You are on page 1of 12

Management Information Systems 7th

Edition Sousa Test Bank


Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/management-information-systems-7th-edition-sousa-test-bank/
CHAPTER 8: THE WEB-ENABLED ENTERPRISE
1. Domain names always start with www.
a. True
b. False

ANSWER: False

2. File Transfer Protocol (FTP) is a common way of transmitting files from one computer to another.
a. True
b. False

ANSWER: True

3. RSS software called an aggregator or feed reader automatically checks for new content and downloads files from a
designated site in the same way as is done for text files from online newspapers.
a. True
b. False

ANSWER: True

4. Instant messaging (IM) offers users real-time online interactivity.


a. True
b. False

ANSWER: True

5. Cookies are always temporary; they are installed only for one session, and are removed when the user leaves the
site.
a. True
b. False

ANSWER: False

6. Third-party cookies can collect users' browsing and shopping habits across many websites.
a. True
b. False

ANSWER: True

7. Consumers of the final goods and services are involved in B2B trading.
a. True
b. False

ANSWER: False

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

8. Traditional retailers, often called brick-and-mortar businesses, have extended their “storefront” by launching an e­
tailing arm.
a. True
b. False

ANSWER: True

9. An exchange is an extranet for organizations that offer for sale and bid on products and services of a particular type.
a. True
b. False

ANSWER: True

10. Companies in the same industry competitors often collaborate in establishing a website for one or several purposes.
a. True
b. False

ANSWER: True

11. An important element of online retailing is the absence of a selection facility similar to a brick-and-mortar store.
a. True
b. False

ANSWER: False

12. Affiliates are compensated in many ways such as pay per sale, pay per click, and pay per lead.
a. True
b. False

ANSWER: True

13. Similar to auctions among companies, some Web sites serve as auction hubs for individuals.
a. True
b. False

ANSWER: True

14. The electronic bill presentment and payment allows bills to be presented automatically, directly from the
companies’ information systems to payers’ email addresses, and therefore save labor, paper, and postage.
a. True
b. False

ANSWER: True

15. Mobile commerce allows people to use their mobile devices to experience an event and react immediately.
a. True
b. False

ANSWER: True
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

16. Mirror servers run unique applications that are unavailable on any other server.
a. True
b. False

ANSWER: False

17. In dedicated hosting the host dedicates a server to the client, and the client can fully control the content on the
server’s disks.
a. True
b. False

ANSWER: True

18. Renters of dedicated servers usually have root access, which means they act as unrestricted administrators of that
computer.
a. True
b. False

ANSWER: True

19. Technical support involves the quality of the equipment that the hosting company provides, security measures
it maintains the sophistication of server and load management, and the technical skills of its personnel.
a. True
b. False

ANSWER: True

20. Few hosting firms provide subscribers with e-mail addresses.


a. True
b. False

ANSWER: False

21. is a secured protocol used for confidential transactions.


a. HTTPS b. HTTP
c. FTP d. VOIP

ANSWER: a

22. determines the look and location of text, pictures, animations, and other elements on a Web page.
a. Uniform Resource Locator (URL) b. Hypertext Markup Language (HTML)
c. Extensible Markup Language (XML) d. Hypertext Transfer Protocol (HTTP)

ANSWER: b

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

23. Every time you download a file from a Web site or attach files to e-mail, you are using a(n) application.
a. TCP b. NNTP
c. FTP d. POP

ANSWER: c

24. software notifies bloggers when their posts have been mentioned elsewhere on the Web, so they and their
readers can extend the discussion beyond the original blog.
a. RSS b. Spyware
c. Clickstream d. Trackback

ANSWER: d

25. While blogging is publishing text and other visual material, is publishing sound and video.
a. hosting b. posting
c. crowdsourcing d. podcasting

ANSWER: d

26. might be thought of as “real­time e­mail,” because, unlike e­mail, it is synchronous in exchanging
information.
a. RSS feeds b. Podcasting
c. Instant messaging d. E-Tailing

ANSWER: c

27. often help ensure that a user does not receive the same unsolicited information multiple times.
a. Phishing b. Cookies
c. Hosting d. Podcasts

ANSWER: b

28. includes cookies and other, more sophisticated applications that are installed on your computer
unbeknownst to you and transmit information about you while you are online.
a. Spyware b. Honeypot
c. Groupware d. Honeytoken

ANSWER: a

29. In the context of B2B trading, online advertising is done mainly in two ways: through and through banners.
a. e-mail b. search engines
c. spam d. newsgroups

ANSWER: b

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

30. , which is any form of advertising through an online search site, is regarded by businesses as highly effective.
a. Search advertising b. Location-based advertising
c. Near-field advertising d. Reach advertising

ANSWER: a

31. The most basic metric that can be measured at a site is the number of .
a. impressions b. podcasts
c. servers d. cookies

ANSWER: a

32. A(n) is a network used only by the employees of an organization.


a. extranet b. intranet
c. internet d. supranet

ANSWER: b

33. An extranet might be viewed as connecting of business partners.


a. usenets b. internets
c. intranets d. supernets

ANSWER: c

34. Companies that sell online maintain large warehouses and pay for picking, packing, and shipping, three
activities known as _____.
a. auctioning b. pure play
c. profiling d. fulfillment

