TMĐT C5 C8
TMĐT C5 C8
TMĐT C5 C8
E-commerce Security
and Payment Systems
Instructor: Nguyen The Dai Nghia
Email: nghiantd@uel.edu.vn
Phone/Zalo: 0936385487
Chapter 5
E-commerce Security and Payment System
Learning Objectives
5.1 Understand the scope of e-commerce crime and security problems, the key dimensions
of e-commerce security, and the tension between security and other values.
5.2 Identify the key security threats in the e-commerce environment.
5.3 Describe how technology helps secure Internet communications channels and protect
networks, servers, and clients.
5.4 Appreciate the importance of policies, procedures, and laws in creating security.
5.5 Identify the major e-commerce payment systems in use today.
5.6 Describe the features and functionality of electronic billing presentment and payment
systems.
Malicious Code
• Exploits and exploit kits
• Maladvertising
• Drive-by downloads
• Viruses
• Worms
• Ransomware
• Trojan horses
• Backdoors
• Bots, botnets
Phishing
• Any deceptive, online attempt by a third party to obtain confidential
information for financial gain
• Tactics
• Social engineering
• E-mail scams and Business Email Compromise (BEC) phishing
• Spear phishing
• Used for identity fraud and theft
Data Breaches
• Organization loses control over corporate information to outsiders
• Over 1,575 breaches in 2017, 45% increase over 2016
• Yahoo and Equifax two of the most notorious; Facebook breach in 2018
exposed personal information of 30 million
• Leading causes
• Hacking
• Unauthorized access
• Employee error/negligence
Identity Fraud/Theft
• Unauthorized use of another person’s personal data for illegal financial
benefit
• Social security number
• Driver’s license
• Credit card numbers
• Usernames/passwords
• 2017: Almost 17 million U.S. consumers suffered identity fraud
Insider Attacks
• Largest threat to business institutions come from insider embezzlement
• Employee access to privileged information
• Poor security procedures
• Insiders more likely to be source of cyberattacks than outsiders
Technology Solutions
• Protecting Internet communications
• Encryption
• Securing channels of communication
• SSL, TLS, VPNs, Wi-Fi
• Protecting networks
• Firewalls, proxy servers, IDS, IPS
• Protecting servers and clients
• OS security, anti-virus software
Encryption
• Encryption
• Transforms data into cipher text readable only by
sender and receiver
• Secures stored information and information
transmission
• Provides 4 of 6 key dimensions of e-commerce
security:
• Message integrity
• Nonrepudiation
• Authentication
• Confidentiality
Digital Envelopes
• Address weaknesses of:
• Public key cryptography
• Computationally slow, decreased transmission speed, increased
processing time
• Symmetric key cryptography
• Insecure transmission lines
• Uses symmetric key cryptography to encrypt document
• Uses public key cryptography to encrypt and send symmetric key
Limitations of PKI
• Doesn’t protect storage of private key
• PKI not effective against insiders, employees
• Protection of private keys by individuals may be haphazard
• No guarantee that verifying computer of merchant is secure
• CAs are unregulated, self-selecting organizations
Protecting Networks
• Firewall
• Hardware or software that uses security policy to filter
packets
• Packet filters
• Application gateways
• Next-generation firewalls
• Proxy servers (proxies)
• Software servers that handle all communications from or
sent to the Internet
• Intrusion detection systems
• Intrusion prevention systems
Blockchain
• Blockchain
• Enables organizations to create and verify transactions
nearly instantaneously using a distributed P2P database
(distributed ledger)
• Benefits:
• Reduces costs of verifying users, validating transactions,
and risks of storing and processing transaction
information
• Transactions cannot be altered retroactively and
therefore are more secure
• Foundation technology for cryptocurrencies and supply
chain management, as well as potential applications in
financial services and healthcare industries
Copyright © 2020 Pearson Education Ltd. All Rights Reserved
Chapter 5
E-commerce Security and Payment System
Cryptocurrencies
• Use blockchain technology and cryptography to create a purely digital
medium of exchange
• Bitcoin the most prominent example
• Value of Bitcoins have widely fluctuated
• Major issues with theft and fraud
• Some governments have banned Bitcoin, although it is gaining
acceptance in the U.S.
• Other cryptocurrencies (altcoins) include Ethereum/Ether, Ripple, Litecoin
and Monero
• Initial coin offerings (I C Os) being used by some startups to raise capital
Careers in E-commerce
• Position: Cybersecurity Threat Management Team Trainee
• Qualification/Skills
• Preparing for the Interview
• Possible Interview Questions
1) Which of the following statements about Internet usage in the United States is not true?
A) In 2018, around 280 million people of all ages had access to the Internet.
B) In 2018, the growth in the number of new online users was less than 2%.
C) Over 90% of all U.S. Internet users access the Internet using a mobile device.
D) Adults in the 25-to-54-age group have the highest percentage of Internet use.
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
2) Research shows the two key factors shaping the decision to purchase online are utility and
trust.
Answer: TRUE
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
3) Which of the following is not one of the main stages of the online purchasing process?
A) post-purchase service and loyalty
B) awareness
C) engagement
D) conversation
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
4) What is the approximate Internet penetration rate for individuals that have attained less than a
high-school education?
A) 55%
B) 65%
C) 75%
D) 85%
Answer: B
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
5) All of the following are online communications used to support the evaluation of alternatives
stages of the consumer decision process except:
A) search engines.
1
Copyright © 2020 Pearson Education, Inc.
B) online catalogs.
C) social networks.
D) targeted banner ads.
Answer: D
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
7) In modeling online consumer behavior, the concept of "consumer skills" refers to the:
A) education level of the consumer.
B) communication skills of the consumer.
C) knowledge consumers have about how to conduct online transactions.
D) product evaluation skills of the consumer.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
8) A roughly equal percentage of men and women use the Internet today.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
9) Consumers choose the online channel primarily due to social media influence.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
11) The majority of online shoppers find vendors by clicking on display ads.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
12) Which of the following online advertising formats attracted the least amount of spending in
2018?
A) search
B) classifieds
C) rich media
D) e-mail
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
13) Google introduced which of the following changes to its search algorithm to weed out low
quality sites from search results?
A) Penguin
B) Hummingbird
C) Panda
D) Knowledge Graph
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
14) Which of the following forms of online advertising is expected to grow the most between
2018 and 2022?
A) paid search
B) sponsorships
C) search engines
D) video
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
15) Which of the following is not one of the four main methods advertisers use to behaviorally
3
Copyright © 2020 Pearson Education, Inc.
target ads?
A) Nielsen ratings
B) data collected from social networks
C) integration of online data with offline data
D) clickstream data
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
16) Which of the following search engine algorithm updates targets websites that violate
Google’s guidelines?
A) Panda
B) Penguin
C) Hummingbird
D) Fred
Answer: D
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
17) Which of the following is not true about search engine advertising?
A) Spending on search engine advertising constitutes about 44% of all online advertising
spending.
B) The top three search engine providers supply over 95% of all online searches.
C) The click-through rate for search engine marketing has been fairly steady over the years.
D) Search engine advertising is the slowest growing type of online advertising.
Answer: D
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
18) Which of the following is not a practice that degrades the results and usefulness of search
engines?
A) social search
B) link farms
C) content farms
D) click fraud
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
A) viral marketing
B) local marketing
C) affiliate marketing
D) lead generation marketing
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
22) The percentage of all e-mail that is spam averaged around ________ in 2017.
A) 55%
B) 65%
C) 75%
D) 85%
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
C) CAN-SPAM prohibits the use of deceptive subject lines and false headers.
