5/18/2024


Correct Answers 0
Total Questions 50
Score 0 %
Course # 571002
Electronic Commerce : Applications for Cyberspace
based on the electronic .pdf file(s):

Electronic Commerce : Applications for Cyberspace Technology
by: Dr. Jae K. Shim, Ph.D., 2009, 147 pages


10 CPE Credit Hours
Technology & Operations

A P E X C P E . C O M  . . . . .  1.877.317.9047  . . . . .  support@apexcpe.com


Chapter 1 - Growth Of E-Commerce

1.    Which of the following is not true about e-commerce?   1
Involves the buying, selling, marketing and servicing of products, services, and information over a variety of computer networks.
Is just customer-to-business (C2B).
Uses the Internet, intranets, and extranets, and other networks to support every step of the commercial process like multimedia advertising, product information, and customer support on the Web.
Involves Internet security and payment mechanisms that ensure completion of delivery and payment processes.
2.    The objectives of EC do not include   2
Shorter manufacturing time,
Faster customer response,
Longer product cycles.
Better service quality,
3.    In the internetworked E-business enterprise, an extranet refers to:   2
A network inside the enterprise.
A network between an enterprise and its trading partners.
A local area network within the enterprise.
A wide area network within the enterprise.
4.    In an electronic payment system the bill is sent to the customer by:   4
By regular mail.
By phone.
Electronically.
By satellite.
5.    Telecommunication companies include all except:   6
Wireless.
ESP.
Satellite.
Cable-TV.
6.    M-commerce relies on the use of wireless communications to allow managers and corporations to place orders and conduct business using handheld computers, portable phones, laptop computers connected to a network, and other mobile devices. T F   6
TRUE
FALSE


Chapter 2 - The World Wide Web

7.    There are three basic categories of electronic commerce applications: business-to-consumer, business-to-business, and consumer-to-consumer. In B2C applications, companies may offer:   9
Attractive electronic marketplaces to entice and sell products and services to consumers.
Both electronic business marketplaces and direct market links between businesses.
Online auctions, where consumers and businesses can buy and sell with each other in an auction process at an auction website.
Electronic personal advertising of products or services to buy or sell by consumers at places such as consumer e-commerce portals, or personal websites..
8.    Which of the following is true about Business-to-Business (B2B) e-Commerce?   9
Companies may offer secure electronic payment systems.
This category of electronic commerce involves both electronic business marketplaces and direct market links between businesses.
Companies may offer online consumer or business auctions.
Companies may offer online customer support.
9.    In C2C applications:   9
Businesses must develop attractive electronic marketplaces to entice and sell products and services to consumers.
Companies may offer both electronic business marketplaces and direct market links between businesses.
Companies may offer online auctions, where consumers and businesses can buy and sell with each other in an auction process at an auction website.
Companies may offer electronic data interchange (EDI) via the Internet or extranets.
10.    ______________________ is not a resource that e-commerce systems rely on.   9
Internet.
Fin-net.
Intranets.
Extranets.
11.    ________________ is not an Internet computer suffix.   12
.Dot.
.Net.
.Org.
.Com.
12.    Most e-commerce applications are ________________ systems that respond to a multitude of events – from a new customer's first website access, to payment and delivery processes, and to innumerable customer relationship and supply chain management activities.   15
Knowledge management based.
Groupware.
Event-driven.
Workflow based.
13.    ______________________ was the ancestor of the Internet. It was developed by the U.S. Department of Defense.   11
Linux.
Internet toaster.
Intranet.
Web.
14.    ___________________ is not a Web browser.   23
Google.
Internet Explorer.
Mozilla.
Netscape.


Chapter 3 - The Access Provider Industry

15.    Typical electronic applications include all except:   30
Shopping for merchandise.
Paying for goods and services.
Delivery of white goods.
Online financial services.
16.    __________________ relationship management occurs when a firm obtains detailed information about a customer's behavior, preferences, needs, and buying patterns and uses that information to set prices, negotiate terms, tailor promotions, add product features, and otherwise customize its entire relationship with that customer.   30
Technology-enabled
Product-based
Communication-enabled
Relationship-based
17.    Which of the following will never lend themselves to electronic commerce?   32
Greeting cards
Books
Perishable foods
Cigars
18.    ___________________ is not used for online security.   34
Secure server lockout system.
Fiber busters.
Firewalls.
Encryption.


Chapter 4 - Intranets And Extranets

19.    Which is the standard page description language for Web pages?   38
Home pages language.
Hypertext Markup Language (HTML).
Hypermedia language.
Java.
20.    A(n) ___________________ is used to connect users to databases.   40
HTML.
CGI.
HTTP.
ISDN.
21.    An internal organizational Internet that is guarded against outside access by a firewall is a(n):   36
Extranet.
Intranet.
Private Internet.
Dedicated Internet.
22.    Popular business uses of the Intranet include: A. B. C. D.   38
Electronic discussion forums and bulletin board systems.
Downloading software and information files and accessing databases.
Furnishing outside CPAs with accounting, audit, and tax information.
Gathering information by performing online searches using web browsers and search engines.
23.    A secure network that uses the Internet as its main backbone network to connect the intranets of a company's different locations, or to establish extranet links between a company and its customers, suppliers, and other business partners is called a(n):   36
Intranet.
Extranet.
Virtual private network.
Client/server network
24.    The benefits of Intranets do not include:   49
Difficult to navigate.
Inexpensive to start.
Open platform architecture (large number of add-on application).
Uses computing resources more effectively.


