,像是鴻海精密就是Dell的一個主要生產商,鴻海 接單後在向上游的供應商備料來生產,而上游供應商則會事先準備一定的半成 品存量,藉此在限定的時間內完成產品的生產。請問Dell與鴻海的供應鏈是 屬於下列哪種?[單選]
A
.
A. 推式基礎的供應鏈
B
.
B. 推式+拉式基礎的供應鏈
C
.
C. 垂直式基礎的供應鏈
D
.
D. 拉式基礎的供應鏈
正確答案: B
20.下列敘述何者錯誤?(單選)
A
.
(A) 供應鏈是指從製造產品的原料、原物料、半成品,到製成品送至消費者手中的過程,包括供應商、製造商、配銷商、物流商等不同的企業,以處理產品由原物料到運送至消費者手中所需解決的金流、物流等問題
B
.
(B) 供應鏈導源於流通,原指軍方的後勤補給活動,隨著商業的蓬勃發展,逐漸推廣應用到商業活動上,其泛指能夠滿足消費者需求的產品流通過程,包括上、下游相關廠商都可納入供應鏈的範疇中
C
.
(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果
D
.
(D) 供應鏈管理具有協同整合、非核心業務外包、減少長鞭效應和即時、最佳化四種特性
正確答案: C
21.供應鏈管理的工具包括下列何者?(單選)
A
.
(A) 電子資料交換
B
.
(B) 企業資源規劃
C
.
(C) 供應鏈管理工具
D
.
(D) 以上皆是
正確答案: D
22.ZARA 在全球有數個趨勢記錄與預測的機構,以掌握衣服流行的趨勢變化,其將資料上傳至總部後,設計中心、生產中心、工廠等可從該資料庫中存取其所需的資訊,以縮短生產的製程時間。請問這是屬於供應鏈管理的何種特色?(單選)
A
.
(A) 減少長鞭效應
B
.
(B) 協同整合
C
.
(C) 非核心業務外包
D
.
(D) 洞察消費需求
正確答案: B
23.What
is the first step in analyzing an ethical dilemma?
A
.
A) Define
the conflict or dilemma and identify the higher-order values involved.
B
.
B)
Identify the potential consequences of your opinions.
C
.
C)
Identify the options you can reasonably take.
D
.
D)
Identify and describe the facts.
正確答案: D
24.Which
ethical principle states that if an action cannot be taken repeatedly, then
it's not right to take at all?
A
.
A)
Universalism
B
.
B)
Slippery Slope
C
.
C) The
Social Contract Rule
D
.
D) The
Golden Rule
正確答案: B
25.Which
of the following is a core Fair Information Practices (FIP) principle?
A
.
A)
Choice/Consent
B
.
B)
Access/Participation
C
.
C)
Security
D
.
D)
Enforcement
正確答案: A
26.Which
of the FTC's Fair Information Practices (FIP) principles requires
identification of the collector of data?
A
.
A)
Notice/Awareness
B
.
B)
Choice/Consent
C
.
C)
Access/Participation
D
.
D)
Security
正確答案: A
27.Which
of the FTC's Fair Information Practices (FIP) principles requires opt-in or
opt-out policies to be in place?
A
.
A)
Notice/Awareness
B
.
B)
Choice/Consent
C
.
C)
Access/Participation
D
.
D)
Security
正確答案: B
28.According
to data from Pew Research Center, which of the following is the action which
the highest percentage of Internet users has taken to preserve their privacy
online?
A
.
A) used
an anonymous web browsing service
B
.
B)
encrypted their communications
C
.
C) cleared
web browser history and cookies
D
.
D)
posted comments online anonymously
正確答案: C
29.As of
2020, the largest consumer privacy penalty issued by the Federal Trade
Commission had been imposed on which of the following companies?
A
.
A)
Google
B
.
B)
Facebook
C
.
C) Uber
D
.
D) Apple
正確答案: B
30.The
California Consumer Privacy Act (CCPA) does all of the following except:
A
.
A) give
residents the right to be informed about the kind of personal information that
is collected about them.
B
.
B) gives
residents the right to opt out of the sale of their information.
C
.
C) gives
residents the right to access their information in a usable format so they can
transfer it to another service.
D
.
D) gives
residents the right to prevent government access to their personal information.
正確答案: D
31.The
Federal Communications Commission's privacy rules, applicable to broadband
ISPs, were repealed by Congress in 2017.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
32.Which
of the following cases has chipped away at the Digital Millennium Copyright Act
(DMCA) safe harbor protection?
A
.
A) Field
v. Google, Inc.
B
.
B) Alice
Corporation Pty. Ltd. v. CLS Bank International
C
.
C) BMG
Rights Management v. Cox Communications
D
.
D)
Perfect 10, Inc. v. Amazon.com, Inc. et al.
正確答案: C
33.What
is the major reason why the Internet has such potential for destroying traditional
conceptions and implementations of intellectual property law?
A
.
A) the
ability to make perfect copies of digital works at little cost
B
.
B) the
anonymous nature of the Internet
C
.
C) the
support for instant peer-to-peer communication
D
.
D) the
use of standards for file formats
正確答案: A
34.Which
case was instrumental in paving the way for Internet business methods patents?
A
.
A)
Bilski et al. v. Kappos
B
.
B) State
Street Bank & Trust Co. v. Signature Financial Group, Inc.
C
.
C) Alice
Corporation Pty. Ltd. v. CLS Bank International
D
.
D)
Ticketmaster Corp. v. Tickets.com
正確答案: B
35.Registering
a domain name similar or identical to trademarks of others to extort profits
from legitimate holders is an example of:
A
.
A) cybersquatting.
B
.
B)
cyberpiracy.
C
.
C)
framing.
D
.
D)
metatagging.
正確答案: A
36.手機與電池、香煙與打火機,這是屬於資料採擷中何種模式的應用?[單 選]
A
.
A. 分類
B
.
B. 群聚/分群
C
.
C. 聯合性分析
D
.
D. 順序
正確答案: C
37.東森購物一開始開台時,利用叫賣的方式來吸引消費者上門,雖達到銷售 的成效,但也帶來大量的退、換貨成本。營運一段時間後,東森累積了一定程 度的顧客資料,也開始分析其擁有的顧客資訊以找出消費者的可能需求,開發 出真正符合顧客需求的產品。由上述例子可知,東森購物克服了什麼困難?[單 選]
A
.
A. 初期效益不明顯
B
.
B. 廠商能力不足
C
.
C. 缺乏人才及共識
D
.
D. 與原系統間的整合不易
正確答案: A
38.以下何者可稱為忠誠顧客?(單選)
A
.
(A) 使用後非常滿意者
B
.
(B) 再次購買者
C
.
(C) 不但自己購買還推薦給他人
D
.
(D) 以上皆是
正確答案: D
39.The online
retail sector of the retail industry is most similar to the ________ sector.
A
.
A)
specialty stores
B
.
B)
general merchandise
C
.
C) mail
order/telephone order (MOTO)
D
.
D)
consumer durables
正確答案: C
40.In 2020,
the number of online buyers in the United States was around 205 million.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
41.Online
retailing provides an example of the powerful role that intermediaries continue
to play in retail trade.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
42.Which
of the following is not categorized as an operating expense?
A
.
A) the
cost of products being sold
B
.
B)
marketing costs
C
.
C)
administrative overhead
D
.
D)
amortization of goodwill
正確答案: A
43.Within
the major service industry groups, companies can be categorized generally into
those that provide transaction brokering and those that involve which of the
following?
A
.
A)
retailing goods
B
.
B)
personalization
C
.
C)
information brokering
D
.
D)
providing hands-on services
正確答案: D
44.Which
of the following is not an example of a transaction broker?
A
.
A) a
stockbroker
B
.
B) a
real estate agent
C
.
C) an
accountant
D
.
D) an
employment agency
正確答案: C
45.All of
the following services require extensive personalization except:
A
.
A)
financial services.
B
.
B) legal
services.
C
.
C)
medical services.
D
.
D)
accounting services.
正確答案: A
46.The
online mortgage industry has transformed the process of obtaining a mortgage.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
47.The
Covid-19 pandemic has severely impacted the online travel industry.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
48.Which
of the following job recruitment companies is not a job listing aggregator?
A
.
A)
Indeed
B
.
B)
SimplyHired
C
.
C)
Glassdoor
D
.
D)
CareerBuilder
正確答案: D
49.Which
of the following Supreme Court cases established that states can compel online
retailers to collect and remit sales taxes even if they do not have a physical
presence within the state?
A
.
A) South
Dakota v. Wayfair
B
.
B) Bilski et al. v. Kappos
C
.
C) Quill
v. North Dakota
D
.
D) Alice
Corporation v. CLS Bank International
正確答案: A
50.Which
of the following is not an e-commerce public safety and welfare issue?
A
.
A)
regulation of gambling
B
.
B)
regulation of cigarette sales
C
.
C)
regulation of pornography
D
.
D)
regulation of taxation
正確答案: D
1.NOVA曾在2000年開始進入電子化的經營,但未考慮到當時的網路連線 速度,造成使用者點選網頁時需要花很久的時間,再加上添購電子化設備費用 昂貴,最後導致成效不如預期而收編。由上述案例來看,除了外部影響外, NOVA在內部還遇到哪個困難?[單選]
A
.
A. 導入時程過長
B
.
B. 系統無法整合
C
.
C. 導入費用過高
D
.
D. 系統流程僵化
正確答案: C
2.阿宏是某家企業的老闆,最近想將企業電子化,於是他考慮到企業內部的 電腦等級、資料庫建立情況與資料庫分析的能力。請問這類的問題較接近哪個 面向?[單選]
A
.
A. 財務面
B
.
B. 流程面
C
.
C. 資訊面
D
.
D. 人員面
正確答案: C
3.「建立制定電子化經營策略的準則,藉此找到符合企業所需,能讓企業有 效提高競爭力的資訊科技。」上述是指企業電子化的策略規劃程序之哪個步 驟?[單選]
A
.
A. 交易模式的建立
B
.
B. 成果評估與回饋
C
.
C. 建立企業願景
D
.
D. 創新產業的形成
正確答案: C
4.中華汽車為了提高公司的競爭力而導入一套系統可以建立個人知識平台並與工作管理系統進行結合,經由工作社群網路來建立不同的知識社群,進而發展出團隊的作業模式與規範。請問這套系統是?(單選)
A
.
(A) 企業資源規劃
B
.
(B) 顧客關係管理
C
.
(C) 商業智慧
D
.
(D) 知識管理
正確答案: D
5.PChome
Online 商店街推出後,強打免上架費、免月租與手續費打折等優惠,讓許多網拍業者達成開店的夢想,這是屬於企業電子化帶來的何種效益?(單選)
A
.
(A) 流程技術的改革
B
.
(B) 顧客關係的發展
C
.
(C) 知識創新的提升
D
.
(D) 銷售管道的創立
正確答案: D
6.Which of
the following attracts a highly educated, professional and managerial audience?
A
.
A)
Snapchat
B
.
B)
TikTok
C
.
C)
LinkedIn
D
.
D)
Instagram
正確答案: C
7.Which
of the following Twitter marketing tools provides marketers with a real-time
digital dashboard so they can see tweet activity about a TV show, commercial,
or brand?
A
.
A)
Promoted Trends
B
.
B)
Amplify
C
.
C)
Twitter Cards
D
.
D)
Promoted Accounts
正確答案: B
8.Which
of the following is not true about Page Post Ads displayed in the Facebook News
Feed?
A
.
A) They
have a tiny tag indicating that they are sponsored.
B
.
B) They
can be liked, shared, and commented on, just like any news feed post.
C
.
C) They
cannot contain links.
D
.
D) They
have social context.
正確答案: C
9.Which
of the following statements about COPPA is not true?
A
.
A) COPPA
is not applicable to Internet of Thing (IoT) devices.
B
.
B) COPPA
can only be enforced by the Federal Trade Commission.
C
.
C) COPPA
provides that companies are not permitted to use personal information collected
from children under 13 years of age without the verifiable prior consent of
their parents.
D
.
D) The
largest fine levied by the FTC under COPPA as of 2020 was against Google and
YouTube.
正確答案: A
10.Which
social network has been the most effective marketing platform for
ExchangeHunterJumper.com?
A
.
A)
Facebook
B
.
B)
YouTube
C
.
C)
Pinterest
D
.
D)
Instagram
正確答案: A
11.Which
of the following refers to the number of interactions among members of a group
and reflects the "connectedness" of the group, even if these
connections are forced on users?
A
.
A)
engagement
B
.
B)
information density
C
.
C) social
density
D
.
D)
amplification
正確答案: C
12.Which
of the following refers to those forms of social sharing that occur off the
major social networks, through alternative communication tools?
A
.
A)
social density
B
.
B) dark
social
C
.
C)
amplification
D
.
D)
engagement
正確答案: B
13.Which
of the following involves using a variety of tools to encourage users to
interact with content and brand?
A
.
A)
social density
B
.
B) engagement
C
.
C) amplification
D
.
D) dark social
正確答案: B
14.Facebook does not sell display ads.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
15.Pinterest's
users are predominantly women.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
16.In
2020, Millennials and Gen-Zers together represent about 85% of Snapchat's
monthly active U.S. users.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
17.Which
of the following is the most popular use for mobile devices?
A
.
A)
shopping
B
.
B)
socializing
C
.
C)
entertainment
D
.
D)
performing tasks, such as finances
正確答案: C
18.Purchases
made on tablet computers are the fastest growing and largest source of
m-commerce revenues.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
19.SMS
text messaging generates most of mobile marketing spending.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
20.Apple's
iBeacon uses which of the following technologies?
A
.
A) BLE
B
.
B) NFC
C
.
C) E9-1-1
D
.
D) QR codes
正確答案: A
21.Dell電腦與全世界各地的電腦代工廠合作,由Dell接單後再將此電腦的 單據交給代工廠進行生產,像是鴻海精密就是Dell的一個主要生產商,鴻海 接單後在向上游的供應商備料來生產,而上游供應商則會事先準備一定的半成 品存量,藉此在限定的時間內完成產品的生產。請問Dell與鴻海的供應鏈是 屬於下列哪種?[單選]
A
.
A. 推式基礎的供應鏈
B
.
B. 推式+拉式基礎的供應鏈
C
.
C. 垂直式基礎的供應鏈
D
.
D. 拉式基礎的供應鏈
正確答案: B
22.下列敘述何者錯誤?(單選)
A
.
(A) 供應鏈是指從製造產品的原料、原物料、半成品,到製成品送至消費者手中的過程,包括供應商、製造商、配銷商、物流商等不同的企業,以處理產品由原物料到運送至消費者手中所需解決的金流、物流等問題
B
.
(B) 供應鏈導源於流通,原指軍方的後勤補給活動,隨著商業的蓬勃發展,逐漸推廣應用到商業活動上,其泛指能夠滿足消費者需求的產品流通過程,包括上、下游相關廠商都可納入供應鏈的範疇中
C
.
(C) 供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果
D
.
(D) 供應鏈管理具有協同整合、非核心業務外包、減少長鞭效應和即時、最佳化四種特性
正確答案: C
23.ZARA 在全球有數個趨勢記錄與預測的機構,以掌握衣服流行的趨勢變化,其將資料上傳至總部後,設計中心、生產中心、工廠等可從該資料庫中存取其所需的資訊,以縮短生產的製程時間。請問這是屬於供應鏈管理的何種特色?(單選)
A
.
(A) 減少長鞭效應
B
.
(B) 協同整合
C
.
(C) 非核心業務外包
D
.
(D) 洞察消費需求
正確答案: B
24.造成長鞭效應現象的原因有?(單選)
A
.
(A) 安全存量的設立
B
.
(B) 批次訂購的行為
C
.
(C) 價格變動的預期
D
.
(D) 以上皆是
正確答案: D
25.Which
of the following is not one of the four basic principles shared by ethical
schools of thought in western culture?
A
.
A)
accountability
B
.
B)
privacy
C
.
C)
responsibility
D
.
D)
liability
正確答案: B
26.Which
ethical principle states that, when confronted with an ethical dilemma, individuals
should take the action that achieves the greater value for all of society?
A
.
A) The
Golden Rule
B
.
B) Risk
Aversion Principle
C
.
C)
Collective Utilitarian Principle
D
.
D) The
Social Contract Rule
正確答案: C
27.Downloading
a music track owned by a record company without paying for it is an example of
a violation of:
A
.
A)
patent law.
B
.
B)
copyright law.
C
.
C)
trademark law.
D
.
D)
privacy law.
正確答案: B
28.Which
of the following is used to track individuals as they move among thousands of
websites?
A
.
A)
first-party cookies
B
.
B)
digital wallets
C
.
C)
advertising networks
D
.
D)
shopping carts
正確答案: C
29.Which
of the following is a core Fair Information Practices (FIP) principle?
A
.
A)
Choice/Consent
B
.
B)
Access/Participation
C
.
C)
Security
D
.
D)
Enforcement
正確答案: A
30.According
to data from Pew Research Center, which of the following is the action which
the highest percentage of Internet users has taken to preserve their privacy
online?
A
.
A) used
an anonymous web browsing service
B
.
B)
encrypted their communications
C
.
C)
cleared web browser history and cookies
D
.
D)
posted comments online anonymously
正確答案: C
31.In
the United States, Google is not required to remove results from its search
engine if requested.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
32.The opt-in
model for informed consent requires an affirmative action by the consumer
before a company can collect and use information.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
33.Which
of the following protects original forms of expression in a tangible medium?
A
.
A) trade
secret law
B
.
B)
copyright law
C
.
C)
patent law
D
.
D)
trademark law
正確答案: B
34.Disputes
over federal trademarks involve establishing:
A
.
A)
underlying ideas.
B
.
B)
intent.
C
.
C)
piracy.
D
.
D)
infringement.
正確答案: D
35.In
which of the following cases did the U.S. Supreme Court rule that basic
business methods cannot be patented?
A
.
A) State
Street Bank & Trust v. Signature Financial Group, Inc.
B
.
B) Bilski et al. v. Kappos
C
.
C) Alice
Corporation Pty. Ltd. v. CLS Bank International
D
.
D) BMG
Rights Management v. Cox Communications
正確答案: C
36.Which
of the following is not an e-commerce public safety and welfare issue?
A
.
A)
regulation of gambling
B
.
B)
regulation of cigarette sales
C
.
C)
regulation of pornography
D
.
D)
regulation of taxation
正確答案: D
37.Section
230 of the Communications Decency Act (CDA) provides immunity for providers and
users of interactive computer services (such as ISPs and websites) from being
considered a publisher that might be liable for harmful content posted by
others. 回答錯誤
是非題 (2 分) 0分
A.O
正確答案: A
38.資料倉儲(Data Warehousing)技術主要用於哪一種企業電子化功能?[單選]
C. CRM
39.在顧客關係管理的成功要素中,最重要的是?[單選]
B. 人
40.導入CRM之各個時期都必須獲得公司各部門鼎力合作才能真正成功,這 是在解決顧客關係管理的哪項失敗因素?[單選]
D. 缺乏人才與共識
正確答案: D
41.In
2020, it was estimated that about what percentage of Internet users over the
age of 14 would make a purchase at an online retail store?
A
.
A) 40%
B
.
B) 60%
C
.
C) 70%
D
.
D) 80%
正確答案: D
42.In 2020,
the number of online buyers in the United States was around 205 million.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
43.Operating
margin is defined as:
A
.
A)
operating income or loss divided by net sales revenues.
B
.
B)
operating income or loss divided by total operating expenses.
C
.
C) net
sales revenues divided by net income or loss.
D
.
D) net
assets divided by net liabilities.
正確答案: A
44.The
term supply-push refers to:
A
.
A)
making products prior to orders being received based on estimated demand.
B
.
B)
waiting for orders to be received before building a product.
C
.
C)
channel conflict.
D
.
D)
multi-channel manufacturers who sell directly online to consumers.
正確答案: A
45.All
of the following are examples of the challenges that traditional manufacturers
experience when using the Internet to sell directly to the consumer except:
A
.
A)
moving to a demand-pull model.
B
.
B)
high-cost structures.
C
.
C)
developing a fast-response online order and fulfillment system.
D
.
D)
channel conflict.
正確答案: B
46.In
the United States, the service sector accounts for approximately ________ % of
the United States GDP.
A
.
A) 70
B
.
B) 75
C
.
C) 80
D
.
D) 85
正確答案: C
47.The
Internet has resulted in lower search costs, increased price comparison, and
lower prices to consumers for which insurance product line?
A
.
A) term
life insurance
B
.
B)
automobile insurance
C
.
C)
health insurance
D
.
D)
property and casualty insurance
正確答案: A
48.The
Covid-19 pandemic has severely impacted the online travel industry.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
49.Which
of the following is not true about on-demand service firms?