D) Large spammers are among CAN-SPAM's biggest supporters.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
24) Which of the following statements about Canada's anti-spam law is not true?
A) Canada's law is based on an opt-in model.
B) The law has no impact on companies located within the United States.
C) The first phase of the law went into effect in 2014.
D) The law applies to e-mail, texts, and social media messaging.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
25) Which of the following is the most important tool in establishing a relationship with the
customer?
A) company website
B) company CRM system
C) Facebook
D) search engine display ads
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
26) All of the following are "traditional" online marketing tools except:
A) affiliate marketing.
B) e-mail and permission marketing.
C) social marketing.
D) sponsorship marketing.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
27) All of the following are among those most frequently affected by ad-blocking except:
A) gaming sites.
B) newsgroup/forums.
C) social network sites.
D) online retailers.
Answer: D
6
Copyright © 2020 Pearson Education, Inc.
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
28) The Nike iD program is an example of which of the following marketing techniques?
A) customer co-production
B) transactive content
C) price discrimination
D) permission marketing
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
29) The incremental cost of building the next unit of a good is called the:
A) Law of One Price.
B) variable cost.
C) marginal cost.
D) fixed cost.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
30) Which of the following statements about a free pricing strategy is false?
A) Free products and services can knock out potential and actual competitors.
B) The free pricing strategy was born in the early days of the Web.
C) It is difficult to convert free customers into paying customers.
D) Free products and services can help build market awareness.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
31) Creating multiple variations of information goods and selling these to different market
segments at different prices is called:
A) bundling.
B) customization.
C) dynamic pricing.
D) versioning.
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
7
Copyright © 2020 Pearson Education, Inc.
33) Which of the following involves getting customers to pass along a company's marketing
message to friends, family, and colleagues?
A) affiliate marketing
B) viral marketing
C) native advertising
D) lead generation marketing
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
34) Group M, the world’s largest advertising buyer, requires which of the following in order for
an ad to be considered viewable?
A) 50% of the pixels must be in view for at least one second.
B) 50% of the pixels must be in view for at least two seconds.
C) 100% of the pixels must be in view for at least one second
D) 100% of the pixels must be in view for at least two seconds
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
35) Which of the following is based on the idea of complete price transparency in a perfect
information marketplace?
A) the Law of One Price
B) dynamic pricing
C) price discrimination
D) versioning
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
8
Copyright © 2020 Pearson Education, Inc.
36) Which of the following industries accounts for the highest percentage of spending on online
advertising?
A) financial services
B) retail
C) automotive
D) entertainment
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
37) Which of the following statements about native advertising is not true?
A) Native advertising’s share of mobile display ad revenues exceeds 75%.
B) Native advertising is a new form of advertising found only online.
C) Native advertising is growing rapidly, especially on social networks.
D) Consumers look at native ads much more frequently than display ads.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
38) Which of the following is an automated, auction-based method for matching demand and
supply for online display ads?
A) retargeting
B) behavioral targeting
C) programmatic advertising
D) keyword advertising
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
39) Research has found that most of the ad impressions served across display advertising
platforms are not viewable.
Answer: TRUE
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
40) The highest amount of online advertising spending is for online video ads.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
9
Copyright © 2020 Pearson Education, Inc.
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
41) Evidence suggests that real-time customer chat increases the dollar value of transactions.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
42) Consumers tend to look at native ads more frequently than they look at display ads.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
44) The top four display ad companies together account for almost 60% of U.S. display ad
revenues.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
45) The concept of "customer satisfaction" is broader than the concept of "customer experience."
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
46) Bundling is the process of selling two or more products together for a price that is less than
the sum of the two product's individual prices.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
Answer: Blogs have been around for a decade and are a part of the mainstream online culture.
Around 30 million people write blogs, and around 84 million read blogs. Blogs play a vital role
in online marketing. Although more firms use Twitter and Facebook, these sites have not
replaced blogs, and in fact often point to blogs for long-form content. Because blog readers and
creators tend to be more educated, have higher incomes, and be opinion leaders, blogs are ideal
platforms for ads for many products and services that cater to this kind of audience. Because
blogs are based on the personal opinions of the writers, they are also an ideal platform to start a
viral marketing campaign. Advertising networks that specialize in blogs provide some efficiency
in placing ads, as do blog networks, which are collections of a small number of popular blogs,
coordinated by a central management team, and which can deliver a larger audience to
advertisers.
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
48) How do the Interactive Advertising Bureau’s new standard ad unit portfolio and guidelines
released in July 2017 differ from its earlier guidelines for display ads.
Answer: For many years, IAB categorized display ads based on fixed pixel sizes, such as a
medium rectangle (300 x 250 pixels), large rectangle (336 x 280 pixels), leaderboard (728 x 90
pixels), and half-page (300 x 600 pixels) (the top performing sizes, according to Google).
However, in July 2017, the IAB released the final version of its new standard ad unit portfolio,
based on aspect ratio and size range, rather than fixed pixel size, allowing for flexible sizing and
delivery of a more consistent ad experience across multiple screen sizes and devices. Ad types
are now identified as horizontal (typically placed at the top or bottom of the screen), vertical
(typically placed on the right or left edge of the screen), tiles (typically placed in a grid layout),
or full page (which cover the full screen of the device in either a portrait or landscape layout).
The guidelines are based on HTML5 technology and cover all types of display ads, as well as
new ad experiences such as augmented reality, virtual reality, 360-degree ads, and emoji ads,
among others. Another important aspect of the new guidelines is their incorporation of LEAN
principles. LEAN is an acronym that stands for lightweight, encrypted, AdChoices-supported,
and non-invasive advertising. In an attempt to enhance consumer acceptance of advertising, the
standard contains guidelines with respect to animations, ad expansions, close buttons, user
initiation, interstitials (ads that appear before, in-between, or after the primary content), video
and auto-play video and audio. LEAN also includes a list of disruptive ad experiences that are
no longer permitted, such as pop-up ads (ads that overlay or cover the content after the user has
started viewing the content), auto expansion (ads that expand without user initiation), auto-play
video with audio, and flashing animations.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
49) Discuss the changes that Google has made to its search algorithms to improve search results
and user experience.
Answer: Google makes frequent changes to their search algorithms to improve search results
and user experience. Google, for instance, reportedly makes over 600 search engine changes in a
year. Most are small unannounced tweaks. Recent major changes have included Panda, Penguin,
11
Copyright © 2020 Pearson Education, Inc.
Semantic search more closely follows conversational search, or search as you would ordinarily
speak it to another human being. Google introduced Knowledge Graph in 2012 as an effort to
anticipate what you might want to know more about as you search on a topic or answer questions
you might not thought of asking. Since 2013, results of Knowledge Graph appear on the right of
the screen and contain more information about the topic or person you are searching on. Not all
search terms have a Knowledge Graph result. Google displays information based on what other
users have searched for in the past, as well as its database on over 500 million objects (people,
places, and things), and some 18 billion facts. In 2015, Google released a new algorithm update
(nicknamed Mobilegeddon) that made the "mobile-friendliness" of websites a much stronger
ranking factor for mobile searches. Websites that are not optimized for mobile now have a much
lower ranking in mobile search results. Starting in November 2015, Google also began lowering
the search rank of mobile websites that display an ad that obscures the screen and asks users
whether they would like to install the site's mobile app, because such ads are less mobile-
friendly. In 2016, Google introduced Possum, an algorithm update that varies search results
based on the user's location; so, for example, the closer a user is to a business's address, the more
likely it is to appear among the local results. In 2017, Google released the Fred algorithm, which
targets websites that violate Google's guidelines, primarily blogs with low-value, ad-centered
content. Throughout 2018, Google also released several unnamed core algorithm updates, about
which it did not provide many details.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
50) Which of the following would you implement to collect and analyze your company's big
data?
