ch19 - Chapter 19 The Ethics of Electronic Marketing h Test...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 19 The Ethics of Electronic Marketing h Test Bank 1. It is perfectly acceptable to e-mail customers unsolicited information (“spam”) as long as you use a mailing list. A. True B. False Answer: B Page: 384 2. All of the following are good ways to help build your mailing lists except A. providing a check box so the customer can choose whether or not to be a part of the list. B. asking current customers to provide you with a list of people that you can e-mail. C. selling or trading your lists with other marketers. D. asking current customers to forward information to others who may be interested. E. providing consumers with a way to unsubscribe from the list. Answer: C Page: 385 3. Intranets are private networks that can be accessed by the Internet. They require protection from viruses and hackers. This is done with a(n) A. Internet wall. B. firewall. C. privacy wall. D. notice for hackers to “Stay Away!” E. hope that nothing bad will happen. Answer: B Page: 387 4. Firewalls can be implemented A. by network administrators in hardware only B. by network administrators in software only C. to protect private networks connected to the Internet D. by consumers who access the sites E. by the FCC. Answer: C Page: 387 5. International trade embargoes do not apply to business conducted on the Internet. A. True B. False Answer: B Page: 387
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
16    Electronic Marketing 6. Seventy percent of the complaints on the 1998 roster of Net fraud records compiled by the National Consumers League were against A. Web auctions. B. sites which did not validate a customer's identity. C. governmental sites. D. retail sites. E. sites which present X-rated material. Answer: A Page: 388 7. The S.A.F.E. program developed by CyberQuest A. validates users' identities on the Internet. B. prevents minors from accessing violent or pornographic sites. C. tracks hackers on the internet. D.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 6

ch19 - Chapter 19 The Ethics of Electronic Marketing h Test...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online