Warning: include(/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php): failed to open stream: No such file or directory in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95

Warning: include(): Failed opening '/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95
Ashland IS346 Midterm Exam Spring 2015 – RoyalCustomEssays

Ashland IS346 Midterm Exam Spring 2015

CTU SCM210 Phase 2 discussion
September 25, 2018
CTU SCM210 Phase 3 discussions
September 25, 2018

Houston Community College Exam-1 IS 346 Spring 2015Total points 100Name_____________________________________________ Class Noon _____ Evening ______ 50 Multiple choice and T/F questions; Each is worth 1 point There are five essay type questions; Each is worth 10 points MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Which of the following is not a unique feature of e-commerce technology? 1) a) interactivity b) richness c) global broadcasting d) social technology 2) E-commerce technologies have changed the traditional tradeoff between the richness and reach of 2) a marketing message. Prior to the development of the Web: a) marketing messages had little richness. b) the smaller the audience reached, the less rich the message. c) the larger the audience reached, the less rich the message. d) richness equaled reach. 3) Which type of e-commerce is distinguished by the type of technology used in the transaction rather 3) than by the nature of the market relationship? a) Mobile commerce (M-commerce) b) Consumer-to-Consumer (C2C) c) Business-to-Consumer (B2C) d) Business-to-Business (B2B) 4) Which of the following statements about the Web is not true? 4) a) It is the technology upon which the Internet is based. b) It provides access to Web pages that incorporate graphics, sound, and multimedia. c) It provides access to pages written in HTML. d) It was developed in the early 1990s. 5) Which of the following is not a characteristic of a perfect competitive market? 5) a) A nearly infinite set of suppliers compete against one another. b) the growth of regulatory activity both nationally and internationally c) Customers have access to all relevant information worldwide. d) Price, cost, and quality information are equally distributed. 6) Unfair competitive advantages occur when: 6)a) information is equally distributed and transaction costs are low.b) market middlemen are displaced.c) one competitor has an advantage others cannot purchase.d) firms are able to gather monopoly profits.7) Which of the following is not true regarding e-commerce today? 7)a) There remains considerable persistent price dispersion.b) The market middlemen disappeared.c) Economists’ visions of a friction-free market have not been realized.d) Consumers are less price-sensitive than expected.1TRUE/FALSE. Write ‘T’ if the statement is true and ‘F’ if the statement is false.8) A value proposition defines how a company’s product or service fulfills the needs of a customer. T or F9) In order to be considered successful, a firm must produce returns greater than alternative investments. T or F10) E-commerce as we know it today would not exist without the Internet. T or F11) Web 2.0 describes a set of applications and technologies that encourage and rely on user- and T or F consumer-generated interactivity and content. 12) The fact that e-commerce is conducted on the basis of universal standards decreases market entry costs T or F for merchants. 13) Differentiation refers to situations in which there is little difference between products and the only basis T or F of choosing a product is price. MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 14) All of the following are key elements of a business model except: 14) a) competitive environment. b) market strategy. c) information technology strategy. d) organizational development. 15) Which element of the business model addresses the question of why a customer should buy from 15) the firm? a) value proposition b) revenue model c) competitive advantage d) market strategy 16) Which element of the business model examines who else occupies the firm’s intended marketspace? 16) a) value proposition b) competitive advantage c) market strategy d) competitive environment 17) A firm’s ________ describes how a firm will produce a superior return on invested capital. 17) a) competitive advantage b) market strategy c) revenue model d) value proposition 18) Which of the following is an example of the subscription revenue model? 18) a) Amazon b) Twitter c) eBay d) Ancestry.com 19) Stickiness is an important attribute for which revenue model? 19) a) subscription revenue model b) advertising revenue model c) sales revenue model d) transaction fee revenue model 20) Which of the following companies utilizes a transaction fee revenue model? 20) a) WSJ.com b) Sears.com c) E*Trade d) Twitter 221) The existence of a large number of competitors in any one market segment may indicate: 21) a) no one firm has differentiated itself within that market. b) an untapped market niche. c) a market that has already been tried without success. d) the market is saturated. 22) All of the following can be considered a direct or indirect competitor of Amazon.com except: 22) a) Apple’s iTunes Store. b) eBay. c) Barnesandnoble.com. d) Starbucks. 