A) data warehouse
B) Hadoop
C) SQL
D) profiling
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
12
Copyright © 2020 Pearson Education, Inc.
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
51) Which of the following statements about the Internet's impact on marketing is not true?
A) The Internet has broadened the scope of marketing communications.
B) The Internet has decreased the impact of brands.
C) The Internet has increased the richness of marketing communications.
D) The Internet has expanded the information intensity of the marketplace.
Answer: B
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
52) Which of the following features of e-commerce technology has reduced the cost of
delivering marketing messages and receiving feedback from users?
A) ubiquity
B) richness
C) information density
D) universal standards
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
53) Which feature of e-commerce technology decreases the cost of delivering marketing
messages and receiving feedback from users?
A) personalization/customization
B) universal standards
C) ubiquity
D) interactivity
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
54) The richness made possible by e-commerce technologies does which of the following?
A) It reduces the cost of delivering marketing messages and receiving feedback from users.
B) It allows consumers to become co-producers of the goods and services being sold.
C) It allows video, audio, and text to be integrated into a single marketing message and
consuming experience.
D) It enables worldwide customer service and marketing communications.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
13
Copyright © 2020 Pearson Education, Inc.
marketing.
55) Which of the following is a Google algorithm update related to local search?
A) Penguin
B) Hummingbird
C) Panda
D) Possum
Answer: D
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
56) All of the following statements about cookies are true except:
A) cookies can be used to create cross-site profiles of users.
B) the data typically stored in cookies includes a unique ID and e-mail address.
C) cookies make shopping carts possible by allowing a site to keep track of a user's actions.
D) the more cookies are deleted, the less accurate ad server metrics become.
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
58) ________ is an open source database that can store and analyze both structured and
unstructured data.
A) ASP
B) PHP
C) Hadoop
D) JSP
Answer: C
Difficulty: Easy
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
59) A ________ is a repository of customer information that records all contacts that a customer
14
Copyright © 2020 Pearson Education, Inc.
has with a firm and generates a customer profile available to everyone in the firm with a need to
know the customer.
A) customer service chat system
B) CRM system
C) data warehouse
D) transactive content system
Answer: B
Difficulty: Easy
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
60) The marketing technique known as ________ involves merchants offering many products for
which there is little demand.
A) long tail marketing
B) flash marketing
C) yield management
D) bait-and-switch
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
61) Which of the following provides web marketers with a very quick means of identifying a
customer and understanding his or her behavior at a site?
A) transaction logs
B) cookies
C) registration forms
D) data warehouses
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
marketing.
64) What are two methods being developed to track consumers across devices?
Answer: Two methods being developed to track consumers across devices are deterministic
cross-device tracking and probabilistic cross-device tracking. Deterministic cross-device tracking
relies on personally identifiable information such as e-mail address used to log into an app and
website on different devices. Facebook, Google, Apple, Twitter, and other companies that have
very large user bases and have both desktop and mobile properties that require logins are the
most likely to be able to effectively exploit deterministic matching.
65) What is big data and why are marketers interested in it?
Answer: Big data usually refers to very large data sets in the petabyte and exabyte range—in
other words, billions to trillions of records, often from different sources. Big data is produced in
much larger quantities and much more rapidly than traditional data collection mechanisms. Even
though tweets are limited to 140 characters each, Twitter generates more than eight terabytes of
data daily. According to the IDC technology research firm, data is more than doubling every two
years, so the amount of data available to organizations is skyrocketing. The next frontier will be
data derived from the Internet of Things (IoT). Making sense out of big data quickly to gain a
market advantage is critical.
Marketers are interested in big data because it allows them to link huge amounts of data from a
variety of different sources, which in the past they were unable to do, and mine if for patterns of
consumer behavior, with the potential to derive new insights into customer behavior, financial
market activity, or other phenomena. For instance, Evrythng, an IoT platform company, has
partnered with Trueffect, a digital ad firm, to develop ways that marketers can use data generated
by connected appliances and other devices to directly communicate with and target advertising
with consumers. However, to derive business value from this data, organizations need new
technologies and analytic tools capable of managing and analyzing nontraditional data along
with their traditional enterprise data.
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
66) Discuss the revolution in Internet marketing technologies. What are the four main broad
impacts the Internet has had on marketing?
Answer: The Internet has had four broad impacts on marketing. First, the Internet as a
communications medium has broadened the scope of marketing. Marketing messages can now
easily reach a greater number of people. Second, the Internet has increased the richness of
16
Copyright © 2020 Pearson Education, Inc.
marketing communications by combining text, video, and audio content into rich messages.
Some even think that the Web is a richer medium than television or video because of the
complexity of messages and the huge amount of, and wide ranging, content that is available.
Third, the Internet has greatly expanded the information intensity of the marketplace by
providing marketers with fine-grained, detailed, real-time information about consumers as they
transact in the marketplace. Fourth, the always-on, always-attached, environment created by
mobile devices results in consumers being much more available to receive marketing messages.
One result is an extraordinary expansion in marketing opportunities for firms.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
67) What are web transaction logs, and how do they work in combination with registration
forms, shopping cart databases, and tracking files to help firms understand how customers
behave online?
Answer: Transaction logs, which are built into web server software, record user activity at a
website. Log file analysis tools cull information from these files, which can contain tens to
hundreds of entries for each user. Transaction log data becomes more useful when it is combined
with registration form data and shopping cart data. Registration forms and shopping cart database
are two other visitor generated data trails. Merchants use registration forms to gather personal
data such as the name, address, phone number, zip code, e-mail address, and other optional
information on the tastes and interests of the consumer. The shopping cart database captures all
the item selection, purchase, and payment data. The data from transaction logs, registration
forms, and the shopping cart database can also be combined with other information that users
submit on product forms, contribute in chat rooms, or submit via e-mail messages to a firm to
produce a veritable treasure trove of information for both individual merchant sites and for the
industry as a whole.
Although the transaction log represents the foundation of online data collection, it is
supplemented by the use of cookies that are placed on a user's hard drive when he or she visits a
site. Cookies allow a website to store data on a user's machine that can be retrieved later. Cookies
provide marketers with a very quick means to identify each customer and to understand his or
her prior behavior at the site. Cookies can be used to determine how many people are visiting a
site, how many are repeat visitors, and how often they have visited. They also make shopping
cart and quick checkout possible by allowing a site to keep track of a user as he or she adds to
the shopping cart. Cookies can be combined with web bugs to create cross-site profiles. Web
beacons (sometimes called web bugs) are graphic files that are embedded in e-mails and on
websites. When a user opens an HTML format e-mail with an embedded web beacon, a request
is sent to the server for the graphic data. Web beacons are used to automatically transmit
information about the user and the page being viewed to a monitoring server to collect personal
browsing behavior and other personal information.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
68) Define and describe the functionality of customer relationship management (CRM) systems.
17
Copyright © 2020 Pearson Education, Inc.
In the past, firms generally did not maintain a single storehouse of customer information, and
any customer data was organized along product lines with each product line maintaining a
separate customer list. CRMs are part of the evolution towards customer-centric and segmented
market-based businesses, and away from this product-based model.
