A.e-procurement marketplaceB.e-distributorsC.industry consortiaD.independent exchangesView answerCorrect answer: (B)e-distributors137.When preparing a website, designers should ensure that the site enables user-to-usercommunication. This design feature is known as ______________.A.contextB.communityC.commerceD.connectionView answerCorrect answer: (B)community138.The idealistic market envisioned at the outset of the development of e-commerce is calleda ______________.A.Bailey marketB.Baxter marketC.Bergman marketD.Bertrand marketView answerCorrect answer: (D)Bertrand market139.Which of the following is not a key element of a business model?A.value propositionB.competitive advantageC.market strategyD.universal standardsView answerCorrect answer: (D)universal standards140.The area of actual or potential commercial value in which a company intends to operate isa ______________.A.market spaceB.marketplace
C.perfect marketD.Bertrand marketView answerCorrect answer: (A)market space141.In 1961, ______________ published a paper on "packet switching" networks.A.Leonard KleinrockB.Ray TomlinsonC.Bob MetcalfeD.Vint CerfView answerCorrect answer: (A)Leonard Kleinrock142.All of the following are goals of Internet2 except ______________.A.Creating a leading-edge very high-speed network capability for the national researchcommunityB.Eliminating censorship from the InternetC.Enabling revolutionary Internet applicationsD.Ensuring the rapid transfer of new network services and applications to the broaderInternet community.View answerCorrect answer: (B)Eliminating censorship from the Internet143.Which of the following was the first commercial Web browser?A.MosaicB.MozillaC.Netscape NavigatorD.Internet ExplorerView answerCorrect answer: (C)Netscape Navigator144.The underlying computing equipment that the system uses to achieve its e-commercefunctionality is called a ______________.A.hardware platformB.content platformC.transaction platformD.scalability platform
View answerCorrect answer: (A)hardware platform145.In the e-commerce security environment, which of the following constitutes the inner-mostlayer?A.peopleB.dataC.technology solutionsD.organizational policies and proceduresView answerCorrect answer: (B)data146.Which of the following is not a dimension of e-commerce security provided by encryption?A.availabilityB.message integrityC.nonrepudiationD.confidentialityView answerCorrect answer: (A)availability147.What is the name of the division of the U.S. Department of Homeland Security thatcoordinates cyber incident warnings and responses across government and private sectors?A.US-CERTB.OECDC.IC3D.P3PView answerCorrect answer: (A)US-CERT148.The marketplace for auction sites is best described as ______________.A.many sites attaining similar levels of profitabilityB.easy to enter due to minimal barriersC.populated mostly with small, thriving specialty sitesD.dominated by a handful of sites with established networksView answerCorrect answer: (D)dominated by a handful of sites with established networks
149.A ______________ describes the flow of information at your e-commerce site and theinfrastructure that will be used in the system.A.system designB.logical designC.tactical designD.physical designView answerCorrect answer: (B)logical design150.E-commerce merchant server software includes all of the following except ______________.A.online e-mailB.online catalogC.online shopping cartD.online credit card processingView answerCorrect answer: (A)online e-mail
End of preview. Want to read all 88 pages?
Upload your study docs or become a
Course Hero member to access this document
Term
Fall
Professor
NoProfessor
Tags
digital business