23) A perfect market is one in which: 23)a) competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.b) one firm develops an advantage based on a factor of production that other firms cannot purchase.c) one participant in the market has more resources than the others.d) there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.TRUE/FALSE. Write ‘T’ if the statement is true and ‘F’ if the statement is false.24) Transmission Control Protocol is the protocol that provides the Internet addressing scheme. T or F25) The major hubs in the United States where the Internet backbone intersects with regional and local T or F networks are now commonly referred to as Internet Exchange Points (IXPs). MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 26) Which of the following is not one of the basic technological foundations of the Internet? 26) a) client/server computing b) TCP/IP communications protocol c) packet-switching hardware d) Tracert 27) The process of slicing digital messages into parcels, sending them along different communication 27) paths as they become available, and reassembling them at the destination point is called: a) the File Transfer Protocol. b) routing. c) packet switching. d) the Transmission Control Protocol. 28) An IPv4 address is expressed as a: 28) a) 64-bit number that appears as a series of four separate numbers separated by periods.b) 32-bit number that appears as a series of four separate numbers separated by periods.c) 32-bit number that appears as a series of four separate numbers separated by semicolons.d) 64-bit number that appears as a series of four separate numbers separated by semicolons.29) The backbone of the Internet is formed by:a) Metropolitan Area Exchanges (MAEs).c) Internet Exchange Points (IXPs).29)b) Network Service Providers (NSPs). d) Internet Service Providers (ISPs).30) The set of technologies that enables efficient delivery of data to many locations on a network is 30)called: a) BigBand. b) IP multicasting. c) streaming. d) diffserv. 331) In the address http://www.company.com/clients.html, which of the following is the top-level 31)domain? a) www b) http c) company.com d) .com TRUE/FALSE. Write ‘T’ if the statement is true and ‘F’ if the statement is false.32) The systems development life cycle methodology is useful when creating an e-commerce Web site. T or F33) Prior to the development of e-commerce, Web sites primarily delivered static content. T or F34) A “native” app is one designed to specifically operate using a mobile device’s hardware and operating T or F system. 35) A “native” app is one designed to specifically operate using a mobile device’s hardware and operating T or F system. MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.36) In order from beginning to end, the major steps in the SDLC, are: 36)a) systems design; testing; building the system; and implementation.b) systems analysis/planning; systems design; building the system; testing; and implementation.c) systems analysis/planning; implementation; building the system; and testing.d) systems analysis/planning; systems design; building the system; implementation; and testing.37) A system design has two main components: 37)a) business objectives and technology requirements.b) a behavioral design and a technological design.c) a logical design and a physical design.d) front-end systems and back-end systems.38) Which of the following typically includes a data flow diagram to describe the flow of information 38) for a Web site? a) co-location plan b) logical design c) testing plan d) physical design 39) Which of the following details the actual hardware components to be used in a system? 39) a) architecture plan b) physical design c) system functionalities plan d) logical design 40) The leading Web server software is:a) Apache.c) Linux.40)b) Microsoft Internet Information Server. d) Google Enterprise Server.41) All of the following are factors in contributing to the increase in cybercrime except: 41)a) the Internet is an open, vulnerable design. b) the ability to remotely access the Internet.c) the Internet’s similarity to telephone networks. d) the ability to anonymously access the Internet.442) According to the 2011 Computer Crime and Security Survey, which of the following was the most 42) commonly reported type of attack? a) malware infection b) Web site defacement c) insider abuse d) laptop theft 43) The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, 43) integrity, privacy, and: a) usability. b) confidentiality. c) functionality. d) viability. 44) ________ refers to the ability to ensure that e-commerce participants do not deny their online 44) actions. a) Authenticity b) Availability c) Integrity d) Nonrepudiation 45) ________ refers to the ability to identify the person or entity with whom you are dealing on the 45) Internet. a) Authenticity b) Availability c) Nonrepudiation d) Integrity 46) Which of the following is not a key point of vulnerability when dealing with e-commerce? 46) a) the server b) the credit card companies c) the client computer d) the communications pipeline TRUE/FALSE. Write ‘T’ if the statement is true and ‘F’ if the statement is false.47) Security measures help make a site faster and easier for visitors to use. T or F48) Typically, the more security measures added to a Web site, the slower and more difficult it becomes to T or F use. 49) A Trojan horse appears to be benign, but then does something other than expected. T or FMULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.50) E-commerce can be defined as: 50)a) the digital enablement of transactions and processes within an organization.b) any digitally enabled transactions among individuals and organizations.c) the use of any Internet technologies in a firm’s daily activities.d) the use of the Internet and the Web to transact business.

Place Order