A
.
A) The growth
of on-demand service firms is supported using online reputation systems based
on peer review.
B
.
B) It is
not likely that on-demand service firms will totally escape government
regulation.
C
.
C)
On-demand service firms facilitate access to resources.
D
.
D)
On-demand service firms are a totally new phenomenon without precedent in the
history of e-commerce.
正確答案: D
50.Which
of the following is not an e-commerce public safety and welfare issue?
A
.
A)
regulation of gambling
B
.
B)
regulation of cigarette sales
C
.
C)
regulation of pornography
D
.
D)
regulation of taxation
正確答案: D
匯豐汽車藉由資訊科技將複雜的汽車維修流程建立標準化程序,如此一來 能提高工作與管理效率。請問這屬於下列何種概念?[單選]
A
.
A. 企業流程再造
B
.
B. 顧客關係管理
C
.
C. 商業智慧
D
.
D. 知識管理
正確答案: A
2.「ERP」是指?[單選]
A
.
A. 企業資源規劃
B
.
B. 供應鏈管理
C
.
C. 顧客關係管理
D
.
D. 知識管理
正確答案: A
3.信義房屋在業務員專屬的行動通訊設備裝上可以主動提醒和個人秘書的設定功能,而且只要在無線網路的連結下,業務員便可以隨時隨地連上公司的系統,節省報表往返時間,提高銷售成交的機率。請問這套系統較符合下列何種概念?(單選) 回答錯誤
A
.
(A) 企業資源規劃
B
.
(B) 顧客關係管理
C
.
(C) 供應鏈管理
D
.
(D) 知識管理
正確答案: A
4.自 2009 年以來,便利商店紛紛提供電子化票券的服務,涵蓋遊樂園、交通、展覽等,將訂票的流程簡化,並利用促銷的方法吸引消費者接受與採用,像在 ibon 購票,憑票根就有咖啡買一送一的優惠。請問上述是屬於企業電子化的哪一個策略?(單選)
A
.
(A) 目標市場的選擇
B
.
(B) 創新產業的形成
C
.
(C) 聯盟夥伴的成立
D
.
(D) 企業需求的了解
正確答案: B
5.Which
of the following Twitter marketing tools provides marketers with a real-time
digital dashboard so they can see tweet activity about a TV show, commercial,
or brand?
A
.
A)
Promoted Trends
B
.
B)
Amplify
C
.
C)
Twitter Cards
D
.
D)
Promoted Accounts
正確答案: B
6.All of
the following are Pinterest marketing tools except:
A
.
A) Brand
pages.
B
.
B) Rich
Pins.
C
.
C)
Promoted Pins.
D
.
D)
Promoted Accounts.
正確答案: D
7.Which
of the following is an online service specifically aimed at measuring the
impact of Pinterest and other visual social media?
A
.
A)
TweetDeck
B
.
B)
Curalate
C
.
C)
Amplify
D
.
D)
Webtrends
正確答案: B
8.Which
social network has been the most effective marketing platform for
ExchangeHunterJumper.com?
A
.
A)
Facebook
B
.
B)
YouTube
C
.
C)
Pinterest
D
.
D)
Instagram
正確答案: A
9.Which
of the following statements about Instagram is not true?
A
.
A)
Instagram is owned by Facebook.
B
.
B) Instagram’s
most rapidly growing demographic group is comprised of people under the age of
35.
C
.
C)
Instagram is expected to generate around $16 billion in ad revenues in 2020.
D
.
D)
Instagram has over 1 billion users worldwide.
正確答案: B
10.Which
of the following involves using a variety of tools to encourage users to
interact with content and brand?
A
.
A)
social density
B
.
B) engagement
C
.
C) amplification
D
.
D) dark social
正確答案: B
11.Which of the following is a Facebook feature that allows app developers
to integrate their apps into the Facebook pages of users who sign up for the
app?
A
.
A) Graph
Search
B
.
B) Like
button
C
.
C)
Messenger
D
.
D) Open
Graph
正確答案: D
12.Brand
pages on Facebook typically attract more visitors than a brand's website.
是非題 (2 分) 2分
A.O
13.Promoted
Video is the source of over 60% of Twitter’s ad revenue.
是非題 (2 分) 2分
A.O
14.Which
of the following statements about Google is not true?
B) The
prices Google can charge for mobile ads are higher than what it can charge for
desktop computer ads.
15.Which
of the following is the most popular use for mobile devices?
C)
entertainment
16.Which
of the following statements about BLE is not true?
A
.
A) Only
Apple iPhones can use BLE.
B
.
B) BLE
uses less power than traditional Bluetooth or GPS.
C
.
C) BLE
has a two-way, push-pull communication capability.
D
.
D) BLE is
more accurate than targeting through Wi-Fi triangulation.
正確答案: A
17.Purchases
made on tablet computers are the fastest growing and largest source of
m-commerce revenues.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
18.Google
uses which of the following to build a global database of wireless access
points and their geographic locations?
A
.
A)
E9-1-1
B
.
B)
Street View cars
C
.
C) iBeacons
D
.
D) BLE
正確答案: B
19.各個企業可分享自己手上所獲得的資訊,讓相關廠商都能獲知正確的需求 量,避免加入過高的安全存量來降低長鞭效應所造成的影響。請問上述是啤酒 遊戲的哪個解決方式?[單選]
A
.
A. 資訊分享面
B
.
B. 策略發展面
C
.
C. 知識管理面
D
.
D. 技術分享面
正確答案: A
20.以下何者不是供應鏈管理的特性?[單選]
A
.
A. 非核心業務外包
B
.
B. 社群連結與溝通
C
.
C. 即時、最佳化
D
.
D. 減少長鞭效應
正確答案: B
21.「流程整合重點放在使功能性成本最小化,人員被視為可取代的資產,主 要投資標的在設備修正及調整上面。」這是屬於供應鏈中的何種角色?[單選] 回答錯誤
A. 有回應的供應商
22.供應鏈管理的工具包括下列何者?(單選)
(D) 以上皆是
23.供應鏈管理的發展流程為以下何者?(單選)
(B) 單一企業階段→物流管理階段→運籌管理階段→供應鏈管理階段
24.博客來網路書店面對需求量不高的冷門書籍,大多是採接單後才向書商訂書,藉此降低本身的庫存成本。請問博客來網路書店是屬於何種供應鏈?(單選)
(B) 拉式基礎的供應鏈
25.供應鏈成員的充分合作,將整體供應鏈整合成單一虛擬企業,共同制定供應鏈生產的策略、數量和其他的內容,以解決長鞭效應所造成需求變動的問題。這是屬於解決長鞭效應的哪種面向?(單選)
(D) 供應鏈整合面
26.Which
of the following is not one of the four basic principles shared by ethical
schools of thought in western culture?
A
.
A)
accountability
B
.
B)
privacy
C
.
C)
responsibility
D
.
D)
liability
正確答案: B
27.What
is the first step in analyzing an ethical dilemma?
A
.
A)
Define the conflict or dilemma and identify the higher-order values involved.
B
.
B)
Identify the potential consequences of your opinions.
C
.
C)
Identify the options you can reasonably take.
D
.
D)
Identify and describe the facts.
正確答案: D
28.Downloading
a music track owned by a record company without paying for it is an example of
a violation of:
A
.
A)
patent law.
B
.
B)
copyright law.
C
.
C)
trademark law.
D
.
D)
privacy law.
正確答案: B
29.Liability
is a feature of political systems in which a body of law is in place that
permits individuals to recover damages done to them by other actors, systems,
or organizations.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
30.The principle
of responsibility means that individuals, organizations, and societies should
be held accountable to others for the consequences of their actions.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
31.Which
of the following is considered one of the most contentious e-commerce patents?
A
.
A)
Acacia Technologies’ patent on streaming video media transmission
B
.
B)
Priceline’s patent on buyer-driven name your price tools
C
.
C)
Amazon’s patent on one-click purchasing
D
.
D)
Google's PageRank patent
正確答案: C
32.Safe
harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue
in all the following lawsuits except:
A
.
A) a
lawsuit filed by the Authors Guild and five major publishing companies against
Google
B
.
B) a lawsuit
brought by Viacom against YouTube and Google
C
.
C) BMG
Rights Management v. Cox Communications.
D
.
D)
Mavrix Photographs, LLC v. LiveJournal, Inc.
正確答案: A
33.All
of the following cases involved the doctrine of fair use except:
A
.
A)
Spokeo v. Robins
B
.
B)
Perfect 10, Inc. v. Amazon.com, Inc. et al.
C
.
C) Field
v. Google, Inc.
D
.
D) Kelly
v. Arriba Soft.
正確答案: A
34.Copyright
protection protects against others copying the underlying ideas in a work.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
35.Which
of the following involves the issue of social control?
A
.
A)
information rights
B
.
B)
governance
C
.
C)
public safety and welfare
D
.
D)
property rights
正確答案: B
36.Net
neutrality refers to the idea that Internet service providers (ISPs), including
cable Internet and wireless carriers, should treat all data on the Internet in
the same manner, and not discriminate or price differentially by content,
protocol, platform, hardware, or application.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
37.阿仁很喜歡上Facebook看網友們分享的一些有趣的經驗,但麻煩的是, 一定要按讚才能看到內容。請問這屬於顧客關係管理的哪個階段?[單選]
A
.
A. 技術與策略階段
B
.
B. 蒐集與接觸階段
C
.
C. 互動與修改階段
D
.
D. 區隔與價值階段
正確答案: A
38.Which
of the following statements is not true about the automobile, and automobile
parts and accessories, online retail category?
A
.
A) Most
of the revenue in this category is generated from the sales of automobiles.
B
.
B)
Automobile manufacturers use the Internet to deliver branding advertising.
C
.
C) U.S.
franchising law prohibits automobile manufacturers from selling cars directly
to consumers.
D
.
D)
Automobile retailing is dominated by dealership networks.
正確答案: A
39.In
2020, the number of online buyers in the United States was around 205 million.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
40.Personal
consumption of retail goods and services accounts for over 80% of total gross
domestic product (GDP).
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: B
41.All of
the following are strategic factors that pertain specifically to a firm and its
related businesses except:
A
.
A) core
competencies.
B
.
B) synergies.
C
.
C) technology.
D
.
D) power
of customers.
正確答案: D
42.Omni-channel
merchants are also referred to as:
A
.
A)
virtual merchants.
B
.
B)
bricks-and-clicks companies.
C
.
C) catalog merchants.
D
.
D) manufacturer-direct firms.
正確答案: B
43.Which of the following is a subscription-based retailer using predictive
marketing and big data?
A
.
A)
Macy's
B
.
B)
Stitch Fix
C
.
C) Dell
D
.
D)
Lands' End
正確答案: B
44.Virtual
merchants face potentially large costs for all of the following except:
A
.
A)
building and maintaining a website.
B
.
B)
building and maintaining physical stores.
C
.
C)
building an order fulfillment infrastructure.
D
.
D)
developing a brand name.
正確答案: B
45.All of
the following are challenges faced by bricks-and-clicks firms except:
A
.
A)
coordinating prices across channels.
B
.
B)
handling returns of online purchases at retail outlets.
C
.
C)
building a credible website.
D
.
D)
building a brand name.
正確答案: D
46.In
the United States, the service sector accounts for approximately ________ % of
the United States GDP.
A
.
A) 70
B
.
B) 75
C
.
C) 80
D
.
D) 85
正確答案: C
47.________
provides notices called Consumer Alerts to inform readers when a review is
likely to be fraudulent.
A
.
A) Yelp
B
.
B)
TripAdvisor
C
.
C)
Angie's List
D
.
D)
TripExpert
正確答案: A
48.What
is the largest sector of the online travel services market in terms of revenue?
A
.
A) hotel
reservations
B
.
B) car reservations
C
.
C) cruise/tour reservations
D
.
D) airline reservations
正確答案: D
49.The social network LinkedIn has become major player in the online
recruitment market.
是非題 (2 分) 2分
A
.
O
B
.
X
正確答案: A
50.Which of the following Supreme Court cases established that states can
compel online retailers to collect and remit sales taxes even if they do not
have a physical presence within the state?
A) South
Dakota v. Wayfair
18.主要是以顧客需求為基礎來整合企業生產的活動,包括需求預測、配送、 存貨管理、產品包裝等,以管控產品的生產過程。請問上述是指供應鏈管理發 展的哪一個時期?[單選] 回答錯誤
D. 運籌管理階段
正確答案: D
(T/F) A
cell phone's GPS is accurate to within five feet of the actual location of the
phone.
False
Ads that
appear in a Facebook user's News Feed are called:
Page
Post Ads.
All of
the following are Pinterest marketing tools except:
Promoted
Pins.
All of the
following are examples of dark social except:
tweets.
All of
the following marketing tools on Facebook require payment except:
Brand
Pages.
All of
the following were popular types of online marketing before 2007 except:
mobile
marketing.
Apple's
iBeacon uses which of the following technologies?
BLE
As
discussed in the chapter-opening case, Hubble used all of the following
Facebook marketing tools except:
Facebook
Live.
(T/F)
Both mobile and social advertising spending are expected to double from 2017 to
2021.
True
(T/F)
Brand pages on Facebook typically attract more visitors than a brand's website.
True
By 2022,
it is estimated that advertisers will be spending which of the following
amounts on mobile marketing?
$130
billion
Companies
are not permitted to collect personal information from children under the age
of ________ without parental consent.
13
(T/F)
Eddystone is an open-source standard for beacon technology.
True
Encouraging
users to click a Like button is an example of which step in the social
marketing process?
amplification
(T/F)
Facebook does not sell display ads.
False
Google
uses which of the following to build a global database of wireless access
points and their geographic locations?
Street
View cars
(T/F) In
2020, Millennials and Gen-Zers together represent about 85% of Snapchat's
monthly active U.S. users.
True
In 2020,
about how many hours a month are online social network users in the United States
expected to spend, on average, on all social networks combined?
40
In 2020,
how much are advertisers expected to spend on local-based (local) mobile
marketing?
$25
billion
(T/F) In
2020, the amount spent on local (digital) marketing is expected to exceed the
amount spent on mobile marketing.
True
(T/F)
Influencer marketing is a method of generating customer engagement.
True
On
average, users use about ________ apps a month on their smartphone.
20
People
spend the most time doing which of the following when using a mobile device?
listening
to music
(T/F)
Pinterest's Shopping Pins requires a merchant to have a product catalog
uploaded to Pinterest.
True
(T/F)
Pinterest's users are predominantly women.
True
(T/F)
Promoted Video is the source of over 60% of Twitter's ad revenue.
True
(T/F)
Purchases made on tablet computers are the fastest growing and largest source
of m-commerce revenues.
True
(T/F)
SMS text messaging generates most of mobile marketing spending.
False
The
number of people exposed to pins on Pinterest is a measure of which of the
following?
fan
acquisition
The
ratio of impressions to fans is a measure of:
fan
acquisition.
(T/F)
TikTok is owned by Facebook.
False
(T/F)
Traditional retail products and travel services are the source of much of the
current growth in m-commerce.
True
Which of
the following Twitter marketing tools involves a coupon or other promotional
offer that appears in users' Twitter timeline?
Twitter
Card
Which of
the following Twitter marketing tools provides marketers with a real-time
digital dashboard so they can see tweet activity about a TV show, commercial,
or brand?
Amplify
Which of
the following account for the vast majority of location-based mobile marketing?
Google
and Facebook
Which of
the following allows Facebook to track user behavior on other sites?
Like
button
Which of
the following are features of both Pinterest and Twitter?
hashtags
Which of
the following attracts a highly educated, professional and managerial audience?
LinkedIn
Which of
the following dominates the local mobile search market?
Google
Which of
the following generates the most mobile ad spending?
search
engine advertising
Which of
the following involves using a variety of tools to encourage users to interact
with content and brand?
engagement
Which of
the following involves using the inherent strength of social networks to
encourage visitors and fans to share their Likes and comments with friends?
amplification
Which of
the following is a Facebook feature that allows app developers to integrate
their apps into the Facebook pages of users who sign up for the app?
Open
Graph
Which of
the following is a history of your actions on Facebook?
Timeline
Which of
the following is an online service specifically aimed at measuring the impact
of Pinterest and other visual social media?
Curalate
Which of
the following is another term for amplification?
reach
Which of
the following is a not a type of Rich Pin?
Instant
Pin
Which of
the following is most similar to Pinterest?
Instagram
Which of
the following is the first step in the social marketing process?
fan
acquisition
Which of
the following is the leading mobile retailer in the United States?
Amazon
Which of
the following is the most popular use for mobile devices?
entertainment
Which of
the following is not a major provider of mobile display advertising?
Webtrends
Which of
the following is not a technology for enabling proximity marketing?
Lens
Studio
Which of
the following is not true about Page Post Ads displayed in the Facebook News
Feed?
They
cannot contain links.
Which of
the following is not true about mobile marketing?
People
use most of their mobile minutes while they are on the go, outside of the home.
Which of
the following is not true about social marketing?
More
than 50% of Twitter's ad revenues are generated by desktop users.
Which of
the following proximity marketing technologies did Macy's deploy in many of its
retail stores in 2014?
iBeacon
Which of
the following refers to those forms of social sharing that occur off the major
social networks, through alternative communication tools?
dark
social
Which of
the following statements about BLE is not true?
Only
Apple iPhones can use BLE.
Which of
the following statements about COPPA is not true?
COPPA is
not applicable to Internet of Thing (IoT) devices.
Which of
the following statements about Instagram is not true?
Instagram's
most rapidly growing demographic group is comprised of people under the age of
35.
Which of
the following statements about Pinterest is not true?
Pinterest
is the only one of the major social networks that does not accept paid
advertising.
Which of
the following is a micro-blogging social network site that allows users to send
and receive 280-character messages, as well as news articles, photos, and
videos?
Twitter
Which
social network has been the most effective marketing platform for
ExchangeHunterJumper.com?
Facebook
Your
Facebook News Feed includes all of the following except:
tweets.
which of
the following is not one of the four basic principles shared by ethical schools
of thought in western culture
privacy
what is
the first step in analyzing an ethical dilemma
identify
and describe the facts
which
ethical principle tells you that it is wise to assume perfect information
markets
the new
york times test
which
ethical principle states that when confronted with an ethical dilemma, an
individual should take the action that produces the least harm or the least
potential cost
risk
aversion
downloading
music tracks owned by record companies without payinf for them is an example of
a violation of
copyright
law
liability
is a feature of political system in which a body of law is in place that
permits individuals to recover damages done to them by other actors, systems,
or organizations
true
the
principle of responsibility means that individuals, organizations, and
societies should be held accountable to others for the consequences of their
actions
false
which of
the following basic ethical concepts plays an important role in defining
privacy
due
process
which of
the following tools can companies use to track user statements and views on
newsgroups, chat groups, and other public forums?
search
engines
which of
the following can be used to record all keyboard activity of a user
spyware
which of
the following is a core Fair Information Practices (FIP) principle
choice/consent
which of
the FTC's Fair Information Practices (FIP) principles requires identification
of the collector of data
notice/awareness
which of
the FTC's Fair Information Practices (FIP) principles requires opt-in or
opt-out policies to be in place
choice/consent
what is
the FTC recommendation regarding choice as it relates to personally
idnetifiable information (PII)
require
firms to have consumers affirmatively opt-in before PII is collected
which of
the following technologies allows you to send e-mail without a trace
anonymous
remailers
which of
the following operated the largest private personal database in the world
acxiom
in the
united states, google is not required to remove results from its search engine
if requested
true
most
adult social network participants do not have any expectation of personal
privacy when using social network
false
the
opt-in model for informed consent requires an affirmative action by the
consumer before a company can collect and use information
true
the
european data protection directive prohibits the transfer of PII to
organizations or countries that do not have similar privacy protection policies
true
the
adchoices program is an industry-sponsored initiative to encourage web sites to
be more transparent about how they use personal information and to make it more
likely that appropriate ads are shown to users
true
what is
the major reason that the internet has such potential for destroying
traditional conceptions and implementations of intellectual property law?
the
ablility to make perfect copie of digital works at little cost
which of
the following protects original forms of expression in a tangible medium
copyright
law
how long
does copyright protection extend for corporate-owned works
95 years
which of
the following situations would not qualify for the fair use exception to US
copyright law
a student
copies a photograph of his favorite band from a web site created by the bands
record label and places it on the students personal web site
all of
the following are factors that will be considered in determing whether use of
copyrighted material is "fair use" except the
free
availibility of the work on the web
all of
the following statements about the digital millenium copyright act (DMCA) are
true except
the DMCA
makes internet service providers (ISPs) responsible and accountable for hosting
web sites or providing services to infringes regardless of whether the ISP is
aware of infringement
all of
the following statements about patents are true except
it is
more difficult to obtain a copyright than it is to obtain a patent
amazon
has a patent on
one-click
purchasing.
registering
a domain name similar or identical to trademarks of others to export profits
from legitimate holders is an example of
cybersquatting
regstiring
a domain name similar or identical to trademarks of others to divert web
traffic to their own sites is an example of
cyberpiracy
the
display of a third party's web site within your own web site is called
framing
which of
the following involves bypassing the target sites home page and going directly
to a content page
deep
linking
copyright
protection protects against others copying the inderlying ideas in a work
false
which of
the following is not one of the issues complicating the taxation of e-commerce
sales
taxes
raised are used for different governemrent purposes
section
230 of the communications decency act (CDA) provides immunity for providers and
users of interactive computer services (such as ISPs and web sites) from being
considered a publisher that might be liable for harmful content posted by
others
true
online
gambling is now legal throughout the united states
false
1) Which
of the following e-commerce technology dimensions creates greater opportunities
for cyberbullying?