CRMs use database technology with capabilities for assessing the needs of individual customers
and differentiating products to meet those needs. The customer profiles generated by a CRM can
include a map of the customer's relationship with the firm, the products he or she has bought and
the frequency of purchases, the demographic and psychographic profile for each customer,
profitability measures, a complete contact history, and marketing and sales information
containing marketing campaigns that the customer received and the customer's responses to
them.
With these profiles, CRMs can be used to sell additional products and services, develop new
products, increase product utilization, reduce marketing costs, identify and retain profitable
customers, optimize service delivery costs, retain high lifetime value customers, enable personal
communications, improve customer loyalty, and increase product profitability.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
69) If you want to determine the size of your website's audience, the metric you will use for the
most accurate measurement will be:
A) page views.
B) unique visitors.
C) hits.
D) reach.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
18
Copyright © 2020 Pearson Education, Inc.
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
72) Uber has been criticized for using which of the following?
A) flash marketing
B) bundling
C) surge pricing
D) freemium
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
75) eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the
following?
A) the total number of impressions
B) the total number of impressions in hundreds
C) the total number of impressions in thousands
D) the total number of impressions in millions
19
Copyright © 2020 Pearson Education, Inc.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
76) Which of the following measures the average length of stay at a website?
A) loyalty
B) stickiness
C) page views
D) retention rate
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
80) Which of the following measures the ratio of items purchased to product views?
20
Copyright © 2020 Pearson Education, Inc.
A) conversion rate
B) cart conversion rate
C) browse-to-buy ratio
D) view-to-cart ratio
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
81) Which of the following measures the percentage of e-mails that could not be delivered?
A) abandonment rate
B) unsubscribe rate
C) bounce-back rate
D) attrition rate
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
82) Which of the following is the most meaningful metric for video ads?
A) view time
B) CTR
C) completion rate
D) skip rate
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
22
Copyright © 2020 Pearson Education, Inc.
Learning Objectives
6.1 Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
6.2 Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
6.3 Identify and describe the main technologies that support online marketing.
6.4 Understand the costs and benefits of online marketing communications.
• More personalized
• More participatory
• More peer-to-peer
• More communal
• The most effective Internet marketing has all four features
Display Ad Marketing (1 of 2)
• Banner ads
• Rich media ads
• Interstitial ads
• Video ads
• Far more effective than
other display formats
• Sponsorships
• Native advertising
Display Ad Marketing (2 of 2)
• Content marketing
• Advertising networks
• Ad exchanges, programmatic advertising, and real-time bidding (RTB)
• Display advertising issues
• Ad fraud
• Viewability
• Ad blocking
E-mail Marketing
• Direct e-mail marketing
• Messages sent directly to interested users
• Benefits include
• Inexpensive
• Average around 3% to 4% click-throughs
• Measuring and tracking responses
• Personalization and targeting
• Three main challenges
• Spam
• Anti-spam software
• Poorly targeted purchased e-mail lists
Spam
• Unsolicited commercial e-mail
• Around 55% of all e-mail in 2017
• Most originates from bot networks
• Efforts to control spam have largely failed:
• Government regulation (CAN - SPAM)
• State laws
• Voluntary self-regulation by industries (DMA)
• Canada’s stringent anti-spam laws
Multi-Channel Marketing
• Integration of online and offline marketing
• Increasing percentage of American media consumers use several media at
once
• Reinforce branding messages across media
• Most effective multi-channel campaigns use consistent imagery across
media
Insight on Business: Are the Very Rich Different from You and
Me?
• Class Discussion
• What distinguishes luxury marketing from ordinary retail marketing?
• What challenges do luxury retailers have in translating their brands and
the look and feel of luxury shops into Web sites?
• How has social media affected luxury marketing?
• Visit the Net-a-Porter website. What do you find there?
Pricing Strategies (1 of 2)
• Pricing: integral part of marketing strategy
• Traditional pricing based on fixed costs, variable costs, demand curve
• Marginal costs
• Marginal revenue
• Piggyback strategy
• Price discrimination
Pricing Strategies (2 of 2)
• Free and freemium
• Versioning
• Bundling
• Dynamic pricing
• Auctions
• Yield management
• Surge pricing
• Flash marketing
Insight on Technology: The Long Tail: Big Hits and Big Misses
• Class Discussion
• What are recommender systems? Give an example of one you have
used.
• What is the Long Tail and how do recommender systems support sales
of items in the Long Tail?
• How can human editors, including consumers, make recommender
systems more helpful?
Databases
• Enable profiling
• Store records and attributes
• Database management system (DBMS):
• SQL (Structured Query Language):
• Industry-standard database query and manipulation language used in
a relational database
• Relational databases
Marketing Analytics
• Software that analyzes data at each stage of the customer
conversion process
• Awareness
• Engagement
• Interaction
• Purchase activity
• Loyalty and post-purchase
• Helps managers
• Optimize ROI on website and marketing efforts
• Build detailed customer profiles
• Measure impact of marketing campaigns
Careers in E-commerce
• Position: Digital Marketing Assistant
• Qualification/Skills
• Preparing for the Interview
• Possible Interview Questions
Learning Objectives
7.1 Understand the difference between traditional online marketing and the new
social-mobile-local marketing platforms and the relationships between social,
mobile, and local marketing.
7.2 Understand the social marketing process from fan acquisition to sales and the
marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
7.3 Identify the key elements of a mobile marketing campaign.
7.4 Understand the capabilities of location-based local marketing.
Social Marketing
• Traditional online marketing goals
• Deliver business message to the most consumers
• Social marketing goals
• Encourage consumers to become fans and engage
and enter conversations
• Strengthen brand by increasing share of online
conversation
Facebook Marketing
• Basic Facebook features
• News Feed
• Timeline (Profile)
• Search
• Social density of audience is magnified
• Facebook is largest repository of deeply personal information
• Facebook geared to maximizing connections between users
Mobile Marketing
• Over 255 million Americans use a mobile device for Internet access
• Devices used multiple times per day
• By 2021, m-commerce will account for more than 50% of all retail and
travel e-commerce.
• Challenges: Mobile search
• Motivating consumers to click
• Raising fees for each click
Careers in E-commerce
• Position: Social Media Associate
• Qualification/Skills
• Preparing for the Interview
• Possible Interview Questions
Copyright
1) Which of the following statements about Internet usage in the United States is not true?
A) In 2018, around 280 million people of all ages had access to the Internet.
B) In 2018, the growth in the number of new online users was less than 2%.
C) Over 90% of all U.S. Internet users access the Internet using a mobile device.
D) Adults in the 25-to-54-age group have the highest percentage of Internet use.
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
2) Research shows the two key factors shaping the decision to purchase online are utility and
trust.
Answer: TRUE
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
3) Which of the following is not one of the main stages of the online purchasing process?
A) post-purchase service and loyalty
B) awareness
C) engagement
D) conversation
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
4) What is the approximate Internet penetration rate for individuals that have attained less than a
high-school education?
A) 55%
B) 65%
C) 75%
D) 85%
Answer: B
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
5) All of the following are online communications used to support the evaluation of alternatives
stages of the consumer decision process except:
A) search engines.
1
Copyright © 2020 Pearson Education, Inc.
B) online catalogs.
C) social networks.
D) targeted banner ads.
Answer: D
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
7) In modeling online consumer behavior, the concept of "consumer skills" refers to the:
A) education level of the consumer.
B) communication skills of the consumer.
C) knowledge consumers have about how to conduct online transactions.
D) product evaluation skills of the consumer.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
8) A roughly equal percentage of men and women use the Internet today.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
9) Consumers choose the online channel primarily due to social media influence.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
11) The majority of online shoppers find vendors by clicking on display ads.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.1: Understand the key features of the Internet audience, the basic concepts
of consumer behavior and purchasing, and how consumers behave online.
