Professional Documents
Culture Documents
5. Which of the following refers to the use of Electronic Data Interchange (EDI)?
A. Requires value added network.
B. Requires an extra-net.
C. Can be done on the Internet.
9. What is referred to as the ease with which consumers can find out the variety of
prices in the market?
A. Price fluctuation.
B. Price transparency.
C. Price difference.
14. When does a 'bricks and mortar' enterprise become known as 'clicks and mortar'?
A. When a business combines an online and offline presence.
B. When a business does not combine an online and offline presence.
C. A traditional business with a limited online presence.
15. There are many technological, ethical, legal, and cultural constraints associated
with an e-commerce macro-environment. Which of the following is a technology
constraint from the e-commerce macro- environment?
A. Likelihood of fraudulent transactions.
B. Taxation at the source of purchase.
C. A propensity for consumers to purchase online.
18. While search engines index registered sites which that users search by inputting
keywords, which type of intermediary updates its content typically through text but
can include video or audio delivered through RSS feeds?
A. Access portal.
B. Directory.
C. Blog.
19. "The process of hiring an outside vendor to provide services involved in building
the site that you cannot perform with in-house personnel". The above statement
describes which aspect in a 'System Building'?
A. Building your own website.
B. Hosting.
C. Outsourcing.
20. As the manager in charge of building an e-commerce website, you must ensure that
the website has enough platform capacity to meet peak demand. In considering the
demand, which factors should be taken into account?
A. The processor of web visitors' computer.
B. The number of simultaneous web visitors.
C. The origin of the web visitors.
21. Which hackers are known as good hackers because of their role in helping
organisations to locate and fix security flaws?
A. White hat.
B. Grey hat.
C. Black hat.
22. Which limitation to encryption solution best reflects the scenario below? There is
no guarantee the person using your computer and your private key is really you.
Under digital signature laws, you are responsible for whatever your private key
does even if you were not the person using the key.
A. No guarantee to verify the computer is secured.
B. No definite policy in revoking or renewing the certificates.
C. No guarantee of determining the user of the computer.
23. Branding is an important aspect of the basic marketing concept. What is the
definition of brand equity?
A. A set of plans of differentiation of products from its competitors.
B. A set of expectations that a consumer has when consuming or thinking of consuming
a product or service.
C. A set of five categories of brand assets and liabilities that linked to a brand.
24. Which of the following market entry strategies were applied by amazon.com,
ebay.com, and e-trade.com?
A. Partial clicks/first mover advantage strategy.
B. Pure clicks/last mover advantage strategy.
C. Pure clicks/first mover advantage strategy.
25. Amazon pays commission to more than 500,000 websites for new business
opportunities it refers to the Amazon's site. They add a link to Amazon's website on
their own site and encourage visitors to patronise its marketing partner. Some of
the websites are paid a commission based on any sales that are generated, while
others may be paid a fee based on a number of click-through or new registrations,
or a flat fee or some combination of these. Which of the following Internet
marketing techniques reflects this scenario?
A. Viral marketing.
B. Affiliate marketing.
C. Permission marketing
26. Which of the following market entry strategies were applied by existing firms?
A. Pure clicks/fast follower strategy.
B. Partial clicks/first mover advantage strategy.
C. Pure clicks/last mover advantage strategy.
28. What are the TWO methods involved in gathering information in market research
that will help a firm identify the potential products and customers?
A. Primary approach and quantitative approach.
B. Primary approach and secondary approach.
C. Secondary approach and qualitative approach.
29. Panasonic plans to draw the attention of people who are already online and
persuade them to visit a new site, as well as to attract the attention of people who
will be potentially going to visit the new site in the future. What is the best
marketing strategy for Panasonic?
A. Online marketing.
B. Offline marketing.
C. Mixing offline and online marketing.
30. What is the result of a search engine's investigation of its database of indexed web
pages?
A. Pop-up.
B. Hit.
C. Blog.
31. Why is it important to have appropriate domain names?
A. Links website to multiple websites.
B. Reinforces existing brands and develops new brands.
C. Improves site visibility to search engine
32. The site that provides entertainment with commerce or interactivity or human
interest, that is perceived as fun to use, is more successful in attracting and keeping
the visitors. What design factor is related to this statement?
A. Easy product list navigation.
B. Compelling experiences.
C. Customer choice agents.
34. Online customer recommendation becomes popular recently among bag packers to
book hotels or resorts even to choose tour destinations. What type of marketing
communication best describes the above statement?
A. Customer compelling experiences.
B. Customer choice agents.
C. Few clicks to purchase.
37. What is a branch of philosophy that deals with what is considered to be right and
wrong?
A. Ethics.
B. Intellectual property rights.
C. Privacy.
38. Many commercial websites have poor privacy protection. What would be the best
suggestion for the websites to improve their privacy protection?
A. Provide details about the site's information-gathering and dissemination
policies.
B. Offer limited choice about how users' personal information is used.
C. Allow user to have minimal control over their personal information.
40. What are the ethical issues debated through online website?
A. Free speech on general human rights.
B. Privacy, intellectual property rights, free speech versus censorship and other
legal issues.
C. Consumer rights and online cheating.