A)
information density
B)
interactivity
C)
social technology
D)
ubiquity
C) social
technology
2) Which
of the following e-commerce technology dimensions has the potential to reduce
cultural diversity in products?
A)
ubiquity
B)
interactivity
C)
information density
D)
global reach
D)
global reach
3) Which
of the following is not one of the four basic principles shared by ethical
schools of thought in western culture?
A)
accountability
B)
privacy
C)
responsibility
D)
liability
B)
privacy
4) What
is the first step in analyzing an ethical dilemma?
A)
Define the conflict or dilemma and identify the higher-order values involved.
B)
Identify the potential consequences of your opinions.
C)
Identify the options you can reasonably take.
D)
Identify and describe the facts.
D)
Identify and describe the facts.
5) Which
ethical principle states that, when confronted with an ethical dilemma,
individuals should take the action that achieves the greater value for all of
society?
A) the
Golden Rule
B) Risk
Aversion
C) the
Collective Utilitarian principle
D) the
Social Contract rule
C) the
Collective Utilitarian principle
6) Which
ethical principle emphasizes putting oneself into the place of others and
thinking of oneself as the object of the decision?
A) the
Golden Rule
B)
Universalism
C) the Collective
Utilitarian principle
D) the
Social Contract rule
A) the
Golden Rule
7) Which
ethical principle asks you to assume that virtually all tangible and intangible
objects are owned by someone else unless there is a specific declaration
otherwise?
A) the
Golden Rule
B) the
Slippery Slope
C) the
Social Contract rule
D) No
Free Lunch
D) No
Free Lunch
8) Which
ethical principle states that if an action cannot be taken repeatedly, then it
is not right to take at all?
A)
Universalism
B) the
Slippery Slope
C) the
Social Contract rule
D) the
Golden Rule
B) the
Slippery Slope
9) Which
ethical principle asks you to consider the impact of your decision if the
principles underlying your decision became an organizing principle of the
entire society?
A) the
Golden Rule
B) Risk
Aversion
C) the
Slippery Slope
D) the
Social Contract rule
D) the
Social Contract rule
10)
Which ethical principle tells you it's wise to assume perfect information
markets?
A) the
Golden Rule
B) the
New York Times test
C) the
Social Contract rule
D) the
Collective Utilitarian principle
B) the
New York Times test
11)
Which ethical principle states that when confronted with an ethical dilemma, an
individual should take the action that produces the least harm, or the least
potential cost?
A) the
Slippery Slope
B) Risk
Aversion
C) No
Free Lunch
D) the
Collective Utilitarian principle
B) Risk
Aversion
12) A
social consequence of the richness of Internet information is:
A) an
increase in shallowness.
B) an increase
in the ease of creating misleading information.
C) very
persuasive messages might reduce the need for multiple independent sources of
information.
D) an
increase in vulnerability to hacking attacks.
C) very
persuasive messages might reduce the need for multiple independent sources of
information.
13)
Downloading a music track owned by a record company without paying for it is an
example of a violation of:
A)
patent law.
B)
copyright law.
C)
trademark law.
D)
privacy law.
B)
copyright law.
14)
Which of the following features of e-commerce technology can result in work and
shopping invading family life?
A)
interactivity
B)
ubiquity
C)
information density
D)
global reach
B)
ubiquity
20)
Which of the following basic ethical concepts plays an important role in
defining privacy?
A)
responsibility
B)
accountability
C)
liability
D) due
process
D) due
process
21)
Which of the following is not aimed at strengthening the ability of law
enforcement agencies to monitor Internet users without their knowledge?
A) USA
PATRIOT Act
B)
Homeland Security Act
C)
Communications Assistance for Law Enforcement Act
D) USA
Freedom Act
D) USA
Freedom Act
Which of
the following e-commerce technology dimensions creates greater opportunities
for cyberbullying?
A)
information density
B)
interactivity
C)
social technology
D)
ubiquity
C
Which of
the following e-commerce technology dimensions has the potential to reduce
cultural diversity in products?
A)
ubiquity
B)
interactivity
C)
information density
D)
global reach
D
Which of
the following is not one of the four basic principles shared by ethical schools
of thought in western culture?
A)
accountability
B)
privacy
C)
responsibility
D)
liability
B
What is
the first step in analyzing an ethical dilemma?
A)
Define the conflict or dilemma and identify the higher-order values involved.
B)
Identify the potential consequences of your opinions.
C)
Identify the options you can reasonably take.
D)
Identify and describe the facts.
D
Which ethical
principle states that, when confronted with an ethical dilemma, individuals
should take the action that achieves the greater value for all of society?
A) the
Golden Rule
B) Risk
Aversion
C) the
Collective Utilitarian principle
D) the
Social Contract rule
C
Which
ethical principle emphasizes putting oneself into the place of others and
thinking of oneself as the object of the decision?
A) the
Golden Rule
B)
Universalism
C) the
Collective Utilitarian principle
D) the
Social Contract rule
A
Which
ethical principle asks you to assume that virtually all tangible and intangible
objects are owned by someone else unless there is a specific declaration
otherwise?
A) the
Golden Rule
B) the
Slippery Slope
C) the
Social Contract rule
D) No
Free Lunch
D
Which
ethical principle states that if an action cannot be taken repeatedly, then it
is not right to take at all?
A)
Universalism
B) the
Slippery Slope
C) the
Social Contract rule
D) the
Golden Rule
B
Which
ethical principle asks you to consider the impact of your decision if the
principles underlying your decision became an organizing principle of the
entire society?
A) the
Golden Rule
B) Risk
Aversion
C) the
Slippery Slope
D) the
Social Contract rule
D
Which ethical
principle tells you it's wise to assume perfect information markets?
A) the
Golden Rule
B) the
New York Times test
C) the
Social Contract rule
D) the
Collective Utilitarian principle
B
Which
ethical principle states that when confronted with an ethical dilemma, an
individual should take the action that produces the least harm, or the least
potential cost?
A) the
Slippery Slope
B) Risk
Aversion
C) No
Free Lunch
D) the
Collective Utilitarian principle
B
A social
consequence of the richness of Internet information is:
A) an
increase in shallowness.
B) an
increase in the ease of creating misleading information.
C) very
persuasive messages might reduce the need for multiple independent sources of
information.
D) an
increase in vulnerability to hacking attacks.
C
Downloading
a music track owned by a record company without paying for it is an example of
a violation of:
A)
patent law.
B)
copyright law.
C)
trademark law.
D)
privacy law.
B
Which of
the following features of e-commerce technology can result in work and shopping
invading family life?
A)
interactivity
B)
ubiquity
C)
information density
D)
global reach
B
Which of
the following basic ethical concepts plays an important role in defining
privacy?
A)
responsibility
B)
accountability
C)
liability
D) due
process
D
Which of
the following is not aimed at strengthening the ability of law enforcement
agencies to monitor Internet users without their knowledge?
A) USA
PATRIOT Act
B)
Homeland Security Act
C)
Communications Assistance for Law Enforcement Act
D) USA
Freedom Act
D
________
can be used to record all keyboard activity of a user.
A)
Shopping carts
B)
Trusted computing environments
C)
Spyware
D) DRM
C
Which of
the following statements about industry self-regulation regarding privacy is
not true? OPA- online privacy alliance
A) OPA
members are required to implement the OPA's privacy guidelines.
B) The
primary focus of industry efforts has been the use of online "seals"
that attest to the site's policies.
C)
Industry efforts have not so far succeeded in reducing American fears of
privacy invasion.
D) The
NAI's privacy policies have established the TRUSTe seal.
D
The
Spokeo case involved a claim for damages based on which of the following?
A) Fair
Credit Reporting Act
B)
Digital Millennium Copyright Act
C)
Anticybersquatting Consumer Protection Act
D)
Defend Trade Secrets Act
A
Which of
the following requires financial institutions to inform consumers of their
privacy policies and permits consumers some control over their records?
A)
Freedom of Information Act
B)
Gramm-Leach-Bliley Act
C) COPPA
D) HIPAA
B
Which of
the following is a core Fair Information Practices (FIP) principle?
A)
Choice/Consent
B)
Access/Participation
C)
Security
D)
Enforcement
A
Which of
the FTC's Fair Information Practices (FIP) principles requires identification
of the collector of data?
A)
Notice/Awareness
B)
Choice/Consent
C)
Access/Participation
D)
Security
A
Which of
the FTC's Fair Information Practices (FIP) principles requires opt-in or
opt-out policies to be in place?
A)
Notice/Awareness
B)
Choice/Consent
C)
Access/Participation
D)
Security
B
What is
the FTC recommendation regarding choice as it relates to personally
identifiable information (PII)?
A)
Require firms to have consumers affirmatively opt-in before PII is collected.
B) Require
firms to allow consumers to opt-out before PII is collected.
C) Make
collection of PII illegal.
D)
Require robust notice only before PII is collected.
A
"Do
Not Track" falls under which of the following principles in the FTC's new
privacy framework?
A)
Privacy by Design
B)
Simplified Choice
C)
Greater Transparency
D) Scope
B
Which of
the following technologies reduces the ability to merge different files and
deanonymize consumer data?
A)
anonymous surfing
B)
anonymous remailers
C)
differential privacy software
D)
public key encryption
C
Which of
the following is an example of a pay-for-privacy (PFP) approach?
A)
AT&T's GigaPower service
B)
Meeco.me's life management tool
C)
Digi.me's app
D) The
Hub of All Thing's open source project
A
According
to data from Pew Research Center, which of the following is the action which
the highest percentage of Internet users has taken to preserve their privacy
online?
A) used
an anonymous web browsing service
B)
encrypted their communications
C)
cleared web browser history and cookies
D)
posted comments online anonymously
C
Which of
the following statements about the E.U. General Data Protection Regulation
(GDPR) is not true?
A) The GDPR
replaces the E.U.'s existing Data Protection Directive.
B) The
GDPR applies to any firm operating in any E.U. country.
C) The
GDPR eliminates the right to be forgotten.
D) The
GDPR limits the ability of companies to use data for purposes other than those
for which it was collected.
C
As of
2020, the largest consumer privacy penalty issued by the Federal Trade
Commission had been imposed on which of the following companies?
A)
Google
B)
Facebook
C) Uber
D) Apple
B
The
California Consumer Privacy Act (CCPA) does all of the following except:
A) give
residents the right to be informed about the kind of personal information that
is collected about them.
B) gives
residents the right to opt out of the sale of their information.
C) gives
residents the right to access their information in a usable format so they can
transfer it to another service.
D) gives
residents the right to prevent government access to their personal information.
D
All of
the following are required in order for information to be considered a trade
secret except:
A) it
must have commercial value to its owner.
B) the
owner must have taken steps to protect it.
C) it
must be unique.
D) it
must be something that others do not know.
C
Which of
the following cases has chipped away at the Digital Millennium Copyright Act
(DMCA) safe harbor protection?
A) Field
v. Google, Inc.
B) Alice
Corporation Pty. Ltd. v. CLS Bank International
C) BMG
Rights Management v. Cox Communications
D)
Perfect 10, Inc. v. Amazon.com, Inc. et al.
C
________
is a tiered notice and response system aimed at reducing copyright infringement
over P2P networks.
A) The
CAS
B) FIP
C)
Surfright
D) The
Open Internet Order
A
What is
the major reason the Internet has such potential for destroying traditional
conceptions and implementations of intellectual property law?
A) the
ability to make perfect copies of digital works at little cost
B) the
anonymous nature of the Internet
C) the
support for instant peer-to-peer communication
D) the
use of standards for file formats
A
_______
protects original forms of expression in a tangible medium.
A) Trade
secret law
B)
Copyright law
C)
Patent law
D)
Trademark law
B
How long
does copyright protection extend for corporate-owned works?
A) 25
years
B) 50
years
C) 75
years
D) 95
years
D
Which of
the following situations would not qualify for the fair use exception to U.S.
copyright law?
A) A
professor clips a newspaper article just before class and distributes copies of
it to his class.
B) A
journalist quotes a paragraph from a book in a review of the book.
C) A
student copies a photograph of his favorite band from a website created by the
band's record label and places it on the student's personal website.
D)
Google posts thumbnail images of books in the Google Book Search Project.
C
All of
the following are factors that will be considered in determining whether use of
copyrighted material is "fair use" except the:
A)
nature of the work used.
B)
amount of the work used.
C)
market effect of the use.
D) free
availability of the work on the Web
D
All of
the following are possible penalties for violating the Digital Millennium
Copyright Act (DMCA) except:
A) up to
ten years' imprisonment for a first offense.
B) fines
up to $500,000 for a first offense.
C) fines
up to $1 million for a repeat offense.
D)
restitution to the injured parties for any losses due to infringement.
A
All of
the following statements about the Digital Millennium Copyright Act (DMCA) are
true except:
A) the
DMCA makes it illegal to circumvent technological measures to protect works.
B) the
DMCA makes Internet Service Providers (ISPs) responsible and accountable for
hosting websites or providing services to infringers regardless of whether the
ISP is aware of infringement.
C) the
DMCA requires search engines to block access to infringing sites.
D) the
DMCA allows libraries to make digital copies of works for internal use only.
B
________
allows someone to obtain an exclusive monopoly on the ideas behind an invention
for 20 years.
A)
Copyright law
B) Trade
secret law
C)
Patent law
D)
Trademark law
C
All of
the following statements about patents are true except:
A) it is
more difficult to obtain a copyright than it is to obtain a patent.
B) the
four types of inventions protected by patent law are machines, manmade
products, compositions of matter, and processing methods.
C)
computer programs can be patented.
D) to be
patented, an invention must be nonobvious.
A
Which case
was instrumental in paving the way for Internet business methods patents?
A) Brown
Bag v. Symantec
B) State
Street Bank & Trust Co. v. Signature Financial Group, Inc.
C) Alice
Corporation Pty. Ltd. v. CLS Bank International
D)
Ticketmaster Corp. v. Tickets.com
B
Amazon
has a patent on: one of the most contentious e-commerce patents?
A)
download-based sales.
B)
display of third-party advertisements in floating windows.
C)
one-click purchasing.
D)
hyperlinks.
C
Disputes
over federal trademarks involve establishing:
A)
underlying ideas.
B)
intent.
C)
piracy.
D)
infringement.
D
Registering
a domain name similar or identical to trademarks of others to extort profits
from legitimate holders is an example of:
A)
cybersquatting.
B)
cyberpiracy.
C)
framing.
D)
metatagging.
A
Which of
the following handles cybersquatting cases under its Uniform Dispute Resolution
procedures?
A) ICANN
B) FTC
C) WIPO
D) USPTO
C
Registering
a domain name similar or identical to trademarks of others to divert web
traffic to their own sites is an example of:
A)
cybersquatting.
B)
cyberpiracy.
C)
framing.
D)
metatagging.
B
Registering
the domain name Faceboik.com with the intent to divert web traffic from people
misspelling Facebook.com is an example of:
A)
cybersquatting.
B)
typosquatting.
C)
metatagging.
D)
linking.
B
In which
of the following cases did the U.S. Supreme Court rule that basic business
methods cannot be patented?
A) State
Street Bank & Trust v. Signature Financial Group, Inc.
B) Bilski et al. v. Kappos
C) Alice
Corporation Pty. Ltd. v. CLS Bank International
D) Brown
Bag Software v. Symantec Corp.
C
The
display of a third-party's website or page within your own website is called:
A)
cybersquatting.
B)
metatagging.
C)
framing.
D) deep
linking.
C
Safe
harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue
in all the following lawsuits except:
A) a
lawsuit filed by the Authors Guild and five major publishing companies against
Google
B) a
lawsuit brought by Viacom against YouTube and Google
C) BMG
Rights Management v. Cox Communications.
D)
Mavrix Photographs, LLC v. LiveJournal, Inc.
A
Which of
the following cases involved the issue of keywording?
A)
Ticketmaster Corp. v. Tickets.com
B)
Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc.
C)
Government Employees Insurance Company v. Google, Inc.
D) E.
& J. Gallo Winery v. Spider Webs Ltd.
C
Which of
the following involves bypassing the target site's home page and going directly
to a content page?
A)
cybersquatting
B)
metatagging
C)
framing
D) deep
linking
D
All of
the following cases involved the doctrine of fair use except:
A)
Spokeo v. Robins
B)
Perfect 10, Inc. v. Amazon.com, Inc. et al.
C) Field
v. Google, Inc.
D) Kelly
v. Arriba Soft.
A
Which of
the following involves the issue of social control?
A)
information rights
B)
governance
C)
public safety and welfare
D)
property rights
B
Which of
the following Supreme Court cases established that states can compel online
retailers to collect and remit sales taxes even if they do not have a physical
presence within the state?
A) South
Dakota v. Wayfair
B) Bilski
et al. v. Kappos
C) Quill
v. North Dakota
D) Alice
Corporation v. CLS Bank International
A
Which of
the following statements is not true?
A)
Currently, the United States is in a mixed-mode policy environment with respect
to the Internet where self-regulation co-exists with limited government
regulation.
B) The
Internet is technically very difficult to control, monitor, and regulate from a
central location.
C) Early
Internet advocates argued that the Internet was different from all previous
technologies.
D)
Controlling e-commerce also involves regulating the Internet.
B
Which of
the following statements about net neutrality is not true?
A) The
FCC now regulates ISP pricing.
B) The
FCC ruled that Internet broadband service providers should be viewed as public
utilities similar to telephone companies.
C) The
FCC overruled state laws that made it difficult for cities to operate their own
broadband networks.
D) ISPs
can no longer discriminate against users on the basis of protocol or amount of
usage
A
Which of
the following is not an e-commerce public safety and welfare issue?
A)
regulation of gambling
B)
regulation of cigarette sales
C)
regulation of pornography
D)
regulation of taxation
D
Which of
the following is used to track individuals as they move among thousands of
websites?
A)
first-party cookies
B)
digital wallets
C)
advertising networks
D)
shopping carts
C
Which of
the following uses software installed at the ISP level to track user
clickstream behavior?
A)
shopping carts
B)
trusted computing environments
C) deep
packet inspection
D) DRM
C
Which of
the following statements about industry self-regulation regarding privacy is
not true?
A) The
AdChoices program is an industry-sponsored initiative to encourage websites to
be more transparent about how they use personal information and to make it more
likely that appropriate ads are shown to users.
B) The
Network Advertising Initiative offers consumers a global opt-out feature to
prevent network advertising agencies from placing cookies on a user's computer.
C)
Industry efforts have not so far succeeded in reducing American fears of
privacy invasion.
D)
Online seal programs that attest to a company's privacy policies have had a
significant impact on online privacy practices.
D
1)
Liability is a feature of political systems in which a body of law is in place
that permits individuals to recover damages done to them by other actors,
systems, or organizations.
TRUE
Page
Ref: 492
Difficulty:
Moderate
Ethical
understanding and reasoning
2) The
principle of responsibility means that individuals, organizations, and
societies should be held accountable to others for the consequences of their
actions.
FALSE
Page
Ref: 492
Difficulty:
Moderate
Ethical
understanding and reasoning
3) The
ethical principle of Universalism states that if an action is not right for all
situations, then it is not right for any situation.
TRUE
Page
Ref: 494
Difficulty:
Moderate
Ethical
understanding and reasoning
4) In
the United States, Google is required to remove results from its search engine
if requested.
FALSE
Page
Ref: 485-487
Difficulty:
Moderate
Application
of knowledge
5) Most adult
social network participants do not have any expectation of personal privacy
when using a social network.
FALSE
Page
Ref: 498
Difficulty:
Moderate
Application
of knowledge
6) The
opt-out model for informed consent requires an affirmative action by the
consumer before a company can collect and use information.
FALSE
Page
Ref: 506
Difficulty:
Moderate
Application
of knowledge
7) The
Children's Internet Protection Act (CIPA) prohibits Web sites from collecting
information on children under the age of 13.