12) Which of the following online advertising formats attracted the least amount of spending in
2018?
A) search
B) classifieds
C) rich media
D) e-mail
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
13) Google introduced which of the following changes to its search algorithm to weed out low
quality sites from search results?
A) Penguin
B) Hummingbird
C) Panda
D) Knowledge Graph
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
14) Which of the following forms of online advertising is expected to grow the most between
2018 and 2022?
A) paid search
B) sponsorships
C) search engines
D) video
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
15) Which of the following is not one of the four main methods advertisers use to behaviorally
3
Copyright © 2020 Pearson Education, Inc.
target ads?
A) Nielsen ratings
B) data collected from social networks
C) integration of online data with offline data
D) clickstream data
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
16) Which of the following search engine algorithm updates targets websites that violate
Google’s guidelines?
A) Panda
B) Penguin
C) Hummingbird
D) Fred
Answer: D
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
17) Which of the following is not true about search engine advertising?
A) Spending on search engine advertising constitutes about 44% of all online advertising
spending.
B) The top three search engine providers supply over 95% of all online searches.
C) The click-through rate for search engine marketing has been fairly steady over the years.
D) Search engine advertising is the slowest growing type of online advertising.
Answer: D
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
18) Which of the following is not a practice that degrades the results and usefulness of search
engines?
A) social search
B) link farms
C) content farms
D) click fraud
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
A) viral marketing
B) local marketing
C) affiliate marketing
D) lead generation marketing
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
22) The percentage of all e-mail that is spam averaged around ________ in 2017.
A) 55%
B) 65%
C) 75%
D) 85%
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
C) CAN-SPAM prohibits the use of deceptive subject lines and false headers.
D) Large spammers are among CAN-SPAM's biggest supporters.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
24) Which of the following statements about Canada's anti-spam law is not true?
A) Canada's law is based on an opt-in model.
B) The law has no impact on companies located within the United States.
C) The first phase of the law went into effect in 2014.
D) The law applies to e-mail, texts, and social media messaging.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
25) Which of the following is the most important tool in establishing a relationship with the
customer?
A) company website
B) company CRM system
C) Facebook
D) search engine display ads
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
26) All of the following are "traditional" online marketing tools except:
A) affiliate marketing.
B) e-mail and permission marketing.
C) social marketing.
D) sponsorship marketing.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
27) All of the following are among those most frequently affected by ad-blocking except:
A) gaming sites.
B) newsgroup/forums.
C) social network sites.
D) online retailers.
Answer: D
6
Copyright © 2020 Pearson Education, Inc.
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
28) The Nike iD program is an example of which of the following marketing techniques?
A) customer co-production
B) transactive content
C) price discrimination
D) permission marketing
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
29) The incremental cost of building the next unit of a good is called the:
A) Law of One Price.
B) variable cost.
C) marginal cost.
D) fixed cost.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
30) Which of the following statements about a free pricing strategy is false?
A) Free products and services can knock out potential and actual competitors.
B) The free pricing strategy was born in the early days of the Web.
C) It is difficult to convert free customers into paying customers.
D) Free products and services can help build market awareness.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
31) Creating multiple variations of information goods and selling these to different market
segments at different prices is called:
A) bundling.
B) customization.
C) dynamic pricing.
D) versioning.
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
7
Copyright © 2020 Pearson Education, Inc.
33) Which of the following involves getting customers to pass along a company's marketing
message to friends, family, and colleagues?
A) affiliate marketing
B) viral marketing
C) native advertising
D) lead generation marketing
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
34) Group M, the world’s largest advertising buyer, requires which of the following in order for
an ad to be considered viewable?
A) 50% of the pixels must be in view for at least one second.
B) 50% of the pixels must be in view for at least two seconds.
C) 100% of the pixels must be in view for at least one second
D) 100% of the pixels must be in view for at least two seconds
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
35) Which of the following is based on the idea of complete price transparency in a perfect
information marketplace?
A) the Law of One Price
B) dynamic pricing
C) price discrimination
D) versioning
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
8
Copyright © 2020 Pearson Education, Inc.
36) Which of the following industries accounts for the highest percentage of spending on online
advertising?
A) financial services
B) retail
C) automotive
D) entertainment
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
37) Which of the following statements about native advertising is not true?
A) Native advertising’s share of mobile display ad revenues exceeds 75%.
B) Native advertising is a new form of advertising found only online.
C) Native advertising is growing rapidly, especially on social networks.
D) Consumers look at native ads much more frequently than display ads.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
38) Which of the following is an automated, auction-based method for matching demand and
supply for online display ads?
A) retargeting
B) behavioral targeting
C) programmatic advertising
D) keyword advertising
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
39) Research has found that most of the ad impressions served across display advertising
platforms are not viewable.
Answer: TRUE
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
40) The highest amount of online advertising spending is for online video ads.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
9
Copyright © 2020 Pearson Education, Inc.
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
41) Evidence suggests that real-time customer chat increases the dollar value of transactions.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
42) Consumers tend to look at native ads more frequently than they look at display ads.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
44) The top four display ad companies together account for almost 60% of U.S. display ad
revenues.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
45) The concept of "customer satisfaction" is broader than the concept of "customer experience."
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
46) Bundling is the process of selling two or more products together for a price that is less than
the sum of the two product's individual prices.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
Answer: Blogs have been around for a decade and are a part of the mainstream online culture.
Around 30 million people write blogs, and around 84 million read blogs. Blogs play a vital role
in online marketing. Although more firms use Twitter and Facebook, these sites have not
replaced blogs, and in fact often point to blogs for long-form content. Because blog readers and
creators tend to be more educated, have higher incomes, and be opinion leaders, blogs are ideal
platforms for ads for many products and services that cater to this kind of audience. Because
blogs are based on the personal opinions of the writers, they are also an ideal platform to start a
viral marketing campaign. Advertising networks that specialize in blogs provide some efficiency
in placing ads, as do blog networks, which are collections of a small number of popular blogs,
coordinated by a central management team, and which can deliver a larger audience to
advertisers.
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
48) How do the Interactive Advertising Bureau’s new standard ad unit portfolio and guidelines
released in July 2017 differ from its earlier guidelines for display ads.
Answer: For many years, IAB categorized display ads based on fixed pixel sizes, such as a
medium rectangle (300 x 250 pixels), large rectangle (336 x 280 pixels), leaderboard (728 x 90
pixels), and half-page (300 x 600 pixels) (the top performing sizes, according to Google).
However, in July 2017, the IAB released the final version of its new standard ad unit portfolio,
based on aspect ratio and size range, rather than fixed pixel size, allowing for flexible sizing and
delivery of a more consistent ad experience across multiple screen sizes and devices. Ad types
are now identified as horizontal (typically placed at the top or bottom of the screen), vertical
(typically placed on the right or left edge of the screen), tiles (typically placed in a grid layout),
or full page (which cover the full screen of the device in either a portrait or landscape layout).
The guidelines are based on HTML5 technology and cover all types of display ads, as well as
new ad experiences such as augmented reality, virtual reality, 360-degree ads, and emoji ads,
among others. Another important aspect of the new guidelines is their incorporation of LEAN
principles. LEAN is an acronym that stands for lightweight, encrypted, AdChoices-supported,
and non-invasive advertising. In an attempt to enhance consumer acceptance of advertising, the
standard contains guidelines with respect to animations, ad expansions, close buttons, user
initiation, interstitials (ads that appear before, in-between, or after the primary content), video
and auto-play video and audio. LEAN also includes a list of disruptive ad experiences that are
no longer permitted, such as pop-up ads (ads that overlay or cover the content after the user has
started viewing the content), auto expansion (ads that expand without user initiation), auto-play
video with audio, and flashing animations.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
49) Discuss the changes that Google has made to its search algorithms to improve search results
and user experience.
