Warning: include(/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php): failed to open stream: No such file or directory in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95

Warning: include(): Failed opening '/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95
Ashland IS346 midterm exam – RoyalCustomEssays

Ashland IS346 midterm exam

HSM240 – Complete Class (All DQs, Checkpoints and Assignments)
September 6, 2018
HSM250 – Entire Class
September 6, 2018

Exam-1 IS 346 Spring 2015
Total points 100

Name_____________________________________________
Class

Noon _____

Evening ______

50 Multiple choice and T/F
questions; Each is worth 1 point

There are five essay type
questions; Each is worth 10 points

MULTIPLE CHOICE. Choose the one alternative that best
completes the statement or answers the question.

1)

Which of the
following is not a unique feature of e-commerce
technology?

1)

a) interactivity

b) richness

c) global broadcasting

d) social technology

2)

E-commerce technologies have changed
the traditional tradeoff between the richness and reach of

2)

a marketing message. Prior to the
development of the Web:

a) marketing messages had little
richness.

b) the smaller the audience
reached, the less rich the message.

c) the larger the audience reached,
the less rich the message.

d) richness equaled reach.

3)

Which type of e-commerce is distinguished by the type of technology used
in the transaction rather

3)

than by the nature of the market
relationship?

a) Mobile commerce (M-commerce)

b) Consumer-to-Consumer (C2C)

c) Business-to-Consumer (B2C)

d) Business-to-Business (B2B)

4)

Which of the following statements about the Web is not
true?

4)

a) It is the technology upon which
the Internet is based.

b) It provides access to Web pages
that incorporate graphics, sound, and multimedia.

c) It provides access to pages
written in HTML.

d) It was developed in the early
1990s.

5)

Which of the following is not a characteristic of
a perfect competitive market?

5)

a) A nearly infinite set of
suppliers compete against one another.

b) the growth of
regulatory activity both nationally and internationally

c) Customers have access to all
relevant information worldwide.

d) Price, cost, and quality
information are equally distributed.

6)

Unfair competitive advantages occur
when:

6)

a) .gif”>.gif”>.gif”>.gif”>.gif”>information is equally distributed
and transaction costs are low.
b) market middlemen are displaced.
c) one competitor has an advantage
others cannot purchase.
d) firms are able to gather monopoly
profits.
.gif”>

7)
Which of the following is not true regarding e-commerce today?

7)

a) There remains considerable persistent
price dispersion.
b) The market middlemen disappeared.
c) Economists’ visions of a friction-free market have not been realized.
d) Consumers are less price-sensitive than expected.
.gif”>

1

TRUE/FALSE.
Write ‘T’ if the statement is true and ‘F’ if the statement is false.

8)

A value proposition defines how a
company’s product or service fulfills the needs of a customer.

T or F

9)

In order to be
considered successful, a firm must produce returns greater than alternative
investments.

T or F

10)

E-commerce as we know it today would
not exist without the Internet.

T or F

11)

Web 2.0 describes a set of
applications and technologies that encourage and rely on user- and

T or F

consumer-generated interactivity and
content.

12)

The fact that e-commerce is conducted on the basis of universal standards
decreases market entry costsT or F

for merchants.

13)

Differentiationrefers to
situations in which there is little difference between products and the only
basis

T or F

of choosing a product is price.

MULTIPLE CHOICE. Choose the one alternative that best
completes the statement or answers the question.

14)

All of the following are key elements of a business
model except:

14)

a) competitive environment.

b) market strategy.

c) information technology strategy.

d) organizational development.

15)

Which element of the business model addresses the question
of why a customer should buy from

15)

the firm?

a) value proposition

b) revenue model

c) competitive
advantage

d) market strategy

16)

Which element of the business model examines who else
occupies the firm’s intended marketspace?

16)

a) value proposition

b) competitive
advantage

c) market strategy

d) competitive environment

17)

A firm’s ________ describes how a firm will produce a
superior return on invested capital.

17)

a) competitive
advantage

b) market strategy

c) revenue model

d) value proposition

18)

Which of the following is an
example of the subscription revenue model?

18)

a) Amazon

b) Twitter

c) eBay

d) Ancestry.com

19)

Stickiness is an important
attribute for which revenue model?

19)

a) subscription revenue model

b) advertising revenue model

c) sales revenue model

d) transaction fee revenue model

20)

Which of the following companies
utilizes a transaction fee revenue model?

20)

a) WSJ.com

b) Sears.com

c) E*Trade

d) Twitter

2

21)

The existence of a large number of
competitors in any one market segment may indicate:

21)

a) no one firm has differentiated
itself within that market.

b) an untapped market niche.

c) a market that has already been
tried without success.

d) the market is saturated.

22)

All of the following can be
considered a direct or indirect competitor of Amazon.com except:

22)

a) Apple’s iTunes Store.

b) eBay.

c) Barnesandnoble.com.

d) Starbucks.

23)

A perfect market is one in which:

23)

a) .gif”>.gif”>competition is at a minimum, as each
niche market within an industry is served by the company with the greatest
competitive advantage.
b) one firm develops an advantage based
on a factor of production that other firms cannot purchase.

c) one participant in the market has
more resources than the others.
d) there are no competitive advantages
or asymmetries because all firms have equal access to all the factors to
production.
.gif”>
TRUE/FALSE. Write ‘T’ if the
statement is true and ‘F’ if the statement is false.

24)

Transmission Control Protocol is the protocol that
provides the Internet addressing scheme.

T or F

25)

The major hubs in the United States where the Internet
backbone intersects with regional and local

T or F

networks are now commonly referred
to as Internet Exchange Points (IXPs).

MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers the question.

26)

Which of the following is not one of the basic
technological foundations of the Internet?

26)

a) client/server computing

b) TCP/IP communications protocol

c) packet-switching hardware

d) Tracert

27)

The process of slicing digital messages into parcels,
sending them along different communication

27)

paths as they become available, and
reassembling them at the destination point is called:

a) the File Transfer Protocol.

b) routing.

c) packet switching.

d) the Transmission Control
Protocol.

28)

An IPv4 address is expressed as a:

28)

a) 64-bit number that appears as a series
of four separate numbers separated by periods.
b) 32-bit number that appears as a series
of four separate numbers separated by periods.
c) 32-bit number that appears as a series
of four separate numbers separated by semicolons.
d) 64-bit number that appears as a series
of four separate numbers separated by semicolons.
.gif”>

29) The backbone of the Internet is
formed by:

a) Metropolitan Area Exchanges (MAEs).
c) Internet Exchange Points (IXPs).

29)

b) Network Service Providers (NSPs).
d) Internet Service Providers (ISPs).
.gif”>

30)
The set of technologies that
enables efficient delivery of data to many locations on a network is

30)

called:

a) BigBand.

b) IP multicasting.

c) streaming.

d) diffserv.

.gif”>

3

31)In
the addresshttp://www.company.com/clients.html, which of the following is the top-level

31)

domain?

a) www

b) http

c) company.com

d) .com

.gif”>
TRUE/FALSE. Write ‘T’ if the
statement is true and ‘F’ if the statement is false.

32)

The systems development life cycle
methodology is useful when creating an e-commerce Web site.

T or F

33)

Prior to the development of e-commerce, Web sites primarily
delivered static content.

T or F

34)

A
“native” app is one designed to specifically operate using a mobile
device’s hardware and operating

T or F

system.

35)

A
“native” app is one designed to specifically operate using a mobile
device’s hardware and operating

T or F

system.

MULTIPLE CHOICE. Choose the one
alternative that best completes the statement or answers the question.

36) In order from beginning to end,
the major steps in the SDLC, are:

36)

a) systems design; testing; building the
system; and implementation.
b) systems analysis/planning; systems
design; building the system; testing; and implementation.
c) systems analysis/planning;
implementation; building the system; and testing.
d) systems analysis/planning; systems
design; building the system; implementation; and testing.
.gif”>

37) A system design has two main
components:

37)

a) business objectives and technology
requirements.
b) a behavioral design and a
technological design.
c) a logical design and a physical
design.
d) front-end systems and back-end systems.
.gif”>

38)

Which of the following typically includes a data flow
diagram to describe the flow of information

38)

for a Web site?

a) co-location plan

b) logical design

c) testing plan

d) physical design

39)

Which of the following details the actual hardware
components to be used in a system?

39)

a) architecture plan

b) physical design

c) system functionalities plan

d) logical design

.gif”>.gif”>

40) The leading Web server software is:

a) Apache.
c) Linux.

40)

b) Microsoft Internet Information
Server. d) Google Enterprise Server.
.gif”>

41)
All of the following are factors in contributing to the increase in
cybercrime except:

41)

a)
the Internet is an open, vulnerable design. b) the ability to remotely access
the Internet.
.gif”>
c)
the Internet’s similarity to telephone networks. d) the ability to anonymously
access the Internet.

4

42)

According to the 2011 Computer
Crime and Security Survey, which of the following was the most

42)

commonly reported type of attack?

a) malware infection

b) Web site defacement

c) insider abuse

d) laptop theft

43)

The six key dimensions to e-commerce security are
nonrepudiation, authenticity, availability,

43)

integrity, privacy, and:

a) usability.

b) confidentiality.

c) functionality.

d) viability.

44)

________ refers to the ability to
ensure that e-commerce
participants do not deny their online

44)

actions.

a) Authenticity

b) Availability

c) Integrity

d) Nonrepudiation

45)

________ refers to the ability to
identify the person or entity with whom you are dealing on the

45)

Internet.

a) Authenticity

b) Availability

c) Nonrepudiation

d) Integrity

46)

Which of the following is not a key point of
vulnerability when dealing with e-commerce?

46)

a) the server

b) the credit card companies

c) the client computer

d) the communications pipeline

.gif”>.gif”>.gif”>.gif”>.gif”>
TRUE/FALSE. Write ‘T’ if the
statement is true and ‘F’ if the statement is false.

47)

Security measures help make a site faster and easier for
visitors to use.

T or F

48)

Typically, the more security measures
added to a Web site, the slower and more difficult it becomes to

T or F

use.

49)

A Trojan horse appears to be benign, but then does
something other than expected.

T or F

MULTIPLE CHOICE. Choose the one
alternative that best completes the statement or answers the question.

50) E-commerce can be defined as:

50)

a) the digital enablement of
transactions and processes within an organization.
b) any digitally enabled transactions
among individuals and organizations.
c) the use of any Internet technologies
in a firm’s daily activities.
d) the use of the Internet and the Web
to transact business.
.gif”>
ESSAY. Write your answer in the space
provided or on a separate sheet of paper.

51) Discuss some of the unique features
that must be taken into account when designing a mobile Web presence.

52)
Explain the key technology concepts of Internet

a.
Packet switching
b.
TCP/IP communications protocol
c.
Client/server computing

53) Do a breif E-commerce industry analysis using
Porter’s Five force model ?

5

54)
Explain following terms

a.
Hackers and three types
b.
Cybercrime
c.
Public Key Encryption
d.
The Domain Name System (DNS)

55) Discuss the impact of smarpthone on
ecommerce.

6

Place Order