FALSE
Page
Ref: 545-546
Difficulty:
Moderate
Application
of knowledge
8) The
European Data Protection Directive prohibits the transfer of PII to
organizations or countries that do not have similar privacy protection
policies.
TRUE
Page
Ref: 514
Difficulty:
Moderate
Application
of knowledge
9) The
AdChoices program is an industry-sponsored initiative to encourage Web sites to
be more transparent about how they use personal information and to make it more
likely that appropriate ads are shown to users.
TRUE
Page
Ref: 515
Difficulty:
Moderate
Application
of knowledge
10)
Copyright protection protects against others copying the underlying ideas in a
work.
FALSE
Page
Ref: 519
Difficulty:
Moderate
Application
of knowledge
11) The expansion
of generic top-level domains recently authorized by ICANN is likely to be very
disruptive in terms of copyright protection.
FALSE
Page
Ref: 531
Difficulty:
Moderate
Application
of knowledge
12) Net
neutrality refers to Internet backbone owners treating all Internet traffic
equally.
TRUE
Page
Ref: 542
Difficulty:
Moderate
Application
of knowledge
13)
Section 230 of the Communications Decency Act (CDA) requires schools and
libraries in the United States to install technology protection measures in an
effort to shield children from pornography.
FALSE
Page
Ref: 545
Difficulty:
Moderate
Application
of knowledge
14)
Online gambling is now legal throughout the United States.
FALSE
Page
Ref: 549
Difficulty:
Easy
Application
of knowledge
15)
Google defended its Library Project on the grounds of fair use.
TRUE
Page
Ref: 552
Difficulty:
Moderate
Application
of knowledge
16) Which
of the following e-commerce technology dimensions creates greater opportunities
for cyberbullying?
A)
richness
B)
interactivity
C)
social technology
D) ubiquity
C
Page Ref: 489
Difficulty:
Moderate
Application
of knowledge
17)
Which of the following e-commerce technology dimensions has the potential to
reduce cultural diversity in products?
A)
richness
B)
interactivity
C)
information density
D)
global reach
D
Page
Ref: 489
Difficulty:
Moderate
Application
of knowledge
18)
Which of the following is not one of the four basic principles shared by
ethical schools of thought in western culture?
A)
accountability
B)
privacy
C) due
process
D)
liability
B
Page
Ref: 492
Difficulty:
Moderate
Ethical
understanding and reasoning
19) What
is the first step in analyzing an ethical dilemma?
A)
Define the conflict or dilemma and identify the higher-order values involved.
B)
Identify the potential consequences of your opinions.
C)
Identify the options you can reasonably take.
D) Identify
and describe the facts.
D
Page
Ref: 493
Difficulty:
Moderate
Ethical
understanding and reasoning
20)
Which ethical principle states that, when confronted with an ethical dilemma,
individuals should take the action that achieves the greater value for all of
society?
A) the
Golden Rule
B)
Universalism
C) the
Collective Utilitarian principle
D) the
Social Contract rule
C
Page
Ref: 494
Difficulty:
Moderate
Ethical
understanding and reasoning
21)
Which ethical principle emphasizes putting oneself into the place of others and
thinking of oneself as the object of the decision?
A) the
Golden Rule
B)
Universalism
C) the
Collective Utilitarian principle
D) the
Social Contract rule
A
Page
Ref: 494
Difficulty:
Moderate
Ethical
understanding and reasoning
22)
Which ethical principle asks you to assume that virtually all tangible and
intangible objects are owned by someone else unless there is a specific
declaration otherwise?
A) the
Golden Rule
B) the
Slippery Slope
C) the
Social Contract rule
D) No Free
Lunch
D
Page
Ref: 494
Difficulty:
Moderate
Ethical
understanding and reasoning
23)
Which ethical principle states that if an action cannot be taken repeatedly,
then it is not right to take at all?
A)
Universalism
B) the
Slippery Slope
C) the
Social Contract rule
D) the
Golden Rule
B
Page
Ref: 494
Difficulty:
Moderate
Ethical
understanding and reasoning
24)
Which ethical principle asks you to consider the impact of your decision if the
principles underlying your decision became an organizing principle of the
entire society?
A) the
Golden Rule
B) Risk
Aversion
C) the
Slippery Slope
D) the
Social Contract rule
D
Page
Ref: 494
Difficulty:
Moderate
Ethical
understanding and reasoning
25)
Which ethical principle tells you that it is wise to assume perfect information
markets?
A) the
Golden Rule
B) the
New York Times test
C) the
Social Contract rule
D) the
Collective Utilitarian principle
B
Page
Ref: 494
Difficulty:
Moderate
Ethical
understanding and reasoning
26) Which
ethical principle states that when confronted with an ethical dilemma, an
individual should take the action that produces the least harm, or the least
potential cost?
A) the
Slippery Slope
B) Risk
Aversion
C) No
Free Lunch
D) the
Collective Utilitarian principle
B
Page
Ref: 494
Difficulty:
Moderate
Ethical
understanding and reasoning
27)
Which of the following basic ethical concepts plays an important role in
defining privacy?
A)
responsibility
B)
accountability
C)
liability
D) due
process
D
Page
Ref: 495
Difficulty:
Difficult
Ethical
understanding and reasoning
28)
Which of the following is not aimed at strengthening the ability of law
enforcement agencies to monitor Internet users without their knowledge?
A) the
USA PATRIOT Act
B) the
Homeland Security Act
C) the
Communications Assistance for Law Enforcement Act
D) the
E-Government Act
D
Page
Ref: 503, 507
Difficulty:
Moderate
Application
of knowledge
29) Which
of the following tools can companies use to track user statements and views on
newsgroups, chat groups, and other public forums?
A)
cookies
B)
digital wallets
C)
search engines
D)
shopping carts
C
Page
Ref: 497
Difficulty:
Moderate
Information
technology
30)
Which of the following can be used to record all keyboard activity of a user?
A)
shopping carts
B)
trusted computing environments
C)
spyware
D) DRM
C
Page
Ref: 497
Difficulty:
Easy
Application
of knowledge
31)
Which of the following is not one of the issues complicating the taxation of
e-commerce sales?
A) Taxes
raised are used for different government purposes.
B) Sales
taxes and policies vary by state and country.
C)
Retailers legally only have to charge sales tax if they have operations located
in the same state as a consumer.
D) Small
online businesses are unable to manage sales taxes to thousands of different
jurisdictions.
A
Page
Ref: 539
Difficulty:
Difficult
Application
of knowledge
32)
Which of the following is a tiered notice and response system aimed at reducing
copyright infringement over P2P networks?
A) the
CAS
B) FIP
C)
Surfright
D) the
Open Internet Order
A
Page
Ref: 524
Difficulty:
Moderate
Application
of knowledge
33) Which
of the following statements about industry self-regulation regarding privacy is
not true?
A) OPA
members are required to implement the OPA's privacy guidelines.
B) The
primary focus of industry efforts has been the use of online "seals"
that attest to the site's policies.
C)
Industry efforts have not so far succeeded in reducing American fears of
privacy invasion.
D) The
NAI's privacy policies have established the TRUSTe seal.
D
Page
Ref: 515
Difficulty:
Difficult
Application
of knowledge
34) The
sharing of a user's stored cookie information between Web sites and without the
user's knowledge is:
A) legal
in the United States but illegal in Europe.
B)
illegal in the United States but legal in Europe.
C) legal
in both the United States and Europe.
D)
illegal in both the United States and Europe.
A
Page
Ref: 514
Difficulty:
Difficult
Application
of knowledge
35)
Which of the following requires financial institutions to inform consumers of
their privacy policies and permits consumers some control over their records?
A)
Freedom of Information Act
B)
Gramm-Leach-Bliley Act
C) COPPA
D) HIPAA
B
Page Ref: 507
Difficulty:
Difficult
Application
of knowledge
36) A social
consequence of the richness of Internet information is:
A) an
increase in shallowness.
B) an
increase in the ease of creating misleading information.
C) very
persuasive messages might reduce the need for multiple independent sources of
information.
D) an
increase in vulnerability to hacking attacks.
C
Page
Ref: 489
Difficulty:
Difficult
Application
of knowledge
37)
Which of the following is a core Fair Information Practices (FIP) principle?
A)
Choice/Consent
B)
Access/Participation
C)
Security
D)
Enforcement
A
Page
Ref: 509
Difficulty:
Difficult
Application
of knowledge
38)
Which of the FTC's Fair Information Practices (FIP) principles requires
identification of the collector of data?
A)
Notice/Awareness
B)
Choice/Consent
C)
Access/Participation
D)
Security
A
Page
Ref: 509
Difficulty:
Moderate
Application
of knowledge
39)
Which of the FTC's Fair Information Practices (FIP) principles requires opt-in
or opt-out policies to be in place?
A)
Notice/Awareness
B)
Choice/Consent
C) Access/Participation
D)
Security
B
Page
Ref: 509
Difficulty:
Moderate
Application
of knowledge
40) What
is the FTC recommendation regarding choice as it relates to personally
identifiable information (PII)?
A)
Require firms to have consumers affirmatively opt-in before PII is collected.
B)
Require firms to allow consumers to opt-out before PII is collected.
C) Make
collection of PII illegal.
D)
Require robust notice only before PII is collected.
A
Page
Ref: 510
Difficulty:
Difficult
Application
of knowledge
41)
"Do Not Track" falls under which of the following principles in the
FTC's new privacy framework?
A)
Privacy by Design
B)
Simplified Choice
C)
Greater Transparency
D) Scope
B
Page
Ref: 511
Difficulty:
Moderate
Application
of knowledge
42) Which
of the following technologies allows you to send e-mail without a trace?
A)
anonymous surfing
B) P3P
C)
anonymous remailers
D)
public key encryption
C
Page
Ref: 517
Difficulty:
Moderate
Application
of knowledge
43)
Which pricing plan charges fees to e-commerce firms based on the amount of
traffic they generate?
A)
highway pricing
B) cap
pricing
C)
usage-based billing
D)
congestion pricing
A
Page
Ref: 543
Difficulty:
Moderate
Application
of knowledge
44) What
is the major reason that the Internet has such potential for destroying
traditional conceptions and implementations of intellectual property law?
A) the
ability to make perfect copies of digital works at little cost
B) the
anonymous nature of the Internet
C) the
support for instant peer-to-peer communication
D) the
use of standards for file formats
A
Page
Ref: 518
Difficulty:
Moderate
Application
of knowledge
45) Which
of the following protects original forms of expression in a tangible medium?
A) trade
secret law
B)
copyright law
C)
patent law
D)
trademark law
B
Page
Ref: 519
Difficulty:
Moderate
Application
of knowledge
46) How
long does copyright protection extend for corporate-owned works?
A) 25
years
B) 50
years
C) 75
years
D) 95
years
D
Page
Ref: 519
Difficulty:
Moderate
Application
of knowledge
47)
Which of the following situations would not qualify for the fair use exception
to U.S. copyright law?
A) A
professor clips a newspaper article just before class and distributes copies of
it to his class.
B) A
journalist quotes a paragraph from a book in a review of the book.
C) A
student copies a photograph of his favorite band from a Web site created by the
band's record label and places it on the student's personal Web site.
D)
Google posts thumbnail images of books in the Google Book Search Project.
C
Page
Ref: 520-521
Difficulty:
Difficult
Analytical
thinking
48) All
of the following are factors that will be considered in determining whether use
of copyrighted material is "fair use" except the:
A)
nature of the work used.
B)
amount of the work used.
C)
market effect of the use.
D) free
availability of the work on the Web.
D
Page
Ref: 521
Difficulty:
Moderate
Application
of knowledge
49)
Downloading music tracks owned by record companies without paying for them is
an example of a violation of:
A)
patent law.
B)
copyright law.
C)
trademark law.
D)
privacy law.
B
Page
Ref: 491
Difficulty:
Moderate
Application
of knowledge
50) All
of the following are possible penalties for violating the Digital Millennium
Copyright Act (DMCA) except:
A) up to
ten years imprisonment for a first offense.
B) fines
up to $500,000 for a first offense.
C) fines
up to $1 million for a repeat offense.
D)
restitution to the injured parties for any losses due to infringement.
A
Page
Ref: 521-524
Difficulty:
Moderate
Application
of knowledge
51) All
of the following statements about the Digital Millennium Copyright Act (DMCA)
are true except:
A) the
DMCA makes it illegal to circumvent technological measures to protect works.
B) the
DMCA makes Internet Service Providers (ISPs) responsible and accountable for
hosting Web sites or providing services to infringers regardless of whether the
ISP is aware of infringement.
C) the
DMCA requires search engines to block access to infringing sites.
D) the DMCA
allows libraries to make digital copies of works for internal use only.
B
Page
Ref: 521-524
Difficulty:
Moderate
Application
of knowledge
52)
Which of the following allows someone to obtain an exclusive monopoly on the
ideas behind an invention for 20 years?
A)
copyright law
B) trade
secret law
C)
patent law
D)
trademark law
C
Page
Ref: 524
Difficulty:
Moderate
Application
of knowledge
53) All
of the following statements about patents are true except:
A) it is
more difficult to obtain a copyright than it is to obtain a patent.
B) the
four types of inventions protected by patent law are machines, manmade
products, compositions of matter, and processing methods.
C)
computer programs can be patented.
D) in
order to be patented, an invention must be nonobvious.
A
Page
Ref: 524-525
Difficulty:
Moderate
Application
of knowledge
54)
Which case was instrumental in paving the way for Internet business methods
patents?
A) Brown
Bag v. Symantec
B) State
Street Bank & Trust Co. v. Signature Financial Group, Inc.
C) Alice
Corporation Pty. Ltd. v. CLS Bank International
D)
Ticketmaster Corp. v. Tickets.com
B
Page
Ref: 529
Difficulty:
Difficult
Application
of knowledge
55)
Amazon has a patent on:
A)
download-based sales.
B) display
of third-party advertisements in floating windows.
C)
one-click purchasing.
D)
hyperlinks.
C
Page
Ref: 530
Difficulty:
Moderate
Application
of knowledge
56)
Disputes over federal trademarks involve establishing:
A)
underlying ideas.
B)
intent.
C)
piracy.
D)
infringement.
D
Page
Ref: 531
Difficulty:
Moderate
Application
of knowledge
57)
Registering a domain name similar or identical to trademarks of others to
extort profits from legitimate holders is an example of:
A)
cybersquatting.
B)
cyberpiracy.
C)
framing.
D)
metatagging.
A
Page
Ref: 532
Difficulty:
Easy
Application
of knowledge
58)
Which of the following handles cybersquatting cases under its Uniform Dispute
Resolution procedures?
A) ICANN
B) FTC
C) WIPO
D) USPTO
C
Page
Ref: 531
Difficulty:
Moderate
Application
of knowledge
59)
Registering a domain name similar or identical to trademarks of others to
divert Web traffic to their own sites is an example of:
A)
cybersquatting.
B)
cyberpiracy.
C)
framing.
D)
metatagging.
B
Page
Ref: 532
Difficulty:
Moderate
Application
of knowledge
60)
Registering the domain name Faceboik.com with the intent to divert Web traffic
from people misspelling Facebook.com is an example of:
A)
cybersquatting.
B)
typosquatting.
C)
metatagging.
D)
linking.
B
Page
Ref: 534
Difficulty:
Easy
Application
of knowledge
61) In
which of the following cases did the U.S. Supreme Court rule that basic
business methods cannot be patented?
A) State
Street Bank & Trust v. Signature Financial Group, Inc.
B) Bilski et al. v. Kappos
C) Alice
Corporation Pty. Ltd. v. CLS Bank International
D) Brown
Bag Software v. Symantec Corp.
C
Page
Ref: 529
Difficulty:
Moderate
Application
of knowledge
62) The
display of a third-party's Web site or page within your own Web site is called:
A)
cybersquatting.
B)
metatagging.
C)
framing.
D) deep
linking.
C
Page
Ref: 536
Difficulty:
Moderate
Application
of knowledge
63) The
President's Council of Advisors on Science and Technology has called for all of
the following except:
A) a
consumer privacy bill of rights.
B) a
data breach law requiring firms to report losses of consumer data.
C)
amendment of the Electronic Communications Privacy Act to strengthen
protections against government surveillance.
D) a
blanket prohibition on commercial data brokers.
D
Page
Ref: 504
Difficulty:
Difficult
Application
of knowledge
64)
Comcast's proposed merger with which of the following would make it the
high-speed Internet provider for close to 40% of American homes?
A)
Cablevision
B)
AT&T
C)
Verizon
D) Time
Warner Cable
D
Page
Ref: 544
Difficulty:
Moderate
Application
of knowledge
65) According
to data from Pew Research Center, which of the following is the action which
the highest percentage of Internet users has taken to preserve their privacy
online?
A) used
an anonymous Web browsing service
B)
encrypted their communications
C)
cleared Web browser history and cookies
D)
posted comments online anonymously
C
Page
Ref: 500
Difficulty:
Difficult
Application
of knowledge
66) The
________ of Internet and Web technology can result in work and shopping
invading family life.
ubiquity
Page
Ref: 489
Difficulty:
Moderate
Application
of knowledge
67) The
four major dimensions of e-commerce ethical, social, and political issues are
public safety and welfare; property rights; information rights; and ________.
governance
Page
Ref: 490-491
Difficulty:
Moderate
Application
of knowledge
68)
________ is another name for net neutrality.
Open
Internet
Page
Ref: 542
Difficulty:
Moderate
Application
of knowledge
69) Demographic
and behavioral information that does not include any personal identifiers is
referred to as ________ information.
anonymous
Page
Ref: 496
Difficulty:
Easy
Application
of knowledge
70)
________ involves the creation of digital images that characterize online
individual and group behavior.
Profiling
Page
Ref: 500
Difficulty:
Moderate
Application
of knowledge
71)
Megaupload is an example of a(n) ________, an online file storage service
dedicated to sharing copyrighted material illegally.
cyberlocker
Page
Ref: 524
Difficulty:
Moderate
Application
of knowledge
72)
________ is the largest private personal database in the world.
Acxiom
Page
Ref: 504
Difficulty:
Moderate
Application
of knowledge
73) A(n)
________ is a private self-regulating policy and enforcement mechanism that
meets the objectives of government regulators and legislation, but does not
involve government regulation or enforcement.
safe
harbor
Page
Ref: 514
Difficulty:
Moderate
Application
of knowledge
74)
________ involves bypassing the target site's home page and going directly to a
content page.
Deep
linking
Page
Ref: 535
Difficulty:
Moderate
Application
of knowledge
75) ________
copyright infringement lawsuits are concerned with the distinction between an
idea and its expression.
Look and
feel
Page
Ref: 520
Difficulty:
Moderate
Application
of knowledge
76) The
doctrine of ________ permits teachers and writers to use copyrighted materials
without permission under certain circumstances.
fair use
Page
Ref: 521
Difficulty:
Difficult
Application
of knowledge
77) In
trademark law, ________ is defined as any behavior that would weaken the
connection between the trademark and the product.
dilution
Page
Ref: 531
Difficulty:
Moderate
Application
of knowledge
78)
Single words, pictures, shapes, packaging, and colors used to identify and
distinguish goods are protected under ________ law.
trademark
Page
Ref: 531
Difficulty:
Moderate
Application
of knowledge
79)
Under the ________ Act, American intelligence authorities are permitted to tap
into whatever Internet traffic they believe is relevant to the campaign against
terrorism, in some circumstances without judicial review.
USA Patriot, Patriot
Page Ref: 538
Difficulty:
Difficult
Application
of knowledge
80) The
issue of ________ pits those who wish that all Internet traffic is given equal
backbone access against telephone and cable companies that would like to charge
differentiated prices based on bandwidth and fees paid.
net
neutrality, Open Internet
Page
Ref: 542
Difficulty:
Moderate
Application
of knowledge
81) Discuss
in depth one ethical, social, or political issue that is presently in the news
surrounding the Internet and e-commerce.
A
student might answer this issue by focusing on any one of a number of ethical,
social, or political issues currently surrounding the Internet and e-commerce.
Possible topics include privacy issues, intellectual property rights issues
(copyright, patents, or trademarks), taxation, Internet governance issues,
online pornography, gambling, or the sale of cigarettes and drugs.
Page
Ref: 484-554
Difficulty:
Moderate
Analytical
thinking; Information technology; Written and oral communication
82)
Define privacy, information privacy, and informed consent and discuss the ways
in which the practices of e-commerce companies, particularly the use of
advertising networks, threaten people's privacy.
Privacy
is the moral right of individuals to be left alone, free from surveillance or
interference from other individuals including the state. Information privacy
includes both the right to prohibit certain information from being collected by
either governments or businesses and the right to control the use of whatever
information is collected about you. The core concept is the control of your own
personal information.