Answer: Google makes frequent changes to their search algorithms to improve search results
and user experience. Google, for instance, reportedly makes over 600 search engine changes in a
year. Most are small unannounced tweaks. Recent major changes have included Panda, Penguin,
11
Copyright © 2020 Pearson Education, Inc.
Semantic search more closely follows conversational search, or search as you would ordinarily
speak it to another human being. Google introduced Knowledge Graph in 2012 as an effort to
anticipate what you might want to know more about as you search on a topic or answer questions
you might not thought of asking. Since 2013, results of Knowledge Graph appear on the right of
the screen and contain more information about the topic or person you are searching on. Not all
search terms have a Knowledge Graph result. Google displays information based on what other
users have searched for in the past, as well as its database on over 500 million objects (people,
places, and things), and some 18 billion facts. In 2015, Google released a new algorithm update
(nicknamed Mobilegeddon) that made the "mobile-friendliness" of websites a much stronger
ranking factor for mobile searches. Websites that are not optimized for mobile now have a much
lower ranking in mobile search results. Starting in November 2015, Google also began lowering
the search rank of mobile websites that display an ad that obscures the screen and asks users
whether they would like to install the site's mobile app, because such ads are less mobile-
friendly. In 2016, Google introduced Possum, an algorithm update that varies search results
based on the user's location; so, for example, the closer a user is to a business's address, the more
likely it is to appear among the local results. In 2017, Google released the Fred algorithm, which
targets websites that violate Google's guidelines, primarily blogs with low-value, ad-centered
content. Throughout 2018, Google also released several unnamed core algorithm updates, about
which it did not provide many details.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.2: Identify and describe the basic digital commerce marketing and
advertising strategies and tools.
50) Which of the following would you implement to collect and analyze your company's big
data?
A) data warehouse
B) Hadoop
C) SQL
D) profiling
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
12
Copyright © 2020 Pearson Education, Inc.
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
51) Which of the following statements about the Internet's impact on marketing is not true?
A) The Internet has broadened the scope of marketing communications.
B) The Internet has decreased the impact of brands.
C) The Internet has increased the richness of marketing communications.
D) The Internet has expanded the information intensity of the marketplace.
Answer: B
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
52) Which of the following features of e-commerce technology has reduced the cost of
delivering marketing messages and receiving feedback from users?
A) ubiquity
B) richness
C) information density
D) universal standards
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
53) Which feature of e-commerce technology decreases the cost of delivering marketing
messages and receiving feedback from users?
A) personalization/customization
B) universal standards
C) ubiquity
D) interactivity
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
54) The richness made possible by e-commerce technologies does which of the following?
A) It reduces the cost of delivering marketing messages and receiving feedback from users.
B) It allows consumers to become co-producers of the goods and services being sold.
C) It allows video, audio, and text to be integrated into a single marketing message and
consuming experience.
D) It enables worldwide customer service and marketing communications.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
13
Copyright © 2020 Pearson Education, Inc.
marketing.
55) Which of the following is a Google algorithm update related to local search?
A) Penguin
B) Hummingbird
C) Panda
D) Possum
Answer: D
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
56) All of the following statements about cookies are true except:
A) cookies can be used to create cross-site profiles of users.
B) the data typically stored in cookies includes a unique ID and e-mail address.
C) cookies make shopping carts possible by allowing a site to keep track of a user's actions.
D) the more cookies are deleted, the less accurate ad server metrics become.
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
58) ________ is an open source database that can store and analyze both structured and
unstructured data.
A) ASP
B) PHP
C) Hadoop
D) JSP
Answer: C
Difficulty: Easy
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
59) A ________ is a repository of customer information that records all contacts that a customer
14
Copyright © 2020 Pearson Education, Inc.
has with a firm and generates a customer profile available to everyone in the firm with a need to
know the customer.
A) customer service chat system
B) CRM system
C) data warehouse
D) transactive content system
Answer: B
Difficulty: Easy
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
60) The marketing technique known as ________ involves merchants offering many products for
which there is little demand.
A) long tail marketing
B) flash marketing
C) yield management
D) bait-and-switch
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
61) Which of the following provides web marketers with a very quick means of identifying a
customer and understanding his or her behavior at a site?
A) transaction logs
B) cookies
C) registration forms
D) data warehouses
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
marketing.
64) What are two methods being developed to track consumers across devices?
Answer: Two methods being developed to track consumers across devices are deterministic
cross-device tracking and probabilistic cross-device tracking. Deterministic cross-device tracking
relies on personally identifiable information such as e-mail address used to log into an app and
website on different devices. Facebook, Google, Apple, Twitter, and other companies that have
very large user bases and have both desktop and mobile properties that require logins are the
most likely to be able to effectively exploit deterministic matching.
65) What is big data and why are marketers interested in it?
Answer: Big data usually refers to very large data sets in the petabyte and exabyte range—in
other words, billions to trillions of records, often from different sources. Big data is produced in
much larger quantities and much more rapidly than traditional data collection mechanisms. Even
though tweets are limited to 140 characters each, Twitter generates more than eight terabytes of
data daily. According to the IDC technology research firm, data is more than doubling every two
years, so the amount of data available to organizations is skyrocketing. The next frontier will be
data derived from the Internet of Things (IoT). Making sense out of big data quickly to gain a
market advantage is critical.
Marketers are interested in big data because it allows them to link huge amounts of data from a
variety of different sources, which in the past they were unable to do, and mine if for patterns of
consumer behavior, with the potential to derive new insights into customer behavior, financial
market activity, or other phenomena. For instance, Evrythng, an IoT platform company, has
partnered with Trueffect, a digital ad firm, to develop ways that marketers can use data generated
by connected appliances and other devices to directly communicate with and target advertising
with consumers. However, to derive business value from this data, organizations need new
technologies and analytic tools capable of managing and analyzing nontraditional data along
with their traditional enterprise data.
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
66) Discuss the revolution in Internet marketing technologies. What are the four main broad
impacts the Internet has had on marketing?
Answer: The Internet has had four broad impacts on marketing. First, the Internet as a
communications medium has broadened the scope of marketing. Marketing messages can now
easily reach a greater number of people. Second, the Internet has increased the richness of
16
Copyright © 2020 Pearson Education, Inc.
marketing communications by combining text, video, and audio content into rich messages.
Some even think that the Web is a richer medium than television or video because of the
complexity of messages and the huge amount of, and wide ranging, content that is available.
Third, the Internet has greatly expanded the information intensity of the marketplace by
providing marketers with fine-grained, detailed, real-time information about consumers as they
transact in the marketplace. Fourth, the always-on, always-attached, environment created by
mobile devices results in consumers being much more available to receive marketing messages.
One result is an extraordinary expansion in marketing opportunities for firms.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
67) What are web transaction logs, and how do they work in combination with registration
forms, shopping cart databases, and tracking files to help firms understand how customers
behave online?