ANSWER: d

35. While might sound benign, many privacy advocates claim that it violates privacy rights.
a. cookie profiling b. reverse auctioning
c. load balancing d. consumer profiling

ANSWER: d

36. Businesses such as Amazon.com and Buy.com that transact business only through an online environment are called
retailers.
a. big data b. pure play
c. brick-and-mortar d. structured

ANSWER: b

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

37. is a process for outsourcing a variety of tasks to a distributed group of people, both online or offline.
a. Crowdsourcing b. Debugging
c. Consumer profiling d. Load balancing

ANSWER: a

38. is the term for any unsolicited commercial email.


a. Spam b. Phishing
c. Adware d. Spyware

ANSWER: a

39. The purpose of a(n) is to create the impression that the client maintains its own server.
a. proxy server b. virtual private server
c. dynamic server d. mirror server

ANSWER: b

40. enables business partners to set standards for data formats in Web pages.
a. Perl b. CGI
c. XML d. SQL

ANSWER: c

41. transfers visitor inquiries from a busy server to a less busy server for identical information and services.
a. Load balancing b. Shared hosting
c. Pure playing d. Co-location

ANSWER: a

42. In , the hosting company owns the server and the server management software.
a. virtual private server hosting b. shared hosting
c. dedicated hosting d. co-location

ANSWER: b

43. Some companies might want to use entire physical servers all for themselves and therefore can opt for .
a. shared hosting b. progressive hosting
c. dedicated hosting d. virtual private server hosting

ANSWER: c

44. A service is usually the most expensive of hosting options.


a. Co-location b. Virtual private server hosting
c. Shared Hosting d. Dedicated hosting

ANSWER: a

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

45. The customer’s ability to determine the timing and services of their needs from a business organization through a
website is referred to as .
a. customer profiling b. fulfillment
c. customer impression d. self-service

ANSWER: d

46. Some hosting companies charge extra fees for shared hosting if the site experiences activity above a predetermined
amount of data that is transferred, or number of visits from Web surfers, known as .
a. spots b. deals
c. hits d. stops

ANSWER: c

47. On the Web, includes identifying the sites your audience frequently visits.
a. hosting b. phishing
c. spamming d. targeting

ANSWER: d

48. By using cookies and recording shoppers’ movements, software can create electronic consumer profiles for
each shopper and buyer.
a. SQL b. CRM
c. XML d. CGI

ANSWER: b

49. Organizations can leverage to communicate with consumers immediately.


a. newspapers b. radio
c. social media d. television

ANSWER: c

50. has fewer restrictions on storage space and transactions, and since only one site resides on the disks,
no other site can affect its functionality.
a. Dedicated hosting b. Shared hosting
c. Virtual private server hosting d. Co-location

ANSWER: a

51. The protocol used to transfer and download Web information is .

ANSWER: HTTP
Hypertext Transfer Protocol
Hypertext Transfer Protocol (HTTP)

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

52. is the most common programming language for creating Web pages and other information viewable in a
Web browser.
ANSWER: HTML
Hypertext Markup Language
Hypertext Markup Language (HTML)

53. A(n) is a Web page that invites surfers to post opinions and artistic work, as well as links to sites of interest.

ANSWER: blog

54. To is to make a digital audio recording, usually of voice, and post the file on the Web so that people
can download it and listen to it.

ANSWER: podcast

55. A(n) is a small file that a Web site places on a visitor’s hard disk so that the Web site can remember
something about the surfer later.

ANSWER: cookie

56. Software designed to trace and report your online behavior without your knowledge is called .

ANSWER: spyware

57. Web-enabled business is often classified by the parties involved in the interaction: business-to-business
(B2B), business-to-consumer (B2C), and .

ANSWER: B2G
business-to-government
business-to-government (B2G)

58. are images placed on a Web site that link to the site of the company selling the product or service.

ANSWER: Banners

59. A(n) limits site access to the employees of particular organizations, usually business partners.

ANSWER: extranet

60. technology enables one server to be virtually split into many addressable servers, each for a different client
and with its own domain name.

ANSWER: Virtual private server

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

61. Online retailing, called , continues to grow throughout the world for several reasons: greater availability of
faster communication lines to households, growing confidence in online purchases, and the increasing ability to
find the item one searches and rich information about it.
ANSWER: e-tailing

62. The purpose of is to know the consumers better so the business can serve them better, while streamlining its
marketing and sales operations.

ANSWER: consumer profiling

63. The ability of websites to serve as prompt exchanges of information has supported another popular business
model, theor name-your-own-price auction.

ANSWER: reverse auction

64. is a cyberattack tactic used to trick Internet users into giving up personal information such as PINs and
account numbers.

ANSWER: Phishing

65. Wireless technologies enable what some people call mobile commerce, or .

ANSWER: m-commerce

66. The usage of in web technologies ensures that data exchanged between the SCM systems of two
organizations are interpreted correctly.