Informed
consent means that an individual has knowledge of all of the material facts
needed to make a rational decision and consent has been given to collect
information. In the United States, business firms and government agencies can
gather transaction data from the marketplace and use it for other marketing
purposes without the informed consent of the individual. In Europe, on the
other hand, this is illegal. European businesses can only use transaction data
to support the current transaction if they have asked for and received the
informed consent of the individual.
Advertising
networks are a threat to people's privacy because they collect information
about how you use the Web including the sites you visit, the keywords you use
in searches and other queries, your online purchases, the click-through ads you
respond to, information you submit to social networking sites, and other
information. These advertising networks, with the permission of the Web sites
you visit but not your permission, place cookies on your computer that are used
to track your movements as you surf the Web. In addition to this information,
they may also compile a profile that contains information that the company
infers about you based upon the sites you visit. All of this data is entered
into a database and analyzed to create a profile that might include your
interests, habits, associations, and inferred personality traits.
From a
privacy protection perspective, the advertising network raises issues about who
will see and use the information held by private companies, whether the user
profiles will be linked to actual personally identifying information (such as
name, social security number, and bank and credit accounts), the absence of
consumer control over the use of the information, the lack of consumer choice,
the absence of consumer notice, and the lack of review and amendment
procedures. The pervasive and largely unregulated collection of personal
information online has raised significant fears and opposition among consumers.
Contrary to what the online advertising industry has often said, namely, that
the public really does not care about its online privacy, there is a long
history of opinion polls that document the public's fear of losing control over
their personal information when visiting e-commerce sites.
Page
Ref: 495-502
Difficulty:
Moderate
Analytical
thinking; Information technology; Written and oral communication
83)
Describe and evaluate the different methods that are being used to protect
online privacy. Which of these methods do you think is or could be the most
effective?
The
different methods being used to protect online privacy include legal
protections, industry self-regulation, privacy advocacy groups, privacy
protection products, and technology solutions.
In the
United States, the Federal Trade Commission has taken the lead in researching
online privacy and recommending legislation to Congress. The FTC has issued the
Fair Information Practice (FIP) Principles, which forms the basis for its
recommendations for online privacy. Two core principles are Notice/Awareness
and Choice/Consent. The Notice/Awareness principle recommends that sites
disclose their information practices before collecting data. The Choice/Consent
principle recommends that there be a choice system in place that allows
consumers to choose how their information will be used for secondary purposes
other than supporting transactions. Although the FIP principles are guidelines,
not laws, they have stimulated private firms to develop their own guidelines
and are being used as the basis of new legislation, such as the Children's
Online Privacy Protection Act (COPPA), which requires Web sites to obtain
parental permission before collecting information on children under 13 years of
age. Recently, the FTC has developed a new framework to address consumer
privacy. The main principles are privacy by design, simplified choice, and
greater transparency, applied to all commercial entities that collect or use
consumer data, not just those that collect PII. It has also called for a
"Do Not Track" mechanism for online behavioral advertising. As with
FIP, these principles remain guidelines. The emphasis in recent FTC privacy
reports is not on restricting the collection of information (as in previous
eras of privacy regulation), but instead on giving consumers rights with
respect to the information collected about them in large databases and its use
by various businesses and agencies. Although several bills have been introduced
in Congress to implement them, none have been passed as of yet.
Historically,
the online industry in the United States has opposed online privacy
legislation, arguing that industry can do a better job of protecting privacy
than government. However, facing fines, congressional investigations, and
public embarrassment over their privacy invading behaviors, with the potential
loss of some business and credibility, the major players in the e-commerce
industry in the United States are beginning to change some of their policies
regarding the treatment of consumer data. Large Internet firms that rely on
personal information (Google, Facebook, Microsoft, and many others), along with
privacy advocates, are calling on Washington to develop comprehensive consumer
privacy protection legislation that would clarify for consumers and business
firms the meaning of privacy in the current online commercial environment.
The
online industry formed the Online Privacy Alliance (OPA) to encourage
self-regulation. In addition, the Network Advertising Initiative, a consortium
of major Internet advertising companies, was formed to develop policies for the
industry. The NAI policies are designed to offer consumers opt-out programs and
to provide consumers with redress for abuses. Other forms of self-regulation
include various "seals" of approval that sites can display when in
compliance with certain privacy policies. However, these seal programs have had
a limited impact on Web privacy practices and critics argue that the programs
are not particularly effective in safeguarding privacy. In general, industry
efforts at self-regulation in online privacy have not succeeded in reducing
American fears of privacy invasion during online transactions or in reducing
the level of privacy invasion.
In
addition a number of firms have sprung up to sell products that they claim will
help people protect their privacy, from protecting their online reputation to
selling their personal information to the highest bidder. Consumer privacy
groups have also formed to monitor developments, and there are some
technological solutions that help, although primarily in the arena of security.
Technological tools include spyware blockers, pop-up blockers, methods to
secure e-mail, anonymous remailers, anonymous surfing, and cookie managers.
[Student
evaluations of which methods are the most effective will vary.]
Page
Ref: 509-517
Difficulty:
Moderate
Analytical
thinking; Information technology; Written and oral communication
84)
Describe the purpose of intellectual property law and outline the main types of
intellectual property protection.
The
purpose of intellectual property law is to balance two competing interests: the
public and the private. The public interest is served by the creation of
inventions, works of art, music, literature, and other types of intellectual
expression. The private interest is served by rewarding creators of
intellectual property by a time-limited monopoly that grants exclusive use to
the creator.
There
are three main types of intellectual property protection: copyright, patent,
and trademark law. Copyright law protects original forms of expression such as
books, periodicals, and other forms of written expression, art, drawings,
photographs, music, movies, performances, and computer programs. Patents grant
the owner a 20-year exclusive monopoly on the ideas behind an invention. There
are four types of inventions for which patents are granted under patent law:
machines, manmade products, compositions of matter, and processing methods.
Trademark law is used to protect trademarks — marks used to identify and
distinguish goods and indicate their source.
Page
Ref: 518-519
Difficulty:
Moderate
Analytical
thinking; Written and oral communication
85) Explain
why the taxation of e-commerce raises governance and jurisdiction issues.
The
taxation of e-commerce illustrates the complexity of the governance and
jurisdictional issues in the global economy. Most of the issues surround the
sales tax imposed by various states or countries on products sold to residents
of their state or country. Governments the world over rely on sales taxes to
fund various types of government initiatives and programs including the
building of roads, schools, and sewers or other utilities to support business
development.
In the
United States, between the fifty states and the multiple counties and
municipalities, there are thousands of different tax rates and policies. For
example, in some states food is not taxed at all and there are a myriad of
different exceptions and inclusions depending on the locality. However, with
the rise of e-commerce and virtual storefronts, the question is raised as to
what locale a virtual storefront is considered to be located in. The
development of MOTO (mail order/telephone) retail in the 1970s began the
discussion on the taxing of remote sales. State and local tax authorities
wanted MOTO retailers to collect taxes based upon the address of the
recipients, but the Supreme Court has ruled that states cannot force MOTO
retailers to collect taxes unless the business has a physical presence in the
state. Legislation to the contrary has never been able to garner sufficient
support in Congress due to pressure from the catalog merchants, leaving intact
an effective tax subsidy for MOTO merchants.
The
explosive growth of e-commerce, the latest type of "remote sales,"
has once again raised the issue of how — and if — to tax remote sales. Since
its inception, e-commerce has benefited from a tax subsidy of up to 13% for
goods shipped to high sales tax areas. Local retail merchants have complained
bitterly about the e-commerce tax subsidy. E-commerce merchants have argued
that this form of commerce needs to be nurtured and encouraged, and that in any
event, the crazy quilt of sales and use tax regimes would be difficult to
administer for Internet merchants. Online giants like Amazon claim they should
not have to pay taxes in states where they have no operations because they do
not benefit from local schools, police, fire, and other governmental services.
State and local governments meanwhile see billions of tax dollars slipping from
their reach. As Amazon's business model has changed with its building of large
distribution centers close to urban areas to enable next-day delivery, so has
its opposition to paying sales taxes softened.
Page
Ref: 539
Difficulty:
Difficult
Analytical
thinking; Written and oral communication
86)
Describe the five-step process that can be used to analyze an ethical dilemma.
What other guidelines are there to help in understanding a complicated ethical
or moral situation?
The
five-step process is:
1.
Identify and describe the facts. Find out who did what to whom, and where,
when, and how. It helps to get the opposing parties involved in an ethical
dilemma to agree on the facts.
2.
Define the conflict or dilemma and identify the higher-order values involved.
Ethical, social, and political issues always reference higher values.
Otherwise, there would be no debate. The parties to a dispute all claim to be
pursuing higher values (e.g., freedom, privacy, protection of property, and the
free enterprise system).
3.
Identify the stakeholders. Every ethical, social, and political issue has
stakeholders: players in the game who have an interest in the outcome, who have
invested in the situation, and usually who have vocal opinions. Find out the
identity of these groups and what they want. This will be useful later when
designing a solution.
4.
Identify the options that you can reasonably take. You may find that none of
the options satisfies all the interests involved, but that some options do a
better job than others. Sometimes, arriving at a "good" or ethical
solution may not always be a balancing of consequences to stakeholders.
5.
Identify the potential consequences of your options. Some options may be
ethically correct, but disastrous from other points of view. Other options may
work in this one instance, but not in other similar instances. Always ask
yourself, "What if I choose this option consistently over time?"
Other
things to consider when appraising a dilemma include basic ethical concepts
such as responsibility, accountability, and liability and how these play into
the situation. Additionally, you can judge the situation against candidate
ethical principles, such as the Golden Rule, the Slippery Slope theory,
Universalism, the Collective Utilitarian principle, Risk Aversion theory, the
No Free Lunch theory, the New York Times test (Perfect Information rule), and
the Social Contract rule. Actions that do not easily pass these guidelines
deserve some very close attention and a great deal of caution because the
appearance of unethical behavior may do as much harm to you and your company as
the actual behavior.
Page
Ref: 493-495
Difficulty:
Moderate
Analytical
thinking; Written and oral communication; Ethical understanding and reasoning
All of
the following are advantages of online retail except:
faster
delivery of goods.
All of
the following are challenges faced by bricks-and-clicks firms except:
building
a brand name.
All of
the following are challenges for catalog merchants except:
building
sophisticated order entry and fulfillment systems.
All of
the following are examples of the challenges that traditional manufacturers
experience when using the Internet to sell directly to the consumer except:
high-cost
structures.
All of
the following are strategic factors that pertain specifically to a firm and its
related businesses except:
power of
customers.
All of the
following are terms used to describe on-demand service companies except:
omni-channel
commerce.
All of
the following have introduced social commerce functionality, such as buy
buttons, shoppable ads, and marketplaces, except:
Tumblr.
All of
the following services require extensive personalization except:
financial
services.
All of
the following statements about Amazon are true except:
Amazon
purchased Jet.com, one of its discount competitors, to give it a more robust
network for delivering goods.
All of
the following statements about the MOTO sector are true except:
the MOTO
sector is also referred to as the specialty store sector.
All of
the following statements about the online insurance industry are true except:
the
Internet has lowered search costs, increased price comparison, and decreased
prices to consumers for forms of insurance.
All of
the following statements about the online real estate services market are true
except:
the
Internet and e-commerce have created a revolution in the real estate value
chain.
All of
the following were parts of the vision during the early days of e-commerce
except the belief that:
new,
"first-mover" middlemen, with expertise in e-commerce, would force
traditional intermediaries out of business.
Apart
from Amazon, the top online retail firms in terms of online sales are all
primarily ________ firms.
omni-channel.
Approximately
________% of the United States labor force is involved in providing services.
80
(T/F)
Big data plays an important role in predictive marketing.
True
Booking
Holdings owns all of the following except:
Expedia.
(T/F)
Consumers are primarily price-driven when shopping on the Internet.
False
(T/F)
Contrary to predictions of analysts made during the early days of e-commerce,
the Internet has led to both disintermediation and hypermediation on a
widespread basis.
False
Craigslist
is most involved in which of the following online services market(s)?
real
estate services and career services.
Current liabilities
are debts of the firm that will be due within:
one
year.
For a
quick check of a firm's short-term financial health, examine its:
working
capital.
Gross
margin is defined as gross profit:
divided
by net sales revenues.
(T/F) In
2020, almost 75% of the adult U.S. population was expected to use online
banking.
True
In 2020,
it was estimated that about what percentage of Internet users over the age of
14 would make a purchase at an online retail store?
80%
(T/F) In
2020, the number of online buyers in the United States was around 205 million.
True
In
________, all of a customer's financial (and even nonfinancial) data are pulled
together into a single, personalized website.
account
aggregation
In the
United States, the service sector accounts for approximately ________% of the
United States GDP.
80
Omni-channel
merchants are also referred to as:
bricks-and-clicks
companies.
(T/F)
On-demand service companies collect a fee from both sellers and buyers who use
the platform.
True
(T/F)
Online retail constitutes about 20% of the total retail market today.
False
(T/F)
Online retailing provides an example of the powerful role that intermediaries
continue to play in retail trade.
True
Operating
margin is defined as:
operating
income or loss divided by net sales revenues.
(T/F)
Personal consumption of retail goods and services accounts for over 80% of
total gross domestic product (GDP).
False
(T/F)
Service industries (i.e., finance & travel) typically are very knowledge- and
information-intense.
True
(T/F)
The Covid-19 pandemic has severely impacted the online travel industry.
True
The
Internet has resulted in lower search costs, increased price comparison, and
lower prices to consumers for which insurance product line?
term
life insurance.
(T/F)
The existence of substitute products is a key industry strategic factor.
True
The
lower the ________ compared to revenue, the higher the gross profit.
cost of
sales.
(T/F)
The online mortgage industry has transformed the process of obtaining a
mortgage.
False
The
online retail sector of the retail industry is most similar to the ________
sector.
mail
order/telephone order (MOTO).
(T/F)
The social network LinkedIn has become major player in the online recruitment
market.
True
(T/F)
The term fintech applies only to tech companies that are seeking use technology
to unbundle traditional institutional financial services industries and instead
deliver targeted solutions.
False
The term
supply-push refers to:
making
products prior to orders being received based on estimated demand.
Virtual
merchants face potentially large costs for all of the following except:
building
and maintaining physical stores.
What is
another name for pro forma earnings?
earnings
before income taxes, depreciation, and amortization (EBITDA).
What is
the largest sector of the online travel services market in terms of revenue?
airline
reservations.
Which of
the following best explains why the service sector is a natural avenue for
e-commerce?
Much of the
value in services is based on the collection, storage, and exchange of
information.
Which of
the following enabled MOTO firms to make an easier transition to e-commerce?
The fact
that they already had efficient customer order fulfillment processes.
Which of
the following has the highest share of online retail sales?
virtual
merchants.
Which of
the following has the second-highest share of online retail sales?
omni-channel
merchants.
Which of
the following is a subscription-based retailer using predictive marketing and
big data?
Stitch
Fix
Which of
the following is an on-demand service company focused on lodging?
Airbnb
Which of
the following is not a digitally native vertical brand (D2C)?
Wayfair
Which of
the following is not a key industry strategic factor?
synergies
Which of
the following is not a major trend in online retail for 2020-2021?
The
COVID-19 pandemic is expected to create a decrease in e-commerce retail
purchases.
Which of
the following is not a major trend in the online recruitment services industry?
disintermediation.
Which of
the following is not an example of a transaction broker?
an
accountant.
Which of
the following is not an example of a virtual merchant?
Dell
Which of
the following is not categorized as an operating expense?
the cost
of products being sold.
Which of
the following is not considered a current asset?
long-term
investments.
Which of
the following is not one of the central challenges facing the online retail
industry?
lack of
physical store presence.
Which of
the following is not one of the methods used by traditional retailers to
develop omni-channel integration?
online
supply-push.
Which of
the following is not one of the seven major segments of the retail industry?
electronics
and computers
Which of
the following is not true about on-demand service firms?
On-demand
service firms are a totally new phenomenon without precedent in the history of
e-commerce.
Which of
the following measures the percentage of sales revenue a firm can retain after
all expenses are deducted from gross revenues?
net
margin.
Which of
the following occurs when retailers of products must compete on price and
currency of inventory directly against the manufacturer?
channel
conflict.
Which of
the following provides a financial snapshot of a company's assets and
liabilities (debts) on a given date?
balance
sheet.
Which of
the following statements about online banking is not true?
More
people use a tablet for mobile banking than a mobile phone.
Which of
the following statements is not true about the automobile, and automobile parts
and accessories, online retail category?
Most of
the revenue in this category is generated from the sales of automobiles.
Which of
the following statements is not true?
The
online travel services sector is one of the few in which extensive
disintermediation has occurred.
Within
the major service industry groups, companies can be categorized generally into
those that provide transaction brokering and those that involve which of the
following?
providing
hands-on services.
________
provides notices called Consumer Alerts to inform readers when a review is
likely to be fraudulent.
Yelp
Which of
the following is not a major trend in online retail for 2018-2019?
The
number of online buyers begins to plateau.
All of
the following statements about the MOTO sector are true except:
the MOTO
sector is also referred to as the specialty store sector.
All of
the following were parts of the vision during the early days of e-commerce
except the belief that:
new,
"first-mover" middlemen, with expertise in e-commerce, would force
traditional intermediaries out of business.
In 2018,
approximately what percentage of Internet users over the age of 14 made a
purchase at an online retail store?
almost
80%
Which of
the following categories generates the highest percentage of online retail
revenue?
computers
and electronics
Which of
the following is not one of the central challenges facing the online retail
industry?
lack of
physical store presence
Which of
the following is not a digitally native vertical brand?
Wayfair
All of
the following are strategic factors that pertain specifically to a firm and its
related businesses except:
power of
customers.
Which of
the following is not categorized as an operating expense?
the cost
of products being sold
Operating
margin is defined as:
operating
income or loss divided by net sales revenues
Current
liabilities are debts of the firm that will be due within:
one
year.
For a
quick check of a firm's short-term financial health, examine its:
working
capital.
Which of
the following is not an example of a virtual merchant?
Dell
All of
the following statements about Amazon are true except:
in 2016,
Amazon purchased Jet.com, one of its discount competitors.
The term
supply-push refers to:
making
products prior to orders being received based on estimated demand.
Which of
the following occurs when retailers of products must compete on price and
currency of inventory directly against the manufacturer?
channel
conflict
Which of
the following has the second-highest share of online retail sales?
omni-channel
merchants
Service
industry groups are categorized generally into two groups, those that provide
transaction brokering and those that involve:
providing
hands-on services.
All of the
following services require extensive personalization except:
financial
services.
The
Internet has resulted in lower search costs, increased price comparison, and
lower prices to consumers for which insurance product line?
term
life insurance
All of
the following statements about the online insurance industry are true except:
the
Internet has lowered search costs, increased price comparison, and decreased
prices to consumers for all forms of insurance.
Craigslist
is most involved in which of the following online services market(s)?
real
estate services and career services
What is
the largest sector of the online travel services market in terms of revenue?
airline
reservations
Which of
the following statements is not true?
The
online travel services sector is one of the few in which extensive
disintermediation has occurred.
Bookings
Holdings owns all of the following except:
Orbitz.
Which of
these job recruitment sites is not a job listing aggregator?
CareerBuilder
Which of
the following is not a major trend in the online recruitment services industry?
disintermediation
Which of
the following is not true about on-demand service firms?
On-demand
service firms are a totally new phenomenon without precedent in the history of
e-commerce.
Which of
the following is an on-demand service company focused on lodging?
Airbnb
All of
the following are terms used to describe on-demand service companies except:
omni-channel
commerce.
1) Which
of the following is not a major trend in online retail for 2016-2017?
A)
Online retail remains the fastest growing retail channel.
B) The
average annual purchase of online buyers continues to increase.
C)
Online retailers place an increased emphasis on providing an improved
"shopping experience."
D) The
number of online buyers begins to plateau.
D
2) The
MOTO sector of the retail industry is most like the ________ sector.
A)
specialty stores
B)
general merchandise
C)
online retail sales
D)
consumer durables
C
3) Which
of the following is not one of the seven major segments of the retail industry?
A)
electronics and computers
B)
specialty stores
C)
gasoline and fuel
D) food
and beverage
A
4) All
of the following statements about the MOTO sector are true except:
A)
compared to general merchandisers, the transition to e-commerce has been easier
for MOTO firms.
B) the
MOTO sector is also referred to as the specialty store sector.
C) MOTO
was the last technological revolution that preceded e-commerce.
D)
distribution of catalogs is one of MOTO retailers' biggest expenses.
B
5) All
of the following were factors that precipitated the growth of MOTO except:
A) the
national toll-free call system.