Answer: Transaction logs, which are built into web server software, record user activity at a
website. Log file analysis tools cull information from these files, which can contain tens to
hundreds of entries for each user. Transaction log data becomes more useful when it is combined
with registration form data and shopping cart data. Registration forms and shopping cart database
are two other visitor generated data trails. Merchants use registration forms to gather personal
data such as the name, address, phone number, zip code, e-mail address, and other optional
information on the tastes and interests of the consumer. The shopping cart database captures all
the item selection, purchase, and payment data. The data from transaction logs, registration
forms, and the shopping cart database can also be combined with other information that users
submit on product forms, contribute in chat rooms, or submit via e-mail messages to a firm to
produce a veritable treasure trove of information for both individual merchant sites and for the
industry as a whole.
Although the transaction log represents the foundation of online data collection, it is
supplemented by the use of cookies that are placed on a user's hard drive when he or she visits a
site. Cookies allow a website to store data on a user's machine that can be retrieved later. Cookies
provide marketers with a very quick means to identify each customer and to understand his or
her prior behavior at the site. Cookies can be used to determine how many people are visiting a
site, how many are repeat visitors, and how often they have visited. They also make shopping
cart and quick checkout possible by allowing a site to keep track of a user as he or she adds to
the shopping cart. Cookies can be combined with web bugs to create cross-site profiles. Web
beacons (sometimes called web bugs) are graphic files that are embedded in e-mails and on
websites. When a user opens an HTML format e-mail with an embedded web beacon, a request
is sent to the server for the graphic data. Web beacons are used to automatically transmit
information about the user and the page being viewed to a monitoring server to collect personal
browsing behavior and other personal information.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
68) Define and describe the functionality of customer relationship management (CRM) systems.
17
Copyright © 2020 Pearson Education, Inc.
In the past, firms generally did not maintain a single storehouse of customer information, and
any customer data was organized along product lines with each product line maintaining a
separate customer list. CRMs are part of the evolution towards customer-centric and segmented
market-based businesses, and away from this product-based model.
CRMs use database technology with capabilities for assessing the needs of individual customers
and differentiating products to meet those needs. The customer profiles generated by a CRM can
include a map of the customer's relationship with the firm, the products he or she has bought and
the frequency of purchases, the demographic and psychographic profile for each customer,
profitability measures, a complete contact history, and marketing and sales information
containing marketing campaigns that the customer received and the customer's responses to
them.
With these profiles, CRMs can be used to sell additional products and services, develop new
products, increase product utilization, reduce marketing costs, identify and retain profitable
customers, optimize service delivery costs, retain high lifetime value customers, enable personal
communications, improve customer loyalty, and increase product profitability.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 6.3: Identify and describe the main technologies that support online
marketing.
69) If you want to determine the size of your website's audience, the metric you will use for the
most accurate measurement will be:
A) page views.
B) unique visitors.
C) hits.
D) reach.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
18
Copyright © 2020 Pearson Education, Inc.
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
72) Uber has been criticized for using which of the following?
A) flash marketing
B) bundling
C) surge pricing
D) freemium
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
75) eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the
following?
A) the total number of impressions
B) the total number of impressions in hundreds
C) the total number of impressions in thousands
D) the total number of impressions in millions
19
Copyright © 2020 Pearson Education, Inc.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
76) Which of the following measures the average length of stay at a website?
A) loyalty
B) stickiness
C) page views
D) retention rate
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
80) Which of the following measures the ratio of items purchased to product views?
20
Copyright © 2020 Pearson Education, Inc.
A) conversion rate
B) cart conversion rate
C) browse-to-buy ratio
D) view-to-cart ratio
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
81) Which of the following measures the percentage of e-mails that could not be delivered?
A) abandonment rate
B) unsubscribe rate
C) bounce-back rate
D) attrition rate
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
82) Which of the following is the most meaningful metric for video ads?
A) view time
B) CTR
C) completion rate
D) skip rate
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 6.4: Understand the costs and benefits of online marketing communications.
22
Copyright © 2020 Pearson Education, Inc.
1) Around ________ % of households in the United States have broadband access to the Internet.
A) 45
B) 55
C) 75
D) 85
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
2) Which of the following online advertising formats attracted the least amount of spending in
2015?
A) search
B) classifieds
C) rich media
D) e-mail
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
3) Which of the following is not one of the main stages of the online purchasing process?
A) post-purchase service and loyalty
B) awareness
C) engagement
D) conversation
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
4) In 2015, what was the approximate Internet penetration rate for individuals that have attained
less than a high-school education?
A) 25%
B) 33%
C) 66%
D) 75%
Answer: C
Difficulty: Difficult
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
5) All of the following are online communications that are used to support the evaluation of
alternatives stage of the consumer decision process except:
A) search engines.
B) online catalogs.
C) social networks.
D) targeted banner ads.
Answer: D
Difficulty: Difficult
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
7) In modeling online consumer behavior, the concept of "consumer skills" refers to the:
A) education level of the consumer.
B) communication skills of the consumer.
C) knowledge consumers have about how to conduct online transactions.
D) product evaluation skills of the consumer.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
8) In the early years of e-commerce, prior to 2000, single, white, young college-educated males
with high income dominated the Internet in terms of percentage of Internet usage.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
9) Consumers choose the online channel primarily because it offers lower prices.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
11) The majority of online shoppers find vendors by clicking on display ads.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
12) Research shows that the two most important factors shaping the decision to purchase online
are utility and trust.
Answer: TRUE
Difficulty: Easy
AACSB: Application of knowledge
LO: 6.1: Understand the key features of the Internet audience, the basic concepts of consumer
behavior and purchasing, and how consumers behave online.
13) Google introduced which of the following changes to its search algorithm in 2011 to weed
out low quality sites from search results?
A) Penguin
B) Hummingbird
C) Panda
D) Knowledge Graph
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
14) Which of the following forms of online advertising is expected to grow the fastest between
2015 and 2019?
A) paid search
B) sponsorships
C) search engines
D) rich media
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
15) Which of the following is not one of the four main methods advertisers use to behaviorally
target ads?
A) Nielsen ratings
B) data collected from social networks
C) integration of online data with offline data
D) clickstream data
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
16) Which of the following search engine algorithm updates enables Google's search engine to
evaluate an entire sentence rather than just a key word?
A) Panda
B) Penguin
C) Hummingbird
D) Graph Search
Answer: C
Difficulty: Difficult
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
17) Which of the following is not true about search engine advertising?
A) Spending on search engine advertising constitutes over 40% of all online advertising
spending.
B) The top three search engine providers supply over 95% of all online searches.
C) The click-through rate for search engine marketing has been fairly steady over the years.
D) Search engine advertising is the fastest growing type of online advertising.
Answer: D
Difficulty: Difficult
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
18) Which of the following is not a practice that degrades the results and usefulness of search
engines?
A) social search
B) link farms
C) content farms
D) click fraud
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
22) In the first seven months of 2015, the percentage of all e-mail that is spam averaged
around ________ %.
A) 50
B) 60
C) 70
D) 80
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
24) Which of the following statements about Canada's anti-spam law is not true?
A) Canada's law is based on an opt-in model.
B) The law has no impact on companies located within the United States.
C) The first phase of the law went into effect in 2014.
D) The law applies to e-mail, texts, and social media messaging.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
25) Which of the following is the most important tool in establishing a relationship with the
customer?
A) company Web site
B) company CRM system
C) Facebook
D) search engine display ads
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
26) All of the following are "traditional" online marketing tools except:
A) affiliate marketing.
B) e-mail and permission marketing.
C) social marketing.
D) sponsorship marketing.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
27) All of the following are among those most frequently affected by ad-blocking except:
A) gaming sites.
B) newsgroup/forums.
C) social network sites.
D) online retailers.