ANSWER: XML
Extensible Markup Language
Extensible Markup Language (XML)

67. In , the client’s website is stored on the host’s same physical server along with the sites of other clients.

ANSWER: shared hosting

68. enables one server to be virtually split into many addressable servers, each for a different client and with its
own domain name.

ANSWER: Virtual private server

69. webpages can be built with several programming tools: CGI, Java servlets, PHP, and ASP (Active Server
Pages).

ANSWER: Dynamic

70. Organizations make proactive initiatives to keep their products from becoming a , which is any product that is
sold for about the same price by a multitude of vendors in a highly competitive market, usually with a thin margin
of profit.

ANSWER: commodity

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

71. Describe HTML and XML.

ANSWER: Hypertext Markup Language (HTML) is the most common programming language for creating
webpages and other information viewable in a web browser. It determines the look and location of
text, pictures, animations, and other elements on a webpage. Extensible Markup Language (XML)
enables the creation of various types of data. It is most often used not for determining the appearance
of visual elements on a webpage but to convey the meaning or content of the data. The World Wide
Web Consortium (W3C), the organization responsible for web standards, has combined the two
markup languages HTML and XML into a standard called Extensible Hypertext Markup Language
(XHTML).

Every file displayed on the Web is coded with a markup language such as HTML or XML. Simply put,
markup languages provide a system of standardized “tags” that format elements of a document,
including text, graphics, and sound. Formatting includes opening and closing tags preceding and
following a part of the document, such as <b> at the start of bold text, and </b> at the end of bold text.
Some tags are marked to link to another page either at the same site or another site, and others create
links to e-mail addresses. Browsers interpret HTML and XML tags and display the text in the fashion
defined by the tags, or allow other software to pick up data from the page and process it or copy it into
the proper place in a database.

As in HTML, tags are used in XML to mark data elements. However, XML tags define “what it is,”
as opposed to “how it looks.”

72. Discuss File Transfer Protocol.

ANSWER: File Transfer Protocol (FTP) is a common way of transmitting files from one computer to another.
Every time you download a file from a website or attach files to e-mail, you are using an FTP
application. The file transmitted can be of any type: text, graphics, animation, or sound. FTP is
embedded in browsers and therefore is “transparent” to the users. A separate FTP utility can also be
used, with many available as shareware, to manage transmitting files.

Businesses use FTP to place files on a server for sharing among professionals. FTP is also useful for
placing files on a server that hosts a website. It’s also convenient for retrieving large files that might
exceed an e­mail system’s size limits. For example, authors can place large chapter and figure files in
a folder on a server maintained by their publisher. Manufacturers often place full assembly and
maintenance manuals or videos at their Web site so customers can download them any time. New
methods have replaced FTP sites such as cloud drives, online backup tools (such as Carbonite), and
groupware productivity products (such as Wiggio). However, FTP sites still remain popular due to
the inexpensive and simple nature of file transfers.

73. Explain the importance of blogs to commercial organizations.

ANSWER: The importance of blogs to commercial organizations is primarily to find out what blog participants
think and say about the organizations. Many organizations use special software that combs blogs for
postings that mention the organizations’ names. PR people then read the content and relay feedback to
others in the organization as needed. For example, an anonymous blogger boasted that he could break
Kryptonite bicycle locks with a pen. Within a week the posted item was mentioned in The New York
Times, and Kryptonite recalled the locks. Some companies offer blog mining applications, which is
software that combs blogs, identifies company names, and automatically tracks discussions. Such tools
can turn blog data into useful market research information.

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise

74. How is advertising done on the web?

ANSWER: Online advertising is done mainly in two ways: through search engines and through banners. Although
advertising on the web is not aimed just at consumers, most of it is directed to them. However, selling
and buying web ads occurs between businesses: the website operators sell advertising “real estate” to
another business. Regardless of media, advertisers are interested in reaching as many people who
might buy their goods or services as possible. On the web, advertisers are interested in what they call
“traffic volume,” that is, the number of people who come across their messages. As the number of
people who log on to the web increases, so does advertiser interest in this medium. Internet World
Stats estimated that of the 7 billion people in the world today, 2.4 billion—34.3 percent—used the
Internet in 2012 (“Internet Usage Statistics,” 2012). With this traffic volume, advertisers are willing to
spend a lot of money on web advertising. The research firm GroupM estimated that about $84.8 billion
was spent on web advertising in 2011, a 16 percent increase from 2010 (Hof, 2012; O’Leary, 2012).
They also predicted web advertising spending will grow to $98.2 billion in 2012, accounting for 19
percent of all measured media spending (O’Leary, 2012).

75. Explain the purpose of a virtual private server.

ANSWER: The purpose of a virtual private server is to create the impression that the client maintains its own
server. Virtual private server technology enables one server to be virtually split into many addressable
servers, each for a different client and with its own domain name. This option is usually less
expensive than renting a dedicated server, while enjoying the same benefits, including full control of
the content of the virtual server.

© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

You might also like