B) the
growth of the cellular phone industry.
C)
falling long distance telecommunications prices.
D) the
growth of the credit card industry.
B
6) All
of the following were parts of the vision during the early days of e-commerce
except the belief that:
A) new,
"first-mover" middlemen, with expertise in e-commerce, would force
traditional intermediaries out of business.
B)
online consumers were rational and cost-driven.
C) entry
costs to the online retail market would be much less than those needed to
establish a physical storefront.
D) the cost
of acquiring customers would be much lower.
A
7) All
of the following have launched trials of Buy buttons except:
A)
Facebook.
B)
Pinterest.
C)
Instagram.
D)
Tumblr.
D
8) In
2016, approximately what percentage of Internet users over the age of 14 made a
purchase at an online retail store?
A) 37%
B) 57%
C) 77%
D) 97%
C
9) Which
of the following categories generates the highest percentage of online retail
revenue?
A)
computers and electronics
B)
apparel and accessories
C)
books/music/video
D)
automobile and automobile parts and accessories
B
10) All
of the following are advantages of online retail except:
A) lower
supply chain costs.
B) lower
cost of distribution.
C)
ability to change prices.
D)
faster delivery of goods.
D
11)
Which of the following is not one of the central challenges facing the online
retail industry?
A) lack
of physical store presence
B)
consumer concerns about the privacy of personal information
C)
inconvenience in returning goods
D)
delivery delays
A
12) Which
of the following is not one of the methods used by traditional retailers to
develop omni-channel integration?
A)
online catalog
B)
online order, in-store pickup
C)
online supply-push
D)
online promotions for offline purchases
C
13)
Which of the following statements is not true about the automobile and
automobile parts and accessories online retail category?
A) Most
of the revenue in this category is generated from the sales of automobiles.
B)
Automobile manufacturers use the Internet to deliver branding advertising.
C) U.S.
franchising law prohibits automobile manufacturers from selling cars directly
to consumers.
D)
Automobile retailing is dominated by dealership networks.
A
14)
Approximately ________ retailers generate 90% of all retail e-commerce sales.
A) 10
B) 100
C) 1,000
D)
10,000
C
15)
Which of the following had the highest online sales revenue in 2015?
A)
Macy's
B)
Walmart
C) Sears
D)
Target
B
28)
Which of the following is not a key industry strategic factor?
A)
synergies
B) barriers
to entry
C)
industry value chain
D)
existence of substitute products
A
29) All
of the following are strategic factors that pertain specifically to a firm and
its related businesses except:
A) core
competencies.
B)
synergies.
C)
technology.
D) power
of customers.
D
30) The
lower the ________ compared to revenue, the higher the gross profit.
A)
assets
B) cost
of sales
C) gross
margin
D)
operating expenses
B
31)
Gross margin is defined as gross profit:
A) minus
total operating expenses.
B)
divided by net sales revenues.
C)
divided by cost of sales.
D) minus
net income.
B
32)
Which of the following is not categorized as an operating expense?
A) the
cost of products being sold
B)
marketing costs
C)
administrative overhead
D)
amortization of goodwill
A
33)
Operating margin is defined as:
A)
operating income or loss divided by net sales revenues.
B)
operating income or loss divided by total operating expenses.
C) net
sales revenues divided by net income or loss.
D) net assets
divided by net liabilities.
A
34) What
is another name for pro forma earnings?
A) net
margin
B)
operating income
C)
earnings before income taxes, depreciation, and amortization (EBITDA)
D)
generally accepted accounting principles (GAAP) earnings
C
35)
Which of the following would not be considered a current asset?
A)
long-term investments
B) cash
C)
accounts receivable
D)
marketable securities
A
36)
Current liabilities are debts of the firm that will be due within:
A) three
months.
B) six
months.
C) one
year.
D) two
years.
C
37) For
a quick check of a firm's short-term financial health, examine its:
A)
working capital.
B) gross
margin.
C)
long-term debt.
D) cost
of sales.
A
38) ________
measures the percentage of sales revenue a firm retains after all expenses are
deducted from gross revenues.
A) Gross
profit
B) Net
margin
C)
Operating margin
D)
Working capital
B
39)
Which of the following provides a financial snapshot of a company's assets and
liabilities (debts) on a given date?
A)
working capital
B)
operating margin
C)
balance sheet
D) gross
margin
C
42)
Which of the following is not an example of a virtual merchant?
A)
Overstock
B)
Wayfair
C) Rue
La La
D) Dell
D
43)
Omni-channel merchants are also referred to as:
A)
virtual merchants.
B)
bricks-and-clicks companies.
C)
catalog merchants.
D)
manufacturer-direct firms.
B
44)
Which of the following is a subscription-based retailer using predictive
marketing and Big Data?
A)
Macy's
B)
Birchbox
C) Dell
D)
Lands' End
B
45)
Virtual merchants face potentially large costs for all of the following except:
A)
building and maintaining a website.
B)
building and maintaining physical stores.
C) building
an order fulfillment infrastructure.
D)
developing a brand name.
B
46) All
of the following statements about Amazon are true except:
A)
Amazon failed to show a profit in 2015.
B)
Amazon Web Services is now a major part of Amazon's business.
C) eBay
can be considered a competitor of Amazon.
D)
Amazon continues to generate revenue primarily by selling products.
A
47) All
of the following are challenges faced by bricks-and-clicks firms except:
A)
coordinating prices across channels.
B)
handling returns of online purchases at retail outlets.
C)
building a credible website.
D)
building a brand name.
D
48) All
of the following are challenges for catalog merchants except:
A) high
costs of printing and mailing.
B)
building a credible website.
C) the
need to bring staff in or manage new technology.
D)
building sophisticated order entry and fulfillment systems.
D
49) The
term supply-push refers to:
A)
making products prior to orders being received based on estimated demand.
B)
waiting for orders to be received before building a product.
C)
channel conflict.
D)
multi-channel manufacturers who sell directly online to consumers.
A
50) All of
the following are examples of the challenges that traditional manufacturers
experience when using the Internet to sell directly to the consumer except:
A)
moving to a demand-pull model.
B) high
cost structures.
C)
developing a fast-response online order and fulfillment system.
D)
channel conflict.
B
51)
Which of the following occurs when retailers of products must compete on price
and currency of inventory directly against the manufacturer?
A)
disintermediation
B)
localization
C)
channel conflict
D)
hypermediation
C
52)
Which of the following has the highest share of online retail sales?
A) omni-channel merchants
B) virtual merchants
C) catalog merchants
D)
manufacturer-direct
B
53)
Which of the following has the second-highest share of online retail sales?
A) omni-channel merchants
B) virtual merchants
C) catalog merchants
D)
manufacturer-direct
A
57) In
the United States, the service sector accounts for approximately ________% of
the United States GDP.
A) 70
B) 75
C) 80
D) 85
C
58) Service
industry groups are categorized generally into two groups, those that provide
transaction brokering and those that involve:
A)
retailing goods.
B)
personalization.
C)
information brokering.
D)
hands-on services.
D
59)
Approximately ________% of the United States labor force is involved in
providing services.
A) 50
B) 60
C) 70
D) 80
D
60)
Which of the following is not an example of a transaction broker?
A) a
stockbroker
B) a
real estate agent
C) an
accountant
D) an
employment agency
C
61) All
of the following services require extensive personalization except:
A)
financial services.
B) legal
services.
C)
medical services.
D)
accounting services.
A
62)
Which of the following best explains why the service sector is a natural avenue
for e-commerce?
A) The
service sector is less geographically reliant and more globally oriented.
B) The
service sector has historically been more technology-reliant.
C) Much of
the value in services is based on the collection, storage, and exchange of
information.
D) It is
not; services are difficult to translate to e-commerce because they rely on
face-to-face communication and barter.
C
63)
Which of the following statements about online banking is not true?
A) Top
mobile banking activities include checking balances and bank statements and
viewing recent transactions.
B)
Online and mobile banking transactions provide significant costs savings for
banks.
C)
Millennials are adopting mobile banking at a much higher rate than those who
are older.
D) More
people use a tablet for mobile banking than a mobile phone.
D
64) In
________, all of a customer's financial (and even nonfinancial) data are pulled
together at a single personalized website.
A)
account aggregation
B) a
financial portal
C)
integrated financial services
D) EBPP
systems
A
65) The
Internet has resulted in lower search costs, increased price comparison, and
lower prices to consumers for which insurance product line?
A) term
life insurance
B)
automobile insurance
C)
health insurance
D)
property and casualty insurance
A
66) All
of the following statements about the online insurance industry are true
except:
A) the
Internet has dramatically changed the insurance industry's value chain.
B)
websites of almost all the major firms provide the ability to obtain an online
quote.
C)
Internet usage has led to a decline in term life insurance prices
industry-wide.
D) the
industry has been very successful in attracting visitors searching for
information
A
67) All
of the following statements about the online real estate services market are
true except:
A) most people
use the Internet to search for a home, but still use the services of a real
estate agent to complete the purchase.
B) real
estate differs from other types of online financial services because it is
impossible to complete a property transaction online.
C) the
primary service offered by real estate sites is a listing of houses available.
D) the
Internet and e-commerce have created significant disintermediation in the real
estate marketplace.
D
68)
Craigslist is a player in which of the following online services markets?
A) real
estate services and career services
B)
insurance services and brokerage services
C)
travel services
D)
online accounting services
A
73)
Which of the following has introduced a tool known as Consumer Alerts to inform
readers when a review is likely to be fraudulent?
A) Yelp
B)
TripAdvisor
C)
Angie's List
D)
TripExpert
A
74) What
is the largest sector of the online travel services market in terms of revenue?
A) hotel
reservations
B) car
reservations
C) cruise/tour reservations
D) airline reservations
D
75)
Which of the following statements is not true?
A) Price
competition among online travel services is difficult as comparison shopping
for better prices is easy.
B)
Online travel services are one of the few sectors in which extensive
disintermediation has occurred.
C) The
ability of travel products and services to be commoditized is a significant
factor in the explosive growth of the online travel services industry.
D) The
online travel services industry has gone through a period of consolidation
B
76)
Expedia owns all of the following except:
A)
Travelocity.
B)
Orbitz.
C)
TripAdvisor.
D)
CheapTickets.
C
78) Which
of these job recruitment sites is not a job listing aggregator?
A)
Indeed
B)
SimplyHired
C)
Glassdoor
D)
CareerBuilder
B
79)
Which of the following is not a major trend in the online recruitment services
industry?
A)
disintermediation
B)
Millennials and GenX primarily use mobile devices to search for jobs.
C)
social recruiting
D)
hiring by algorithm
A
82)
Which of the following is not true about on-demand service firms?
A) The
growth of on-demand service firms is supported by the use of online reputation
systems based on peer review.
B) It is
not likely that on-demand service firms will totally escape government
regulation.
C)
On-demand service firms facilitate access to resources.
D)
On-demand service firms are a totally new phenomenon without precedent in the
history of e-commerce
D
83)
________ is an on-demand service company focused on lodging.
A) Uber
B) Lyft
C)
Airbnb
D) Task
Rabbit
C
84) All of
the following are terms used to describe on-demand service companies except:
A) mesh
economy.
B)
collaborative commerce.
C)
we-commerce.
D)
omni-channel commerce.
D
The
Children's Internet Protection Act (CIPA) has been struck down by the U.S.
Supreme Court as unconstitutional.
Fasle
In the
United States, Google is not required to remove results from its search engine
if requested.
True
The
principle of responsibility means that individuals, organizations, and
societies should be held accountable to others for the consequences of their
actions.
False
The
ethical principle of Universalism states that if an action is not right for all
situations, then it is not right for any situation.
True
Section
230 of the Communications Decency Act (CDA) provides immunity for providers and
users of interactive computer services (such as ISPs and websites) from being
considered a publisher that might be liable for harmful content posted by
others.
True
Which of
the following statements about industry self-regulation regarding privacy is
not true?
The
NAI's privacy policies have established the TRUSTe seal.
Megaupload's
founder, Kim Dotcom, was arrested in connection with which of the following?
copyright
infringement
Which of
the following is not one of the issues complicating the taxation of e-commerce
sales?
Taxes
raised are used for different government purposes.
________
is a tiered notice and response system aimed at reducing copyright infringement
over P2P networks.
The CAS
Which of
the following tools can companies use to trace user statements and views on
newsgroups, chat groups, and other public forums?
search
engines
All of
the following statements about patents are true except:
it is
more difficult to obtain a copyright than it is to obtain a patent.
Which ethical
principle asks you to assume that virtually all tangible and intangible objects
are owned by someone else unless there is a specific declaration otherwise?
No Free
Lunch
Registering
the domain name Faceboik.com with the intent to divert web traffic from people
misspelling Facebook.com is an example of:
typosquatting.
Which of
the FTC's Fair Information Practices (FIP) principles requires opt-in or
opt-out policies to be in place?
choice/consent
Which of
the following is not a major e-commerce public safety and welfare issue?
regulation
of taxation
Which of
the following handles cybersquatting cases under its Uniform Dispute Resolution
procedures?
WIPO
________
is not a privacy advocacy group.
Reputation.com
Which
ethical principle emphasizes putting oneself into the place of others and
thinking of oneself as the object of the decision?
the
golden rule
________
operates the largest private personal database in the world.
Acxiom
Which
case was instrumental in paving the way for Internet business methods patents?
State
Street Bank & Trust Co. v. Signature Financial Group, Inc.
Copyright
protection protects against others copying the underlying ideas in a work.
False
Which
ethical principle asks you to consider the impact of your decision if the
principles underlying your decision became an organizing principle of the
entire society?
the
Social Contract rule
Which of
the following e-commerce technology dimensions has the potential to reduce
cultural diversity in products?
global
reach
Which
ethical principle states that if an action cannot be taken repeatedly, then it
is not right to take at all?
the
slippery slope
According
to data from Pew Research Center, which of the following is the action which
the highest percentage of Internet users has taken to preserve their privacy
online?
cleared
web browser history and cookies
Which of
the following e-commerce technology dimensions creates greater opportunities
for cyberbullying?
social
technology
What is the
first step in analyzing an ethical dilemma?
Identify
and describe the facts.
The
Spokeo case involved a claim for damages based on which of the following?
Fair
Credit Reporting Act
A social
consequence of the richness of Internet information is:
very
persuasive messages might reduce the need for multiple independent sources of
information.
In which
of the following cases did the U.S. Supreme Court rule that basic business
methods cannot be patented?
Alice
Corporation Pty. Ltd. v. CLS Bank International
________
protects original forms of expression in a tangible medium.
Copyright
law
Which of
the following statements about net neutrality is not true?
The FCC
now regulates ISP pricing.
Registering
a domain name similar or identical to trademarks of others to divert web
traffic to their own sites is an example of:
cyberpiracy.
Liability
is a feature of political systems in which a body of law is in place allowing
individuals to recover damages done to them by other actors, systems, or
organizations.
True
The
opt-in model for informed consent requires an affirmative action by the
consumer before a company can collect and use information.
True
Online
gambling is now legal throughout the United States.
False
Most
adult social network participants do not have any expectation of personal
privacy when using a social network.
False
________
allows someone to obtain an exclusive monopoly on the ideas behind an invention
for 20 years.
Patent
law
Amazon
has a patent on:
one-click
purchasing.
How long
does copyright protection extend for corporate-owned works?
95 years
Which of
the following is a core Fair Information Practices (FIP) principle?
Choice/Consent
Which of
the following requires financial institutions to inform consumers of their
privacy policies and permits consumers some control over their records?
Gramm-Leach-Bliley
Act
Which
ethical principle tells you it's wise to assume perfect information markets?
the New
York Times test
Registering
a domain name similar or identical to trademarks of others to extort profits
from legitimate holders is an example of:
cybersquatting.
Which of
the following is not aimed at strengthening the ability of law enforcement
agencies to monitor Internet users without their knowledge?
USA
Freedom Act
________
allow(s) you to send e-mail without a trace.
Anonymous
remailers
The
expansion of generic top-level domains recently authorized by ICANN is likely
to be very disruptive in terms of trademark protection.
True
Net
neutrality refers to the idea that Internet service providers (ISPs), including
cable Internet and wireless carriers, should treat all data on the Internet in
the same manner, and not discriminate or price differentially by content,
protocol, platform, hardware, or application.
True
Which of
the FTC's Fair Information Practices (FIP) principles requires identification
of the collector of data?
Notice/awareness
All of
the following are possible penalties for violating the Digital Millennium
Copyright Act (DMCA) except:
up to
ten years' imprisonment for a first offense.
Which
ethical principle states that, when confronted with an ethical dilemma,
individuals should take the action that achieves the greater value for all of
society?
the
Collective Utilitarian principle
Which of
the following involves bypassing the target site's home page and going directly
to a content page?
deep
linking
Which of
the following situations would not qualify for the fair use exception to U.S.
copyright law?
A
student copies a photograph of his favorite band from a website created by the
band's record label and places it on the student's personal website.
Downloading
a music track owned by a record company without paying for it is an example of
a violation of:
copyright
law
What is
the FTC recommendation regarding choice as it relates to personally
identifiable information (PII)?
Require firms
to have consumers affirmatively opt-in before PII is collected.
Which of
the following is not true about the evolution of Facebook's privacy policies
between 2005 and 2015?
Facebook's
privacy policy became easier to understand.
The
Federal Communications Commission's new privacy rules apply to both broadband
ISPs and websites.
False
What is
the major reason the Internet has such potential for destroying traditional
conceptions and implementations of intellectual property law?
the
ability to make perfect copies of digital works at little cost
Which
ethical principle states that when confronted with an ethical dilemma, an
individual should take the action that produces the least harm, or the least
potential cost?
Risk
Aversion
The
display of a third-party's website or page within your own website is called:
framing
Which of
the following cases involved the issue of keywording?
A
student copies a photograph of his favorite band from a website created by the
band's record label and places it on the student's personal website.
Which of
the following statements about the patent battle between Apple and Samsung is
not true?
The
courts have decided that Apple does not have a valid patent on the iPhone's
user interface.
All of
the following are factors that will be considered in determining whether use of
copyrighted material is "fair use" except the:
free
availability of the work on the Web.
Which of
the following is not one of the four basic principles shared by ethical schools
of thought in western culture?
privacy
Which of
the following statements about the E.U. General Data Protection Regulation
(GDPR) is not true?
The GDPR
eliminates the right to be forgotten.
Disputes
over federal trademarks involve establishing:
infringement
1) All
of the following were popular types of online marketing before 2007 except:
A)
e-mail.
B)
corporate websites.
C)
mobile marketing.
D)
display ads.
C
2) Which
of the following is not true about social marketing?
A) More than
50% of Twitter's ad revenues are generated by desktop users.
B)
Spending on social network advertising grew by a cumulative annual average
growth rate of over 35% between 2015 and 2019.
C)
Social marketing differs markedly from traditional online marketing.
D) In
social marketing, businesses cannot tightly control their brand messaging.
A
3) By
2022, it is estimated that advertisers will be spending which of the following
amounts on mobile marketing?
A) $13
million
B) $130
million
C) $13
billion
D) $130
billion
D
4) In
which year did spending on mobile marketing first exceed the amount spent on
desktop/laptop marketing?
A) 2014
B) 2015
C) 2016
D) 2017
C
5) Both
mobile and social advertising spending are expected to double from 2017 to
2021.
TRUE
6) In
2020, the amount spent on local (digital) marketing is expected to exceed the
amount spent on mobile marketing.
FALSE
8) How
much time a month does the average U.S. adult spend on Facebook?
A) about
7 hours
B) about
10 hours
C) about
17 hours
D) about
27 hours
C
9) Which
of the following attracts a highly educated, professional and managerial
audience?
A)
Snapchat
B)
TikTok
C)
LinkedIn
D)
Instagram
C
10) Which
of the following is the first step in the social marketing process?
A)
community
B)
amplification
C) fan
acquisition
D)
engagement
C
11)
Encouraging users to click a Like button is an example of which step in the
social marketing process?
A) fan
acquisition
B) brand
strength
C)
community
D)
amplification
D
12) Your
Facebook News Feed includes all of the following except:
A)
status updates.
B) app
activity.
C)
Likes.
D)
tweets.
D
13)
Which of the following companies used information from the Facebook pixel
(tracking beacon) on its website and mobile app to create a dynamic ad campaign
with ads delivered in Facebook News Feeds?
A) Lays
B)
Sephora
C)
Lifewtr
D)
Yankee Candle
B
14) Ads that
appear in a Facebook user's News Feed are called:
A)
Marketplace Ads.
B)
Promoted Ads.
C) Page
Post Ads.
D) Brand
Ads.
C
15) In
2020, about how many hours a month are online social network users in the
United States expected to spend, on average, on all social networks combined?
A) 15
B) 20
C) 25
D) 40
D
16)
Which of the following is a history of your actions on Facebook?
A) News
Feed
B)
Timeline
C)
Ticker
D) Open
Graph
B
17)
Sprout Social helped the Chicago Bulls basketball team to improve its social
media presence on all of the following except:
A)
Facebook.
B)
Instagram.
C)
Twitter.
D)
Pinterest.
D
18) All
of the following marketing tools on Facebook require payment except:
A) Brand
Pages.
B)
Facebook Watch.
C) News
Feed Page Post Ads.
D)
Mobile Ads.
A
19) The
ratio of impressions to fans is a measure of:
A)
engagement.
B)
amplification.
C)
community.
D) fan
acquisition.
D
20) Which
of the following Twitter marketing tools provides marketers with a real-time
digital dashboard so they can see tweet activity about a TV show, commercial,
or brand?
A)
Promoted Trends
B)
Amplify
C)
Twitter Cards
D)
Promoted Accounts
B
21)
Which of the following Twitter marketing tools involves a coupon or other
promotional offer that appears in users' Twitter timeline?
A)
Promoted Tweet
B)
Promoted Trend
C)
Promoted Account
D)
Twitter Card
D
22)
Which of the following statements about Pinterest is not true?
A)
Pinned photos and photo boards are available to all Pinterest users.
B) Men
are Pinterest's fastest growing demographic.
C)
Pinterest enables users to integrate their pins into their Facebook News Feeds
and Twitter streams.
D)
Pinterest is the only one of the major social networks that does not accept
paid advertising.
D
23)
Which of the following are features of both Pinterest and Twitter?
A)
tweets
B)
hashtags
C) pins
D) Image
Hover widget
B
24) All of
the following are Pinterest marketing tools except:
A) Brand
pages.
B) Rich
Pins.
C)
Promoted Pins.
D)
Promoted Accounts.
D
25) The
number of people exposed to pins on Pinterest is a measure of which of the
following?
A)
engagement
B)
community
C) brand
strength
D) fan
acquisition
D
26)
Which of the following is an online service specifically aimed at measuring the
impact of Pinterest and other visual social media?
A)
TweetDeck
B)
Curalate
C)
Amplify
D)
Webtrends
B
27)
Which of the following is another term for amplification?
A)
impressions
B) reach
C)
conversation rate
D)
conversion ratio
B
28) All
of the following are examples of dark social except:
A)
e-mail.
B)
tweets.
C) SMS
texts.
D)
instant messages.
B
29) As discussed
in the chapter-opening case, Hubble used all of the following Facebook
marketing tools except:
A)
Facebook brand page.
B)
Facebook News Feed ads
C)
Facebook Live.
D)
Facebook's Lookalike Audience lead generation tool.
C
30)
Which of the following allows Facebook to track user behavior on other sites?
A) Open
Graph
B) Like
button
C)
hashtags
D)
Facebook Watch
B
31)
Which of the following is not true about Page Post Ads displayed in the
Facebook News Feed?
A) They
have a tiny tag indicating that they are sponsored.
B) They
can be liked, shared, and commented on, just like any news feed post.
C) They
cannot contain links.
D) They
have social context.
C
32)
Which of the following is a micro-blogging social network site that allows
users to send and receive 280-character messages, as well as news articles,
photos, and videos?
A)
Facebook
B)
Twitter
C)
Pinterest
D)
Instagram
B
33)
Companies are not permitted to collect personal information from children under
the age of ________ without parental consent.
A) 8
B) 13
C) 15
D) 18
B
34)
Which of the following statements about COPPA is not true?
A) COPPA
is not applicable to Internet of Thing (IoT) devices.
B) COPPA
can only be enforced by the Federal Trade Commission.
C) COPPA
provides that companies are not permitted to use personal information collected
from children under 13 years of age without the verifiable prior consent of
their parents.
D) The
largest fine levied by the FTC under COPPA as of 2020 was against Google and
YouTube.
A
35)
Which of the following is most similar to Pinterest?
A)
LinkedIn
B)
Instagram
C)
YouTube
D)
Tumblr
B
36)
Which social network has been the most effective marketing platform for
ExchangeHunterJumper.com?
A)
Facebook
B)
YouTube
C)
Pinterest
D)
Instagram
A
37)
Which of the following refers to the number of interactions among members of a
group and reflects the 'connectedness' of the group, even if these connections
are forced on users?
A)
engagement
B)
information density
C)
social density
D)
amplification
C
38)
Which of the following refers to those forms of social sharing that occur off
the major social networks, through alternative communication tools?
A) social
density
B) dark
social
C)
amplification
D)
engagement
B
39)
Which of the following is a not a type of Rich Pin?
A)
Product Pin
B)
Instant Pin
C)
Article Pin
D)
Recipe Pin
B
40)
Which of the following statements about Instagram is not true?
A)
Instagram is owned by Facebook.
B)
Instagram's most rapidly growing demographic group is comprised of people under
the age of 35.
C)
Instagram is expected to generate around $16 billion in ad revenues in 2020.
D)
Instagram has over 1 billion users worldwide.
B
41)
Which of the following involves using a variety of tools to encourage users to
interact with content and brand?
A)
social density
B)
engagement
C)
amplification
D) dark
social
B
42)
Which of the following involves using the inherent strength of social networks
to encourage visitors and fans to share their Likes and comments with friends?
A)
social density
B)
engagement
C)
amplification
D) dark
social
C
43) Which
of the following is a Facebook feature that allows app developers to integrate
their apps into the Facebook pages of users who sign up for the app?
A) Graph
Search
B) Like
button
C)
Messenger
D) Open
Graph
D
44)
Influencer marketing is a method of generating customer engagement.
TRUE
45)
Pinterest's Shopping Pins requires a merchant to have a product catalog
uploaded to Pinterest.
TRUE
46)
Facebook does not sell display ads.
FALSE
47)
Brand pages on Facebook typically attract more visitors than a brand's website.
TRUE
48)
Promoted Video is the source of over 60% of Twitter's ad revenue.
TRUE
49)
Pinterest's users are predominantly women.
TRUE
50) In
2020, Millennials and Gen-Zers together represent about 85% of Snapchat's
monthly active U.S. users.
TRUE
51)
TikTok is owned by Facebook
FALSE
56)
Which of the following is not true about mobile marketing?
A) There
is significant overlap between local and mobile marketing.
B) By
2024, spending on mobile marketing is expected to be three times as much as
spending on desktop marketing.
C) A
substantial part of mobile marketing should be counted as social marketing.
D)
People use most of their mobile minutes while they are on the go, outside of
the home.
D
57)
Which of the following is the top app in terms of percentage reach?
A)
YouTube
B)
Instagram
C)
Twitter
D)
Facebook
A
58) On
average, users use about ________ apps a month on their smartphone.
A) 10
B) 15
C) 20
D) 50
C
59)
Which of the following statements about Google is not true?
A)
Google has seven of the top 15 apps in terms of percentage of reach.
B) The
prices Google can charge for mobile ads are higher than what it can charge for
desktop computer ads.
C)
Facebook surpassed Google in mobile advertising revenue for the first time in
2018.
D) About
65 % of all mobile search ad revenue is generated by Google.
B
60)
Which of the following is the most popular use for mobile devices?
A)
shopping
B)
socializing
C)
entertainment
D)
performing tasks, such as finances
C
61)
Which of the following formats generates the second-highest amount of mobile ad
spending revenue?
A)
search engine advertising
B)
display advertising
C) video
advertising
D)
mobile messaging
B
62) People
spend the most time doing which of the following when using a mobile device?
A)
watching videos
B)
interacting on social networks
C)
listening to music
D)
reading news and magazines
C
63)
While using apps, users spend over 90% of the time on just ________ of them.
A) 2
B) 3
C) 4
D) 5
D
64)
Which of the following generates the most mobile ad spending?
A)
display ads
B)
search engine advertising
C) video
ads
D) SMS
text messages
B
65)
Which of the following is not a major provider of mobile display advertising?
A) MoPub
B)
Verizon Media
C) AdMob
D)
Webtrends
D
66)
Which of the following is the leading mobile retailer in the United States?
A)
Walmart
B)
Amazon
C)
Google
D) QVC
B
67) Which
of the following is not a technology for enabling proximity marketing?
A) Lens
Studio
B) NFC
C) BLE
D) QR
codes
A
68)
Which of the following statements about BLE is not true?
A) Only
Apple iPhones can use BLE.
B) BLE
uses less power than traditional Bluetooth or GPS.
C) BLE
has a two-way, push-pull communication capability.
D) BLE
is more accurate than targeting through Wi-Fi triangulation.
A
69)
Which of the following has been a leader in enabling augmented reality for
mobile marketing?
A)
Twitter
B)
Google
C)
Snapchat
D) Apple
C
70)
Traditional retail products and travel services are the source of much of the
current growth in m-commerce.
TRUE
71)
Purchases made on tablet computers are the fastest growing and largest source
of m-commerce revenues.
FALSE
72) SMS
text messaging generates most of mobile marketing spending.
FALSE
76) In
2020, how much are advertisers expected to spend on local-based (local) mobile
marketing?
A) $25
billion
B) $59
billion
C) $92
billion
D) $135
billion
A
77) Which
of the following proximity marketing technologies did Macy's deploy in many of
its retail stores in 2014?
A) QR codes
B) iBeacon
C) E9-1-1
D)
Geo-search
B
78)
Which of the following dominates the local mobile search market?
A)
Twitter
B) Apple
C)
Facebook
D)
Google
D
79)
Apple's iBeacon uses which of the following technologies?
A) BLE
B) NFC
C)
E9-1-1
D) QR
codes
A
80)
Which of the following account for the vast majority of location-based mobile
marketing?
A)
Google and Twitter
B)
Google and Facebook
C)
Facebook and Twitter
D)
Facebook and Instagram
B
81)
Google uses which of the following to build a global database of wireless
access points and their geographic locations?
A)
E9-1-1
B)
Street View cars
C)
iBeacons
D) BLE
B
82) Eddystone
is an open-source standard for beacon technology.
TRUE
83) A
cell phone's GPS is accurate to within five feet of the actual location of the
phone.
FALSE
The
expansion of generic top-level domains recently authorized by ICANN is likely
to be disruptive in terms of trademark protection.
Group of
answer? True or False
True
Safe
harbor provisions of the DMCA were at the heart of which of the following
lawsuits?
-Government
Employees Insurance Company v. Google, Inc.
-a
lawsuit filed by the Authors Guild and five major publishing companies against
Google
-Google,
Inc. v. American Blind & Wallpaper Factory, Inc.
-a
lawsuit brought by Viacom against YouTube and Google
a
lawsuit filed by the Authors Guild and five major publishing companies against
Google
Which
case was instrumental in paving the way for Internet business methods patents?
-Bilski
et al. v. Kappos
-State
Street Bank & Trust Co. v. Signature Financial Group, Inc.
-Alice
Corporation Pty. Ltd. v. CLS Bank International
-Ticketmaster
Corp. v. Tickets.com
State
Street Bank & Trust Co. v. Signature Financial Group, Inc.
A social
consequence of the richness of Internet information is:
-very
persuasive messages might reduce the need for multiple independent sources of
information.
-an
increase in shallowness.
-an
increase in vulnerability to hacking attacks.
-an
increase in the ease of creating misleading information.
very
persuasive messages might reduce the need for multiple independent sources of
information.
"Do
Not Track" falls under which of the following principles in the FTC's new
privacy framework?
-Simplified
Choice
-Scope
-Greater
Transparency
-Privacy
by Design
Simplified
Choice
All of the
following cases involved the doctrine of fair use except:
-Kelly
v. Arriba Soft.
-Perfect
10, Inc. v. Amazon.com, Inc. et al.
-Field
v. Google, Inc.
-Spokeo
v. Robins
Spokeo
v. Robins
Which
ethical principle emphasizes putting oneself into the place of others and
thinking of oneself as the object of the decision?
-the
Social Contract Rule
-the
Golden Rule
-the
Collective Utilitarian principle
-Universalism
the
Golden Rule
Net
neutrality refers to the idea that Internet service providers (ISPs), including
cable Internet and wireless carriers, should treat all data on the Internet in
the same manner, and not discriminate or price differentially by content,
protocol, platform, hardware, or application.
True or
False
True
The
Children's Internet Protection Act (CIPA) has been struck down by the U.S.
Supreme Court as unconstitutional.
True or
False
False
Which of
the FTC's Fair Information Practices (FIP) principles requires opt-in or
opt-out policies to be in place?
-Notice/Awareness
-Choice/Consent
-Access/Participation
-Security
Choice/Consent
All of
the following are required in order for information to be considered a trade
secret except:
-the
owner must have taken steps to protect it.
-it must
be something that others do not know.
-it must
be unique.
-it must
have commercial value to its owner.
it must
be unique.
According
to data from Pew Research Center, which of the following is the action which
the highest percentage of Internet users has taken to preserve their privacy
online?
-posted
comments online anonymously
-used an
anonymous web browsing service
-encrypted
their communications
-cleared
web browser history and cookies
cleared
web browser history and cookies
In the
United States, Google is not required to remove results from its search engine
if requested.
True or
False
True
In which
of the following cases did the U.S. Supreme Court rule that basic business
methods cannot be patented?
-State
Street Bank & Trust v. Signature Financial Group, Inc.
-BMG Rights Management v. Cox Communications
-Bilski et al. v. Kappos
-Alice
Corporation Pty. Ltd. v. CLS Bank International
Alice
Corporation Pty. Ltd. v. CLS Bank International
What is
the FTC recommendation regarding choice as it relates to personally
identifiable information (PII)?
-Require
robust notice only before PII is collected.
-Require
firms to have consumers affirmatively opt-in before PII is collected.
-Require
firms to allow consumers to opt-out before PII is collected.
-Make
collection of PII illegal.
Require
firms to have consumers affirmatively opt-in before PII is collected.
Liability
is a feature of political systems in which a body of law is in place that
permits individuals to recover damages done to them by other actors, systems,
or organizations.
True or
False
True
Which of
the following involves bypassing the target site's home page and going directly
to a content page?
-cybersquatting
-framing
-deep
linking
-metatagging
deep
linking
Which of
the following allows someone to obtain an exclusive monopoly on the ideas
behind an invention for 20 years?
-copyright
law
-patent
law
-trade
secret law
-trademark
law
patent
law
The Day
of Action in July 2017 was a protest to proposed changes in regulations
pertaining to which of the following?
-Net
neutrality
-fantasy
sports
-Internet
sales taxes
-the
online sale of prescription drugs
Net
neutrality
Which
ethical principle states that when confronted with an ethical dilemma, an
individual should take the action that produces the least harm, or the least
potential cost?
-Risk
Aversion
-the
Slippery Slope
-the
Collective Utilitarian principle
-No Free
Lunch
Risk
Aversion
Which
ethical principle states that if an action cannot be taken repeatedly, then
it's not right to take at all?
-the
Social Contract Rule
-the
Golden Rule
-the
Slippery Slope
-Universalism
the
Slippery Slope
The TrustArc
program is an industry-sponsored initiative to encourage websites to be more
transparent about how they use personal information, and to make it more likely
that appropriate ads are shown to users.
True or
False
False
Which of
the following statements about the E.U. General Data Protection Regulation
(GDPR) is not true?
-The
GDPR replaces the E.U.'s existing Data Protection Directive.
-The
GDPR limits the ability of companies to use data for purposes other than those
for which it was collected.
-The
GDPR applies to any firm operating in any E.U. country.
-The
GDPR eliminate the right to be forgotten.
The GDPR
eliminate the right to be forgotten.
Which of
the following tools can companies use to track user statements and views on
newsgroups, chat groups, and other public forums?
-digital
wallets
-cookies
-shopping
carts
-search
engines
search
engines
Registering
a domain name similar or identical to trademarks of others to divert web
traffic to their own sites is an example of:
-metatagging.
-framing.
-cyberpiracy.
-cybersquatting.
cyberpiracy
Which of
the following is not a major e-commerce public safety and welfare issue?
-regulation
of pornography
-regulation
of gambling
-regulation
of cigarette sales
-regulation
of taxation
regulation
of taxation
Which of
the following statements about industry self-regulation regarding privacy is
not true?
-Critics
argue that the most effective form of industry self-regulation to safeguard
privacy are online seal programs that attest to a company's privacy policies.
-The NAI
offers consumers a global opt-out feature to prevent network advertising
agencies from placing cookies on a user's computer.
-The
AdChoices program is an industry-sponsored initiative to encourage websites to
be more transparent about how they use personal information and to make it more
likely that appropriate ads are shown to users.
-Industry
efforts have not so far succeeded in reducing American fears of privacy
invasion.
Critics
argue that the most effective form of industry self-regulation to safeguard
privacy are online seal programs that attest to a company's privacy policies.
Which of
the following is not true about the evolution of Facebook's privacy policies
over the ten-year period from 2005 to 2015?
-Facebook's
privacy policies improved from 2005 to 2009.
-Facebook's
privacy policies have steadily declined since 2009.
-The
amount of information gathered and monitored by Facebook increased.
-Facebook's
privacy policy became easier to understand.
Facebook's
privacy policy became easier to understand.
Most
adult social network participants do not have any expectation of personal
privacy when using a social network.
True or
False
False
Which of
the following protects original forms of expression in a tangible medium?
-trade
secret law
-copyright
law
-patent
law
-trademark
law
copyright
law
Which
ethical principle asks you to consider the impact of your decision if the
principles underlying your decision became an organizing principle of the
entire society?
-the
Golden Rule
-the
Social Contract Rule
-the
Slippery Slope
-Risk
Aversion
the
Social Contract Rule
Which of
the following basic ethical concepts plays an important role in defining
privacy?
-due
process
-accountability
-liability
-responsibility
due
process
Google defended
its Library Project on the grounds of fair use.
True or
False
True
Which of
the following situations would not qualify for the fair use exception to U.S.
copyright law?
-A
journalist quotes a paragraph from a book in a review of the book.
-A
professor clips a newspaper article just before class and distributes copies of
it to his class.
-Google
posts thumbnail images of books in the Google Book Search Project.
-A
student copies a photograph of his favorite band from a website created by the
band's record label and places it on the student's personal website.
A
student copies a photograph of his favorite band from a website created by the
band's record label and places it on the student's personal website.
All of
the following are factors that will be considered in determining whether use of
copyrighted material is "fair use" except the:
-free
availability of the work on the Web.
-nature
of the work used.
-amount
of the work used.
-market
effect of the use.
free
availability of the work on the Web.
All of
the following statements about the Digital Millennium Copyright Act (DMCA) are
true except:
-the
DMCA makes it illegal to circumvent technological measures to protect works.
-the
DMCA requires search engines to block access to infringing sites.
-the
DMCA makes Internet Service Providers (ISPs) responsible and accountable for
hosting websites or providing services to infringers regardless of whether the
ISP is aware of infringement.
-the
DMCA allows libraries to make digital copies of works for internal use only.
the DMCA
makes Internet Service Providers (ISPs) responsible and accountable for hosting
websites or providing services to infringers regardless of whether the ISP is
aware of infringement.
Google
owns which of the following, whose data it can use to create what some refer to
as super profiles?
-TransUnion
Corporation
-DoubleClick
-Experian
-Acxiom
DoubleClick
Which of
the following cases has chipped away at DMCA safe harbor protection?
-Perfect
10, Inc. v. Amazon.com, Inc. et al.
-Alice
Corporation Pty. Ltd. v. CLS Bank International
-Field
v. Google, Inc.
-BMG
Rights Management v. Cox Communications
Field v.
Google, Inc.
Registering
a domain name similar or identical to trademarks of others to extort profits
from legitimate holders is an example of:
-framing.
-cybersquatting.
-cyberpiracy.
-metatagging.
cybersquatting
The
Federal Communications Commission's privacy rules, applicable to broadband
ISPs, were repealed by Congress in 2017.
True or
False
True
Which of
the following e-commerce technology dimensions has the potential to reduce
cultural diversity in products?
-information
density
-interactivity
-ubiquity
-global
reach
global
reach
The
principle of responsibility means that individuals, organizations, and
societies should be held accountable to others for the consequences of their
actions.
True or
False
False
Which of
the following handles cybersquatting cases under its Uniform Dispute Resolution
procedures?
-ICANN
-WIPO
-USPTO
-FTC
WIPO
Which
ethical principle tells you that it is wise to assume perfect information
markets?
-the New
York Times test
-the
Social Contract Rule
-the Collective
Utilitarian principle
-the
Golden Rule
the New
York Times test
Which of
the following e-commerce technology dimensions creates greater opportunities
for cyberbullying?
-social
technology
-ubiquity
-information
density
-interactivity
social
technology
The
ethical principle of Universalism states that if an action is not right for all
situations, then it is not right for any situation.
