Consumer shopping on the web is often called

Assignment Help Basic Computer Science
Reference no: EM13858163

Q1. In the mid-1990s, ____ used a SWOT analysis to create a strong business strategy that has helped it become a strong competitor after facing threats from Compaq and IBM.
a. HP Computer
b. Acer Computer
c. Dell Computer
d. NEC Computer

Q2. Nobel laureate Ronald Coase reasoned that when transaction costs were low, businesspeople would form organizations to replace market-negotiated transactions.
a. true
b. false

Q3. Transactions are conducted between businesses on the Web is often called ____.
a. B2B
b. B2C
c. C2C
d. e-business

Q4. SWOT is the acronym for ____.
a. supply, wealth, occupations, and threats
b. supply, weaknesses, opportunities, and testing
c. strengths, weaknesses, opportunities, and threats
d. strengths, wealth, occupations, and testing

Q5. Consumer shopping on the Web is often called ____.
a. B2B
b. B2C
c. B2G
d. e-business

Q6. Electronic commerce reduces the speed and accuracy with which businesses can exchange information.
a. true
b. false

Q7. The practice of an existing firm replacing one or more of its supplier markets with its own hierarchical structure for creating the supplied product is called ____.
a. marketing process
b. market integration
c. vertical integration
d. horizontal integration

Q8. In ____ analysis, the analyst first looks into the business unit to identify its strength and weaknesses.
a. SWOT
b. strategic
c. commerce
d. transaction

Q9. Asymmetric connections provide the same bandwidth for each direction.
a. true
b. false

Q10. An OC12 connection provides ____.
a. 156 Mbps
b. 622 Mbps
c. 2.5 Gbps
d. 10 Gbps

Q11. ____ specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet.
a. SMTP
b. TCP/IP
c. MIME
d. POP

Q12. A T3 line operates at ____.
a. 1.544 Mbps
b. 24 Mbps
c. 44.736 Mbps
d. 1 Gbps

Q13. POP allows users to search for and manipulate only those e-mail messages that they have downloaded to their computers.
a. true
b. false

Q14. One version of fixed-point wireless directly transmits Wi-Fi packets through hundreds, or even thousands, of short-range transceivers that are located close to each other. This approach is called Etherlinx.
a. true
b. false

Q15. An IP address is a 128-bit number used to identify computers connected to the Internet.
a. true
b. false

Q16. An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear.
a. true
b. false

Q17. Channel conflict is also referred to as ____.
a. Web conflict
b. account aggregation
c. cannibalization
d. addressable media

Q18. When customers buy a product they are also buying that service element.
a. true
b. false

Q19. Any product that is likely to be useful after the original buyer uses it provides the potential for a classified advertising site.
a. true
b. false

Q20. In the personal contact approach, firms prepare advertising and promotional materials about the firm and its products or services.
a. true
b. false

Q21. In the fee-for-service model, the fee is based on the value of the service provided.
a. true
b. false

Q22. The introduction of a new intermediary into a value chain is called ____.
a. intermediation
b. disintermediation
c. reintermediation
d. bill presentment

Q23. Gift retailers on the Web use the advertising-supported revenue model.
a. true
b. false

Q24. Coca Cola and Pepsi have developed identical Web presences.
a. true
b. false

Q25. A banner ad is a small rectangular object on a Web page that displays a stationary or moving graphic without a hyperlink to the advertiser.
a. true
b. false

Q26. The weighting of the factors that search engines use to decide which URLs appear first on searches for a particular search term is called search engine directory.
a. true
b. false

Q27. The fees charged for domain name hosting are much higher than that charged for hosting an active Web site.
a. true
b. false

Q28. Technology-enabled relationship management is often called ____.
a. relationship management
b. customer relationship management
c. automated relationship management
d. domain name management

Q29. Advertising a brand or a company name is a common way for companies to achieve the awareness stage of customer loyalty.
a. true
b. false

Q30. One of the key elements of a brand is ____.
a. marketspace
b. style
c. perceived value
d. micromarketing

Q31. Good customer experiences can help create an intense feeling of loyalty toward the company and its products or services.
a. true
b. false

Q32. In the information world's marketspace, digital products and services can be delivered through ____.
a. US mail
b. Federal Express
c. UPS
d. the Internet

Q33. In 1999, Ericsson launched a Web site to facilitate knowledge management.
a. true
b. false

Q34. A(n) ____ has a password-protected entrance and offers negotiated price reductions on a limited selection of products.
a. customer portals marketplace
b. private marketplace
c. private store
d. independent exchange

Q35. By engaging competitors in cooperative, long-term relationships, companies have found that they can work together with these competitors to identify new ways to provide their own customers with faster, cheaper, and better services.
a. true
b. false

Q36. In ____ purchasing, the company negotiates long-term contracts for most of the materials it will need.
a. spot
b. private
c. tier-one
d. contract

Q37. Technologies such as virtual private networks are providing the security that makes extranets increasingly attractive.
a. true
b. false

Q38. With respect to EDIs, the two businesses that exchange information are called ____.
a. traders
b. hand-shakers
c. trading partners
d. collaborators

Q39. ____ requires each business in the network to operate its own on-site EDI translator computer.
a. Indirect connection EDI
b. Direct connection EDI
c. Repeated EDI
d. Wired EDI