Chapter 5 - Marketing And Advertising

25.    Advertising is used to accomplish the following goals except for:   56
To encourage entry by potential competitors.
To inform customers.
To increase demand.
To increase or decrease demand elasticity.
26.    Which one of the following is not a form of search-related advertising spending on the Internet?   58
Paid listings.
Beta testing.
Paid inclusion.
Search engine optimization.
27.    __________________ are bits of information stored on a client computer.   64
ASPs.
Web services.
Cookies.
Dynamic catalogs


Chapter 6 - EDI

28.    __________________________ is a set of standards for structuring information that is to be electronically exchanged between and within businesses, organizations, government entities and other groups, including inventory data.   72
Electronic mail.
Gmail.
Electronic data interchange.
Firewall.
29.    EDI should be viewed as:   74
A strategic business tool.
A trading partner.
An analog decision tool.
A transformation tool.
30.    The factors affecting data flow in the EDI system do not include:   77
EDI standards and conventions.
Size of Extranet
Translation software.
Communication structure.
31.    Extensible Markup Language (XML) does not have   79
A start tag,
Middle tag.
Data,
End tag..


Chapter 7 - Electronic Banking

32.    _____________ cards are by far the most popular form of consumer electronic payment online.   85
Scrip.
Internet.
Credit.
Smart
33.    Which of the following has the advantages of being independent and portable?   94
Electronic cash.
Electronic check.
Credit card.
Paper check.
34.    Internet payments for items costing from a few cents to approximately a dollar are called __________________.   97
Minipayments.
Minitransactions.
Micropayments.
Microtransactions.


Chapter 8 - Network Security

35.    Which of the statements is false regarding password policy?   100
Passwords often do not provide adequate protection.
People generally don't select good passwords or change them frequently enough.
Passwords should be written down.
Passwords should be easy to remember.
36.    ______________ includes the ability to infect the system with a virus or plant Trojan horses or back-doors.   99
Denial of service
Write access
Read access
Random access
37.    An attacker that is able to read or copy confidential information has:   99
Random access.
Read access.
Denial of service.
Write access.
38.    The Security Analyst Tool for auditing networks is known as:   121
Safety.
SATAN.
Security.
Signature.
39.    _____________ is not a tool used to implement the security plan:   100
Encryption tools.
Route filtering.
Firewalls.
Powerpoint.
40.    A program that replicates itself but does not infect other programs is a:   104
Trojan horse
Worm
Dropper
Bomb
41.    ________________ is software that is installed onto your computer, usually without your knowledge, to record your online activity for third parties.   104
Viruses and worms
Pop-up window
Spyware
Phishing
42.    Which one of the following is not a common type of network topologies:   118
Hierarchical topology (tree structure).
Horizontal topology (or bus topology).
Physical topology (surface elevations).
Star topology (data communication).
43.    ____________________________ is not a way to reduce risk related to software bugs   118
Keeping up-to-date on software fix patches.
Allowing Internet users to run CGI or other executable programs on the web server.
Using products that are well known.
Running only necessary services.


Chapter 9 - Taxation Of E-Commerce

44.    A(n) __________________ statement is a statement that is false and that injures the reputation of another person or company.   127
Defamatory.
Deceptive.
Fraudulent.
Critical.
45.    ______________________ are levied on the products or services that the company sells or uses.   129
Property taxes.
Income taxes.
Transaction taxes.
Patent.


Chapter 10 - Assurance Services

46.    Assurance services for electronic commerce do not include:   130
American Institute of CPA's.
AAA.
CPA Web trust.
SysTrust.
47.    To become Web trust certified the CPA should have competence in the following areas except:   133
Firewalls.
Communication protocol.
ABC software
Hardware security devices


Chapter 11 - Establishing a Presence on the Web and Business Online Strategies

48.    Domain names for entities located outside North America end in:   138
.com (three letters).
.ko (two letters).
.gov (three letters).
.edu (three letters).
49.    Building an e-commerce website can be done in a number of ways. A small company with limited capital may choose which of the following as a cost effective alternative?   139
Use simple website design software tools and predesigned templates provided by website hosting services.
Use in house software developers.
Hire outside website development contractors to build a custom-designed e-commerce site.
Contract with their ISP (Internet Service Provider) or a specialized Web hosting company to operate and maintain the B2C website.
50.    Apply one of the key e-commerce success factors of retailing on the Web to the following statement: “A company's prices don't have to be the lowest on the Web if they build a reputation for high quality, guaranteed satisfaction, and top customer support while shopping and after the sale.”   141
Performance and service efficiency.
Selection and value.
Offering incentives to purchase.
Security.


Chapter 11 - Establishing a Presence on the Web and Business Online Strategies

48.    Domain names for entities located outside North America end in:   138
.com (three letters).
.ko (two letters).
.gov (three letters).
.edu (three letters).
49.    Building an e-commerce website can be done in a number of ways. A small company with limited capital may choose which of the following as a cost effective alternative?   139
Use simple website design software tools and predesigned templates provided by website hosting services.
Use in house software developers.
Hire outside website development contractors to build a custom-designed e-commerce site.
Contract with their ISP (Internet Service Provider) or a specialized Web hosting company to operate and maintain the B2C website.
50.    Apply one of the key e-commerce success factors of retailing on the Web to the following statement: “A company's prices don't have to be the lowest on the Web if they build a reputation for high quality, guaranteed satisfaction, and top customer support while shopping and after the sale.”   141
Performance and service efficiency.
Selection and value.
Offering incentives to purchase.
Security.

COPYRIGHT 2002-2009    Apex CPE - ALL RIGHTS RESERVED