True or
False
True
Which of
the FTC's Fair Information Practices (FIP) principles requires identification
of the collector of data?
-Notice/Awareness
-Security
-Access/Participation
-Choice/Consent
Notice/Awareness
Section
230 of the Communications Decency Act (CDA) provides immunity for providers and
users of interactive computer services (such as ISPs and websites) from being
considered a publisher that might be liable for harmful content posted by
others.
True or
False
True
Which of
the following is not a privacy advocacy group?
-EPIC
-TIO
-EFF
-CDT
TIO
Which of
the following cases involved the issue of keywording?
-E.
& J. Gallo Winery v. Spider Webs Ltd.
-Ticketmaster
Corp. v. Tickets.com
-Bernina
of America, Inc. v. Fashion Fabrics Int'l, Inc.
-Government
Employees Insurance Company v. Google, Inc.
Government
Employees Insurance Company v. Google, Inc.
Which of
the following technologies allows you to send e-mail without a trace?
-anonymous
surfing
-P3P
-anonymous
remailers
-public
key encryption
anonymous
remailers
Which of
the following features of e-commerce technology can result in work and shopping
invading family life?
-interactivity
-global
reach
-ubiquity
-information
density
ubiquity
Which of
the following can be used to record all keyboard activity of a user?
-DRM
-trusted
computing environments
-shopping
carts
-spyware
spyware
The
opt-in model for informed consent requires an affirmative action by the
consumer before a company can collect and use information.
True or
False
True
Which of
the following requires financial institutions to inform consumers of their
privacy policies and permits consumers some control over their records?
-Freedom
of Information Act
-COPPA
-Gramm-Leach-Bliley
Act
-HIPAA
Gramm-Leach-Bliley
Act
Which of
the following is not one of the four basic principles shared by ethical schools
of thought in western culture?
-responsibility
-liability
-accountability
-privacy
privacy
Disputes
over federal trademarks involve establishing:
-underlying
ideas.
-infringement.
-piracy.
-intent.
infringement
All of
the following are possible penalties for violating the Digital Millennium
Copyright Act (DMCA) except:
-fines
up to $1 million for a repeat offense.
-restitution
to the injured parties for any losses due to infringement.
-fines
up to $500,000 for a first offense.
-up to
ten years imprisonment for a first offense.
up to
ten years imprisonment for a first offense.
Registering
the domain name Faceboik.com with the intent to divert web traffic from people
misspelling Facebook.com is an example of:
-cybersquatting.
-metatagging.
-linking.
-typosquatting.
typosquatting
Online
gambling is now legal throughout the United States.
True or
False
False
What is the
major reason why the Internet has such potential for destroying traditional
conceptions and implementations of intellectual property law?
-the use
of standards for file formats
-the
ability to make perfect copies of digital works at little cost
-the
anonymous nature of the Internet
-the
support for instant peer-to-peer communication
the
ability to make perfect copies of digital works at little cost
The
Spokeo case involved a claim for damages based on which of the following?
-Anticybersquatting
Consumer Protection Act
-Fair
Credit Reporting Act
-Digital
Millennium Copyright Act
-Defend
Trade Secrets Act
Fair
Credit Reporting Act
All of
the following statements about patents are true except:
-it is
more difficult to obtain a copyright than it is to obtain a patent.
-computer
programs can be patented.
-in
order to be patented, an invention must be nonobvious.
-the
four types of inventions protected by patent law are machines, manmade
products, compositions of matter, and processing methods.
it is
more difficult to obtain a copyright than it is to obtain a patent.
Copyright
protection protects against others copying the underlying ideas in a work.
True or
False
False
Which of
the following is not aimed at strengthening the ability of law enforcement
agencies to monitor Internet users without their knowledge?
-USA
PATRIOT Act
-Communications
Assistance for Law Enforcement Act
-Homeland
Security Act
-USA
Freedom Act
USA
Freedom Act
Downloading
a music track owned by a record company without paying for it is an example of
a violation of:
-copyright
law.
-privacy
law.
-trademark
law.
-patent
law.
copyright
law.
Which of
the following is considered one of the most contentious e-commerce patents?
-patent
on one-click purchasing
-patent
on streaming video media transmission
-Google's
PageRank patent
-patent
on buyer-driven name your price tools
patent
on one-click purchasing
Which
ethical principle asks you to assume that virtually all tangible and intangible
objects are owned by someone else unless there is a specific declaration
otherwise?
-the
Golden Rule
-the
Slippery Slope
-No Free
Lunch
-the
Social Contract Rule
No Free
Lunch
What is
the first step in analyzing an ethical dilemma?
-Identify
the options you can reasonably take.
-Identify
and describe the facts.
-Identify
the potential consequences of your opinions.
-Define
the conflict or dilemma and identify the higher-order values involved.
Identify
and describe the facts.
Which of
the following is a core Fair Information Practices (FIP) principle?
-Security
-Enforcement
-Choice/Consent
-Access/Participation
Choice/Consent
Which ethical
principle states that, when confronted with an ethical dilemma, individuals
should take the action that achieves the greater value for all of society?
-Risk
Aversion
-the
Golden Rule
-the
Social Contract Rule
-the
Collective Utilitarian principle
the
Collective Utilitarian principle
Which of
the following is not one of the issues complicating the taxation of e-commerce
sales?
-Taxes
raised are used for different government purposes.
-Small
online businesses are unable to manage sales taxes to thousands of different
jurisdictions.
-Sales
taxes and policies vary by state and country.
-Retailers
are only legally required to charge sales tax if they have operations located
in the same state as a consumer.
Taxes
raised are used for different government purposes.
The
display of a third-party's website or page within your own website is called:
-metatagging.
-cybersquatting.
-framing.
-deep
linking.
framing
一、選擇題
第六章
( BCD
)1.在電子商務領域中,智慧財產權主要包括下列哪些?(複選)
(A)隱私權(B)著作權(C)專利權(D)商標權
( BCD
)2.智慧財產權的保護目標,主要在保護下列哪些權利?(複選)
(A)隱私權(B)著作權(C)專利權(D)商標權
( ABC
)3.下列哪些是常見的網路犯罪?(複選)
(A)網路販賣盜版光碟(B)網路販賣贓物
(C)入侵他人網站(D)散發電腦病毒
( A )4.智慧財產權法想要保護的是下列何者?(單選)
(A)人類腦力辛勤創作的結晶(C)商業利益
(B)商業機密(D)一般人知的權利
( D )5.任何能用來識別、找出或聯絡個人的資料,稱為?(單選)
(A)會員資訊(B)使用資訊
(C)匿名資訊(D)個人可識別資訊
( ACD
)6.有關網路禮儀,下列哪些正確?(複選)
(A)電腦禮儀的基本原則是「尊重」
(B)雖是未經證實的消息,也要先讓大家知道
(C)轉載別人的文章時,最好註明出處
(D)最好取得原作者的同意後再進行轉載
( D )7.擅自拷貝網站會員個人資料檔的行為可能觸犯下列哪一項法律?(單選)
(A)商標法(B)隱私權法
(C)消費者保護法(D)電腦處理個人資料保護法
( B )8.下列何者不受著作權法的保護?(單選)
(A)三歲小孩的畫作(B)中華民國憲法
(C)學校的試題(D)學校的網頁
( A )9.在網路上專門入侵別人電腦,加以破壞或竊取資料,這些人被稱為?(單選)
(A)駭客(B)網路專家
(C)釣客(D)網路作家
( C )10.網友對於電子商務網站隱私權保護的評估方式,下列哪一項最沒有切身關係?(單選)
(A)可否應當事人的要求,停用該當事人的會員資料
(B)網站是否標示個人資料的使用目的
(C)網站是否提供線上購物的服務
(D)網站未經本人同意,是否會將個人資料轉讓給第三者
第七章
( A )1. 下列何者非企業電子化的主要應用範圍?(單選)
(A)六個標準差 (B) SCM (C)CRM(D) ERP
( A )2.一年一度的同學會又到了,為了以防萬一,柔柔立刻打開家中的桌上型電腦,上EZTABLE網站將餐廳訂好。請悶這個動作是屬於下列哪一個概念的範疇?(單選)
(A)電子商務(B)產業電子化(C)企業電子化(D)行動商務
( A )3.義房屋在業務員專屬的行動通訊設備裝上可以主動提醒和個人秘書的設定功能,而口要在無線網路的建結下,業務員便可以隨時隨地連上公司的系統,節省報表往返,提高銷售成交的機率。請問這套系統較符合下列何種概念?(單選)
(A)企業資源規劃 (B)顧客關係管理(C)供應鏈管理(D)知識管理
( D )4.小駱是個很認真的保險業務員,每當拜訪舊顧客時,總會拿出顧客從前留下的資料加以研讀,藉此提供最符合顧客需求的保險建議。請問這是屬於下列何種概念?(單選)
(A)企業資源規劃(B) 知識管理(C)商業智慧(D) 顧客關係管理
( D )5.中華汽車為了提高公司的競爭力而導入系統建立個人知識平台並與工作管理系統進行結合,經由工作社群網路來建立不同的知識社群,進而發展出團隊的作業模式與規範。請問這套系統是?(單選)
(A)企業資源規劃(B)顧客關係管理(C)商業智慧(D)知識管理
( C )6.超市主管常常會以線上分析處理工具來分析消費者的消費習慣,最後再透過決策支援系統訂出最佳化的銷售策略。這是屬於下列哪一個概念的應用?(單選)
(A)企業資源規劃(B)知識管理(C)商業智慧(D) 顧客關係管理
( B )7.自2009年以來,便利商店紛紛提供電子化票券的服務,涵蓋遊樂園,交通,展覽等,將訂票的流程簡化,並利用促銷的方法吸引消費者接受與採用,像在ibon購票,憑票根就有買咖啡的優惠。請問上述是屬於企業電子化的哪一個策略?(單選)
(A)目標市場的選擇(B)創新產業的形成
(C)聯盟夥伴的成立(D)企業需求的了解
( C )8.漢神百貨與Yahoo!奇摩拍賣合作以進軍網路商城市場,這是屬於企業電子化的哪一個策略?(單選)
(A)目標市場的選擇(B)創新產業的形成
(C)聯盟夥伴的成立(D)企業需求的了解
( A )9.統一超商導入銷售時點系統(POS),藉此系統來即時記錄顧客購買的產品,時間、年齡等資訊,以改善傳統人工記錄的不便,並提供管理者在制定決策時的參考。請問上述是屬於企業電子化帶來的何種效益?(單選)
(A)流程技術的改革(B)顧客關係的發展
(C)知識創新的提升(D)銷售管道的創立
( D )10.
PChome Online商店街推出後,強打免上架費、免月租與手續費打折等優惠,讓許多網拍業者達成開店的夢想,這是屬於企業電子化帶來的何種效益?(單選)
(A)流程技術的改革(B)顧客關係的發展(C)知識創新的提升(D)銷售管道的創立
第八章
( C )1.下列敘述何者錯誤?(單選)
(A)供應鏈是指從製造產品的原料、原物料、半成品,到製成品送至消費者手中的過程,包括供應商、製造商、配銷商、物流商等不同的企業,以處理產品由原物料到運送至消費者手中所需解決的金流,物流等問題
(B)供應鏈導源於流通,原指軍方的後勤補給活動,隨著商業的蓮勃發展,逐漸推廣應用到商業活動上,其泛指能夠滿足消費者需求的產品流通過程,包括上,下游相關廠商都可納入供應鏈的範疇中
(C)供應鏈管理是指企業在供應鏈中和其他相關企業在訂單取得、原物料的購置、製成品的儲存與運送、到產品的銷售、售後服務或是銷售資訊等各活動進行管理與相互依存,而產生縮短企業之結果
(D)供應鏈管理具有協同整合、非核心業務外包、減少長鞭效應和即時、最佳化四種特性
( D )2.供應鍵管理的工具包括下列何者?(單選)
(A)電子資料交換(B)企業資源規劃
(C)供應鏈管理工具(D)以上皆是
( A )3.供應鏈管理是透過下列何者的協助,讓供應鏈成員間能有效整合,減少供應鏈體至。源的浪費與重複,並藉由緊密的結合來提升供應鏈的績效與服務水準,以增加各企業的競爭力?(單選)
(A) 資訊科技(B)物流管理
(C)運籌管理(D)行銷管理
( B )4.
ZARA在全球有數個趨勢記錄與預測的機構,以掌握衣服流行的趨勢變化,其將資料上傳至總部後,設計中心,生產中心,工廠等可從該資料庫中存取其所需的資訊,以縮短生產的製程時間。請問這是屬於供應鏈管理的何種特色?(單選)
(A)減少長鞭效應(B)協同整合
(C)非核心業務外包(D)洞察消費需求
( B )5.以下何者為供應鏈管理的發展流程?(單選)
(A)物流管理階段→運籌管理階段→單一企業階段→供應鏈管理階段
(B)單一企業階段→物流管理階段→運籌管理階段→供應鏈管理階段
(C)供應鏈管理階段→單一企業階段→物流管理階段→運籌管理階段
(D)運籌管理階段→單一企業管理階段→物流管理階段→供應鏈管理階段
( C )6.供應商數目多,以增加競爭與分散風險,是下列哪一種管理的特色?(單選)
(A)行銷管理(B)供應鏈管理
(C)運籌管理(D)財務管理
( A )7.以下何者為推式基礎的供應鏈流程?(單選)
(A)零售商依據以往顧客訂單來預測需求→製造商依據以往零售商訂單來預測需求
→顧客下單→零售商下單→出貨
(B)顧客下單→製造商生產→零售商下單→出貨
(C)顧客下單→零售商下單→製造商生產→出貨
(D)製造商生產→零售商生產→顧客下單→出貨
( B )8.博客來網路書店面對需求量不高的冷門書籍,大多是採接單後才向書商訂書,藉此降任本身的庫存成本。請問博客來網路書店是屬於何種供應鏈?(單選)
(A)推式基礎的供應鏈(B)拉式基礎的供應鏈
(C)推式+拉式基礎的供應鏈(D)垂直式基礎的供應鏈
( D )9.造成長鞭效應現象的原因有?(單選)
(A)安全存量的設立(B)批次訂購的行為
(C)價格變動的預期(D)以上皆是
( D )10.供應鏈成員的充分合作,將整體供應鏈整合成單一虛擬企業,共同制定供應鏈生產的策略、數量和其他的內容,以解決長鞭效應所造成需求變動的問題。這是屬於解決長鞭效應的哪種面向?(單選)
(A)企業溝通面(B)資訊分享面
(C)顧客需求面(D)供應鏈整合面
第九章
( B )1.顧客關係管理是透過下列何種循環來執行?(單選)
(A)策略、蒐集、互動、區隔
(B)蒐集、區隔、策略、互動
(C)互動、策略、蒐集、區隔
(D)區隔、蒐集、策略、互動
( C )2.下列何者為顧客關係管理主要的行銷模式?(單選)
(A)營業額,獲利數字為衡量績效指標
(B)顧客是可以取代的
(C)儘可能將每一件商品賣給每一位顧客,以取得顧客對企業的終身價值及最大效益
(D)以部門為行銷分界點,致使行銷、業務、客服部門接收到不同的資訊
( D )3.以下何者可稱為忠誠顧客?(單選)
(A)使用後非常滿意者(B)再次購買者
(C)不但自己購買還推薦給他人(D)以上皆是
( C )4.下列哪一個屬於資料蒐集技術?(單選)
(A)線上分析處理(B)決策支援系統(C)電話客服中心(D)以上皆是
( D )5.只要麥當勞提出「晚餐找個伴,第二套半價」的促銷方案時,阿光就會想要找人去消費,請問阿光是屬於Peppers&Rogers顧客分類的哪一類?(單選)
(A)最具價值的顧客(B)不具開發價值的顧客
(C)會推薦他人的顧客(D)最具成長潛力カ的顧客
( D )6.下列何者非人工智慧的等級?(單選)
(A)自動控制(B)推論應用
(C)主動學習(D)推薦他人
( D )7.「泛指機器能自行學習,利用分析各資料料的特微來學習,不需要透過人類的設定就能完成」,請問這是指人工智慧的哪個等級?(單選)
(A)自動控制(B)推論應用
(C)主動學習(D)深度學習
( B )8.「能將數據進行分類,像是企業可依據客戶價值不同進行分類:最具價值的顧客,最具成長潛力的顧客,不具開發價值的顧客等」,請問這是指人工智慧發展的哪個步驟?(單選)
(A)數據的蒐集階段(B)數據的分類階段
(C)模型的建立階段(D)預測的執行階段
第十章
( A )1.企業透過程式記錄下所有能夠觀察到的事情,從網路使用者進入網頁的網址、
點選的項目、停留時間、消費的狀況等,並存放在數據庫中,做為後續分析的基本素材。這是指下列何者?(單選)
(A)數據(B)資訊(D)知識(C)技術
( C )2.先設定某些分析的模式,再利用統計、分析、匯整等動作以區分出有意義的資訊。這是屬於資訊分析工具的哪一種?(單選)
(A)分類(B)文字化(C)計算(D)精縮
( D )3.意指資料整理、匯整分析後的資訊,找出適合使用的部分,並且加入提要以供索引使用。這是屬於資訊分析工具的哪一種?(單選)
(A)分類(B)文字化(C)計算(D)精縮
( B )4.下列何者不是知識管理的本質?(單選)
(A)知識資訊化(B)知識數據化(C)知識分享化(D)知識價值化
( A )5.知識的開發、整理、利用之過程,能發掘出新的知識以創造出更高的價值。
這是屬於知識管理本質的哪一個?(單選)
(A)知識價值化(B)知識分享化(C)知識數據化(D)知識資訊化
( C )6.以最低成本、最少人力來完成工作,主要的義涵為避免浪費。這是屬於下列哪一種生產方式?(單選)
(A)福特式生產(B)大量生產(C)豐田式生產(D)泰勒式生產
( A )7.知識管理發展的沿革為下列何者?(單選)
(A)泰勒時期→豐田式生產→知識型企業
(B)知識型企業→泰勒時期一豐田式生產
(C)豐田式生產→泰勒時期→知識型企業
(D)標準化生產→福特式生產→知識型企業
( B )8.知識管理的程序為何?(單)
(A)知識的吸收→知識的累積→知識的創造→知識的擴散
(B)知識的吸收→知識的創造→知識的累積→知識的擴散
(C)知識的創造→知識的累積→知識的吸收→知識的擴散
(D)知識的擴散→知識的累積→知識的吸收→知識的創造
( D )9.泛指企業將外在知識轉化為內在知識的能力,針對外在資訊,企業須思考如何透過學習,內化與應用過程,將其轉化為企業本身已經學得的內在知識。這是指?(單選)
(A)知識創造能力(B)知識累積能力(C)知識擴散能力(D)知識吸收能力
( B )10.主要是由經驗獲得,較無法訴諸者語言,需經由適當的方式來進行分享(外顯化),並透過知識庫來儲存與分享,而這也是知識創造過程中最為關鍵的一步。這是指?(單選)
(A) 創造觀念(B)分享內隱知識(C)確認觀念(D)跨層次的知識擴展
二、 問答題
1 智慧財產的範疇?
著作權、專利權、商標權、網域名稱權。
2 說明什麼是長鞭效應?
顧客需求變動時可能產生預測不當,而鈔成過多存貨或缺貨的問題。
無法反應需求、產生訂單變異、存在心理預期
3
3.1 什麼叫做企業資源規劃 (ERP)?
將企業製造、財務、行銷及其他相關功能達成平衡的應用軟體,
整合性、完體性與自動化規劃企業資源的方式,以顧客導向為出發點
3.2 對內、對外有什麼效處?
對內整合組織內部資源,對外則結合主要的顧客與合作廠商。
4 商業智慧 (BI)跟企業資源規劃 (ERP)有什麼不同?
ERP 系統主要為管理和整合重要業務流程(如製造、庫存管理、財務、供應鍊等)的流程管理軟體。
而BI 進一步處理這些數據,組織並分析與公司相關的所有資訊,以產出可執行的建議。
5
5.1 什麼是供應鏈管理 (CSM)?
透過資訊科技的協助,讓供應鏈成員間能有效整合,減少供應鏈體系資源的浪費與重複,並藉由緊密的結合來提升供應鏈的績效與服務水準,以增加各企業的競爭力。
5.2 請畫出SCOR流程類型模型
6
6.1 什麼叫做顧客關係管理 (CRM)的精神?
協助企業在有限的資源下,利用適當的分析工具找出最有價值的顧客,進而提出行銷活動來促進其產生購買的行為。
6.2 忠誠顧客分成哪三種層次?
使用後非常滿意者、會再次購買者、不但自己購買還會推薦他人使用者