Q40. One term used to describe procurement activities is ____.
a. customer portal
b. supply management
c. replenishment purchasing
d. independent exchange

Q41. Companies that implement e-procurement software usually require that suppliers bid on their business.
a. true
b. false

Q42. The Dutch auction is also called an ascending-price auction.
a. true
b. false

Q43. In 1999 alone, Yahoo! spent over ____ billion in cash and stock to expand the range of services available on its Web portal site.
a. 10
b. 20
c. 30
d. 50

Q44. Which of the following takes an item and creates an online auction for that item, handles the transaction, and remits the balance of the proceeds after deducting a fee?
a. auction consignment service
b. PriceScan
c. Web community
d. escrow service

Q45. Analysts believe that a more appropriate term for the electronic commerce that occurs in general consumer auctions is consumer-to-consumer.
a. true
b. false

Q46. The 18th century saw the birth of two British auction houses, ____ in 1744 and Christie's in 1766.
a. William's
b. Sotheby's
c. Vickrey's
d. Klik-Klok

Q47. The first auctioning software, named Cricket Jr., was written by David Eccles in 1997.
a. true
b. false

Q48. In ____ A.D., the Praetorian Guard auctioned off the entire Roman Empire after killing the Emperor Pertinax.
a. 193
b. 410
c. 623
d. 1014

Q49. The English auction is also called a(n) ____.
a. ascending-price auction
b. descending-price auction
c. step-price auction
d. moving-price auction

Q50. The ____ auction is a form of open auction in which bidding starts at a high price and drops until a bidder accepts the price.
a. English
b. Dutch
c. Australian
d. Spanish

 

 

Reference no: EM13858163

Questions Cloud

Difference between a standard rule-based and a fuzzy expert : Consider the difference between a standard rule-based expert system and a fuzzy expert system.
Create a chart of cash vs sales : Create a chart of cash vs. sales and add a linear trend line.  Is the cash balance a consistent percentage of sales?  Does the relationship fit your expectations?
Do you think that views expressed here for this generation : Do you think that the views expressed here for this generation would also be similar across other industries (other than banking)
Define a needs analysis based on the design brief : A needs analysis based on the design brief, common knowledge of light aircraft and model aircraft, and your imagination that surfaces the stakeholders, system context, at least one design scenario and key stakeholder needs.
Consumer shopping on the web is often called : Consumer shopping on the Web is often called
Discuss scope and nature of knowledge-and-information-system : Critically discuss the challenges faced by SAHARA and management's responsibility in overcoming them and explain competitive advantage as a construct and discuss the scope and nature of ‘Knowledge-and-Information-Systems" enabled competitive strate..
Explain what is the ethical dilemma or issue : You work in the Human Resource (HR) Department of the Green Jet Airways Company. Most of your flights are to various Asian countries. What is the ethical dilemma or issue
Describe about human-computer interaction : human-computer interaction
Compute all internal angles of given the lengths : The bearing and distances of the traverse with stations 1,2,3 and 4 together with the radiations to the corners A,B,C and D of the building are shown below. The coordinates of station 1 are (5000E, 5OOON)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a house class that has the following properties

Total number of rooms ( calculated: number of bedrooms + formal dining room if present + 1 for kitchen)Number of baths (house can have any number of 1/2 bath or 1/4 of a bath in addition to a full bath - example 1.5, 1.75 or 1.25 bath)

  Determine if the given subset is a subspace

Determine if the given subset is a subspace of the given vector space. Prove your claim - Is the set P of all polynomials of the form p(x) = a+x2, with a ? R, a subspace of P2?

  Want to confirm and verify prior to notifying users

The database administrator for your company. Your staff just informed you that they have noticed several unauthorized attempts to access the database. You are trying to decide how to address this issue to your management team. What type of informatio..

  Determine the mix of cargo

The load master for a freighter wants to determine the mix of cargo to be carried on the next trip. The ship's volume limit for cargo is 100,000 cubic meters, and its weight capacity is 2,310 tons.

  Estimate the mean and variance of the number of times

Estimate the mean and variance of the number of times you have to roll 2 dice until the total exceeds 100.

  What is the recommended overlap of wap coverage

What is the recommended overlap of WAP coverage and why?

  Difference between a business case and a business plan

Define Business Case and explain the difference between a Business Case and a Business Plan.

  Write a shell script named grepdir

Write a shell script, named grepdir.sh, that searches for a pattern in a directory, and all of its subdirectories.The starting directory is the first argument, the pattern is the second parameter, and the options for grep are all succeeding paramet..

  Evaluate an expression and display one value

What function would you use in Access to evaluate an expression and display one value when the expression is true, and another value when the expression is false?

  Perform a baseline study for pbsc

Assignment: Perform a baseline study for PBSC (palm beach state college) network (need to make assumptions). Create a list of all network devices (servers, routers, bridges, hubs, and so on... keep in mind that there are five campuses). What protocol..

  Discuss what is and how the auto discovery feature of simple

Discuss what is and how the auto-discovery feature of Simple Network Management Protocol (SNMP) operates? Give a real-world scenario where this technology would be an appropriate fit (or not)?

  Explain how you can extend the sci capability

Explain how you can extend the SCI capability to RF and Bluetooth communication - Imagine an RFID device connected to SCI0 that sends a 16 character code to the DB-12 board when an item is swiped

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd