Professional Documents
Culture Documents
ANSWER: False
2. File Transfer Protocol (FTP) is a common way of transmitting files from one computer to another.
a. True
b. False
ANSWER: True
3. RSS software called an aggregator or feed reader automatically checks for new content and downloads files from a
designated site in the same way as is done for text files from online newspapers.
a. True
b. False
ANSWER: True
ANSWER: True
5. Cookies are always temporary; they are installed only for one session, and are removed when the user leaves the
site.
a. True
b. False
ANSWER: False
6. Third-party cookies can collect users' browsing and shopping habits across many websites.
a. True
b. False
ANSWER: True
7. Consumers of the final goods and services are involved in B2B trading.
a. True
b. False
ANSWER: False
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
8. Traditional retailers, often called brick-and-mortar businesses, have extended their “storefront” by launching an e
tailing arm.
a. True
b. False
ANSWER: True
9. An exchange is an extranet for organizations that offer for sale and bid on products and services of a particular type.
a. True
b. False
ANSWER: True
10. Companies in the same industry competitors often collaborate in establishing a website for one or several purposes.
a. True
b. False
ANSWER: True
11. An important element of online retailing is the absence of a selection facility similar to a brick-and-mortar store.
a. True
b. False
ANSWER: False
12. Affiliates are compensated in many ways such as pay per sale, pay per click, and pay per lead.
a. True
b. False
ANSWER: True
13. Similar to auctions among companies, some Web sites serve as auction hubs for individuals.
a. True
b. False
ANSWER: True
14. The electronic bill presentment and payment allows bills to be presented automatically, directly from the
companies’ information systems to payers’ email addresses, and therefore save labor, paper, and postage.
a. True
b. False
ANSWER: True
15. Mobile commerce allows people to use their mobile devices to experience an event and react immediately.
a. True
b. False
ANSWER: True
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
16. Mirror servers run unique applications that are unavailable on any other server.
a. True
b. False
ANSWER: False
17. In dedicated hosting the host dedicates a server to the client, and the client can fully control the content on the
server’s disks.
a. True
b. False
ANSWER: True
18. Renters of dedicated servers usually have root access, which means they act as unrestricted administrators of that
computer.
a. True
b. False
ANSWER: True
19. Technical support involves the quality of the equipment that the hosting company provides, security measures
it maintains the sophistication of server and load management, and the technical skills of its personnel.
a. True
b. False
ANSWER: True
ANSWER: False
ANSWER: a
22. determines the look and location of text, pictures, animations, and other elements on a Web page.
a. Uniform Resource Locator (URL) b. Hypertext Markup Language (HTML)
c. Extensible Markup Language (XML) d. Hypertext Transfer Protocol (HTTP)
ANSWER: b
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
23. Every time you download a file from a Web site or attach files to e-mail, you are using a(n) application.
a. TCP b. NNTP
c. FTP d. POP
ANSWER: c
24. software notifies bloggers when their posts have been mentioned elsewhere on the Web, so they and their
readers can extend the discussion beyond the original blog.
a. RSS b. Spyware
c. Clickstream d. Trackback
ANSWER: d
25. While blogging is publishing text and other visual material, is publishing sound and video.
a. hosting b. posting
c. crowdsourcing d. podcasting
ANSWER: d
26. might be thought of as “realtime email,” because, unlike email, it is synchronous in exchanging
information.
a. RSS feeds b. Podcasting
c. Instant messaging d. E-Tailing
ANSWER: c
27. often help ensure that a user does not receive the same unsolicited information multiple times.
a. Phishing b. Cookies
c. Hosting d. Podcasts
ANSWER: b
28. includes cookies and other, more sophisticated applications that are installed on your computer
unbeknownst to you and transmit information about you while you are online.
a. Spyware b. Honeypot
c. Groupware d. Honeytoken
ANSWER: a
29. In the context of B2B trading, online advertising is done mainly in two ways: through and through banners.
a. e-mail b. search engines
c. spam d. newsgroups
ANSWER: b
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
30. , which is any form of advertising through an online search site, is regarded by businesses as highly effective.
a. Search advertising b. Location-based advertising
c. Near-field advertising d. Reach advertising
ANSWER: a
31. The most basic metric that can be measured at a site is the number of .
a. impressions b. podcasts
c. servers d. cookies
ANSWER: a
ANSWER: b
ANSWER: c
34. Companies that sell online maintain large warehouses and pay for picking, packing, and shipping, three
activities known as _____.
a. auctioning b. pure play
c. profiling d. fulfillment
ANSWER: d
35. While might sound benign, many privacy advocates claim that it violates privacy rights.
a. cookie profiling b. reverse auctioning
c. load balancing d. consumer profiling
ANSWER: d
36. Businesses such as Amazon.com and Buy.com that transact business only through an online environment are called
retailers.
a. big data b. pure play
c. brick-and-mortar d. structured
ANSWER: b
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
37. is a process for outsourcing a variety of tasks to a distributed group of people, both online or offline.
a. Crowdsourcing b. Debugging
c. Consumer profiling d. Load balancing
ANSWER: a
ANSWER: a
39. The purpose of a(n) is to create the impression that the client maintains its own server.
a. proxy server b. virtual private server
c. dynamic server d. mirror server
ANSWER: b
40. enables business partners to set standards for data formats in Web pages.
a. Perl b. CGI
c. XML d. SQL
ANSWER: c
41. transfers visitor inquiries from a busy server to a less busy server for identical information and services.
a. Load balancing b. Shared hosting
c. Pure playing d. Co-location
ANSWER: a
42. In , the hosting company owns the server and the server management software.
a. virtual private server hosting b. shared hosting
c. dedicated hosting d. co-location
ANSWER: b
43. Some companies might want to use entire physical servers all for themselves and therefore can opt for .
a. shared hosting b. progressive hosting
c. dedicated hosting d. virtual private server hosting
ANSWER: c
ANSWER: a
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
45. The customer’s ability to determine the timing and services of their needs from a business organization through a
website is referred to as .
a. customer profiling b. fulfillment
c. customer impression d. self-service
ANSWER: d
46. Some hosting companies charge extra fees for shared hosting if the site experiences activity above a predetermined
amount of data that is transferred, or number of visits from Web surfers, known as .
a. spots b. deals
c. hits d. stops
ANSWER: c
47. On the Web, includes identifying the sites your audience frequently visits.
a. hosting b. phishing
c. spamming d. targeting
ANSWER: d
48. By using cookies and recording shoppers’ movements, software can create electronic consumer profiles for
each shopper and buyer.
a. SQL b. CRM
c. XML d. CGI
ANSWER: b
ANSWER: c
50. has fewer restrictions on storage space and transactions, and since only one site resides on the disks,
no other site can affect its functionality.
a. Dedicated hosting b. Shared hosting
c. Virtual private server hosting d. Co-location
ANSWER: a
ANSWER: HTTP
Hypertext Transfer Protocol
Hypertext Transfer Protocol (HTTP)
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
52. is the most common programming language for creating Web pages and other information viewable in a
Web browser.
ANSWER: HTML
Hypertext Markup Language
Hypertext Markup Language (HTML)
53. A(n) is a Web page that invites surfers to post opinions and artistic work, as well as links to sites of interest.
ANSWER: blog
54. To is to make a digital audio recording, usually of voice, and post the file on the Web so that people
can download it and listen to it.
ANSWER: podcast
55. A(n) is a small file that a Web site places on a visitor’s hard disk so that the Web site can remember
something about the surfer later.
ANSWER: cookie
56. Software designed to trace and report your online behavior without your knowledge is called .
ANSWER: spyware
57. Web-enabled business is often classified by the parties involved in the interaction: business-to-business
(B2B), business-to-consumer (B2C), and .
ANSWER: B2G
business-to-government
business-to-government (B2G)
58. are images placed on a Web site that link to the site of the company selling the product or service.
ANSWER: Banners
59. A(n) limits site access to the employees of particular organizations, usually business partners.
ANSWER: extranet
60. technology enables one server to be virtually split into many addressable servers, each for a different client
and with its own domain name.
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
61. Online retailing, called , continues to grow throughout the world for several reasons: greater availability of
faster communication lines to households, growing confidence in online purchases, and the increasing ability to
find the item one searches and rich information about it.
ANSWER: e-tailing
62. The purpose of is to know the consumers better so the business can serve them better, while streamlining its
marketing and sales operations.
63. The ability of websites to serve as prompt exchanges of information has supported another popular business
model, theor name-your-own-price auction.
64. is a cyberattack tactic used to trick Internet users into giving up personal information such as PINs and
account numbers.
ANSWER: Phishing
65. Wireless technologies enable what some people call mobile commerce, or .
ANSWER: m-commerce
66. The usage of in web technologies ensures that data exchanged between the SCM systems of two
organizations are interpreted correctly.
ANSWER: XML
Extensible Markup Language
Extensible Markup Language (XML)
67. In , the client’s website is stored on the host’s same physical server along with the sites of other clients.
68. enables one server to be virtually split into many addressable servers, each for a different client and with its
own domain name.
69. webpages can be built with several programming tools: CGI, Java servlets, PHP, and ASP (Active Server
Pages).
ANSWER: Dynamic
70. Organizations make proactive initiatives to keep their products from becoming a , which is any product that is
sold for about the same price by a multitude of vendors in a highly competitive market, usually with a thin margin
of profit.
ANSWER: commodity
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
ANSWER: Hypertext Markup Language (HTML) is the most common programming language for creating
webpages and other information viewable in a web browser. It determines the look and location of
text, pictures, animations, and other elements on a webpage. Extensible Markup Language (XML)
enables the creation of various types of data. It is most often used not for determining the appearance
of visual elements on a webpage but to convey the meaning or content of the data. The World Wide
Web Consortium (W3C), the organization responsible for web standards, has combined the two
markup languages HTML and XML into a standard called Extensible Hypertext Markup Language
(XHTML).
Every file displayed on the Web is coded with a markup language such as HTML or XML. Simply put,
markup languages provide a system of standardized “tags” that format elements of a document,
including text, graphics, and sound. Formatting includes opening and closing tags preceding and
following a part of the document, such as <b> at the start of bold text, and </b> at the end of bold text.
Some tags are marked to link to another page either at the same site or another site, and others create
links to e-mail addresses. Browsers interpret HTML and XML tags and display the text in the fashion
defined by the tags, or allow other software to pick up data from the page and process it or copy it into
the proper place in a database.
As in HTML, tags are used in XML to mark data elements. However, XML tags define “what it is,”
as opposed to “how it looks.”
ANSWER: File Transfer Protocol (FTP) is a common way of transmitting files from one computer to another.
Every time you download a file from a website or attach files to e-mail, you are using an FTP
application. The file transmitted can be of any type: text, graphics, animation, or sound. FTP is
embedded in browsers and therefore is “transparent” to the users. A separate FTP utility can also be
used, with many available as shareware, to manage transmitting files.
Businesses use FTP to place files on a server for sharing among professionals. FTP is also useful for
placing files on a server that hosts a website. It’s also convenient for retrieving large files that might
exceed an email system’s size limits. For example, authors can place large chapter and figure files in
a folder on a server maintained by their publisher. Manufacturers often place full assembly and
maintenance manuals or videos at their Web site so customers can download them any time. New
methods have replaced FTP sites such as cloud drives, online backup tools (such as Carbonite), and
groupware productivity products (such as Wiggio). However, FTP sites still remain popular due to
the inexpensive and simple nature of file transfers.
ANSWER: The importance of blogs to commercial organizations is primarily to find out what blog participants
think and say about the organizations. Many organizations use special software that combs blogs for
postings that mention the organizations’ names. PR people then read the content and relay feedback to
others in the organization as needed. For example, an anonymous blogger boasted that he could break
Kryptonite bicycle locks with a pen. Within a week the posted item was mentioned in The New York
Times, and Kryptonite recalled the locks. Some companies offer blog mining applications, which is
software that combs blogs, identifies company names, and automatically tracks discussions. Such tools
can turn blog data into useful market research information.
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 8: The Web-Enabled Enterprise
ANSWER: Online advertising is done mainly in two ways: through search engines and through banners. Although
advertising on the web is not aimed just at consumers, most of it is directed to them. However, selling
and buying web ads occurs between businesses: the website operators sell advertising “real estate” to
another business. Regardless of media, advertisers are interested in reaching as many people who
might buy their goods or services as possible. On the web, advertisers are interested in what they call
“traffic volume,” that is, the number of people who come across their messages. As the number of
people who log on to the web increases, so does advertiser interest in this medium. Internet World
Stats estimated that of the 7 billion people in the world today, 2.4 billion—34.3 percent—used the
Internet in 2012 (“Internet Usage Statistics,” 2012). With this traffic volume, advertisers are willing to
spend a lot of money on web advertising. The research firm GroupM estimated that about $84.8 billion
was spent on web advertising in 2011, a 16 percent increase from 2010 (Hof, 2012; O’Leary, 2012).
They also predicted web advertising spending will grow to $98.2 billion in 2012, accounting for 19
percent of all measured media spending (O’Leary, 2012).
ANSWER: The purpose of a virtual private server is to create the impression that the client maintains its own
server. Virtual private server technology enables one server to be virtually split into many addressable
servers, each for a different client and with its own domain name. This option is usually less
expensive than renting a dedicated server, while enjoying the same benefits, including full control of
the content of the virtual server.
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.