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
28) The Nike iD program is an example of which of the following marketing techniques?
A) customer co-production
B) transactive content
C) price discrimination
D) permission marketing
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
29) The incremental cost of building the next unit of a good is called the:
A) Law of One Price.
B) variable cost.
C) marginal cost.
D) fixed cost.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
30) Which of the following statements about a free pricing strategy is false?
A) Free products and services can knock out potential and actual competitors.
B) The free pricing strategy was born in the early days of the Web.
C) It is difficult to convert free customers into paying customers.
D) Free products and services can help build market awareness.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
31) Creating multiple variations of information goods and selling these to different market
segments at different prices is called:
A) bundling.
B) customization.
C) dynamic pricing.
D) versioning.
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
33) Which of the following involves getting customers to pass along a company's marketing
message to friends, family, and colleagues?
A) affiliate marketing
B) viral marketing
C) native advertising
D) lead generation marketing
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
35) Which of the following is based on the idea of complete price transparency in a perfect
information marketplace?
A) the Law of One Price
B) dynamic pricing
C) price discrimination
D) versioning
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
36) Which of the following industries accounts for the highest percentage of spending on online
advertising?
A) financial services
B) retail
C) automotive
D) entertainment
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
37) Which of the following statements about native advertising is not true?
A) Native advertising is controversial.
B) Native advertising is a new form of advertising found only online.
C) Native advertising is growing rapidly, especially on social networks.
D) Consumers look at native ads much more frequently than display ads.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
38) Which of the following is an automated, auction-based method for matching demand and
supply for online display ads?
A) retargeting
B) behavioral targeting
C) programmatic advertising
D) keyword advertising
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
39) Research has found that of all the standard formats of display ads, leaderboard ads are the
most effective at getting and holding a user's attention.
Answer: FALSE
Difficulty: Difficult
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
40) The highest amount of online advertising spending is for online video ads.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
41) Evidence suggests that real-time customer chat increases the dollar value of transactions.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
42) Consumers tend to look at native ads more frequently than they look at display ads.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
44) An ad is considered viewable if half of the ad can be viewed for at least two consecutives
seconds.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
45) The concept of "customer satisfaction" is broader than the concept of "customer experience."
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
46) Bundling is the process of selling two or more products together for a price that is less than
the sum of the two product's individual prices.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.2: Identify and describe the basic digital commerce marketing and advertising strategies
and tools.
50) Which of the following would you implement to collect and analyze your company's Big
Data?
A) data warehouse
B) Hadoop
C) SQL
D) profiling
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.3: Identify and describe the main technologies that support online marketing.
51) Which of the following statements about the Internet's impact on marketing is not true?
A) The Internet has broadened the scope of marketing communications.
B) The Internet has decreased the impact of brands.
C) The Internet has increased the richness of marketing communications.
D) The Internet has expanded the information intensity of the marketplace.
Answer: B
Difficulty: Difficult
AACSB: Application of knowledge
LO: 6.3: Identify and describe the main technologies that support online marketing.
52) Which of the following features of e-commerce technology has reduced the cost of
delivering marketing messages and receiving feedback from users?
A) ubiquity
B) richness
C) information density
D) universal standards
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.3: Identify and describe the main technologies that support online marketing.
53) Which of the following features of e-commerce technology allows fine-grained, highly
detailed information on consumers' real-time behavior to be gathered and analyzed?
A) personalization/customization
B) information density
C) ubiquity
D) interactivity
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.3: Identify and describe the main technologies that support online marketing.
54) The richness made possible by e-commerce technologies does which of the following?
A) It reduces the cost of delivering marketing messages and receiving feedback from users.
B) It allows consumers to become co-producers of the goods and services being sold.
C) It allows video, audio, and text to be integrated into a single marketing message and
consuming experience.
D) It enables worldwide customer service and marketing communications.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.3: Identify and describe the main technologies that support online marketing.
55) For a Web site that has 100,000 visitors a month, and where on average, a visitor makes five
page requests per visit, there will be ________ entries in the transaction log each month.
A) 50,000
B) 500,000
C) 5 million
D) 50 million
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 6.3: Identify and describe the main technologies that support online marketing.
56) All of the following statements about cookies are true except:
A) cookies can be used with Web bugs to create cross-site profiles of users.
B) the data typically stored in cookies includes a unique ID and e-mail address.
C) cookies make shopping carts possible by allowing a site to keep track of a user's actions.
D) the more cookies are deleted, the less accurate ad server metrics become.
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 6.3: Identify and describe the main technologies that support online marketing.
59) A ________ is a repository of customer information that records all of the contacts that a
customer has with a firm and generates a customer profile available to everyone in the firm with
a need to know the customer.
A) customer service chat system
B) CRM system
C) data warehouse
D) transactive content system
Answer: B
Difficulty: Easy
AACSB: Information technology
LO: 6.3: Identify and describe the main technologies that support online marketing.
60) The marketing technique known as ________ involves merchants offering products or
services for a very low price for a short period of time.
A) long tail marketing
B) flash marketing
C) yield management
D) bait-and-switch
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.3: Identify and describe the main technologies that support online marketing.
61) To answer a question such as "At what time of day does our company sell the most
products?" you would use ________ data mining.
A) query-driven
B) customer profiling
C) model-driven
D) behavioral
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 6.3: Identify and describe the main technologies that support online marketing.
63) Cookies, when combined with Web beacons, can be used to create cross-site profiles.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 6.3: Identify and describe the main technologies that support online marketing.
69) If you want to determine the size of your Web site's audience, the metric you will use for the
most accurate measurement will be:
A) page views.
B) unique visitors.
C) hits.
D) reach.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.4: Understand the costs and benefits of online marketing communications.
72) Uber has been criticized for using which of the following?
A) flash marketing
B) bundling
C) surge pricing
D) freemium
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.4: Understand the costs and benefits of online marketing communications.
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.4: Understand the costs and benefits of online marketing communications.
75) eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of the
following?
A) the total number of impressions
B) the total number of impressions in hundreds
C) the total number of impressions in thousands
D) the total number of impressions in millions
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.4: Understand the costs and benefits of online marketing communications.
76) Which of the following measures the average length of stay at a Web site?
A) loyalty
B) stickiness
C) page views
D) retention rate
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.4: Understand the costs and benefits of online marketing communications.
80) Which of the following measures the ratio of items purchased to product views?
A) conversion rate
B) cart conversion rate
C) browse-to-buy ratio
D) view-to-cart ratio
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.4: Understand the costs and benefits of online marketing communications.
81) Which of the following measures the percentage of e-mails that could not be delivered?
A) abandonment rate
B) unsubscribe rate
C) bounce-back rate
D) attrition rate
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.4: Understand the costs and benefits of online marketing communications.
82) Which of the following is the most meaningful metric for video ads?
A) view time
B) click-through rate
C) completion rate
D) skip rate
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.4: Understand the costs and benefits of online marketing communications.
83) Which of the following measures the percentage of customers who purchase once but never
return within a year?
A) retention rate
B) attrition rate
C) loyalty rate
D) conversion rate
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
LO: 6.4: Understand the costs and benefits of online marketing communications.
1) All of the following were popular types of online marketing before 2007 except:
A) e-mail.
B) corporate websites.
C) mobile marketing.
D) display ads.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.1: Understand the difference between traditional online marketing and the
new social-mobile-local marketing platforms and the relationships between social, mobile, and
local marketing.
3) How much time a month does the average person spend using the Facebook app on mobile
devices?
A) about 3 hours
B) about 10 hours
C) about 13 hours
D) about 23 hours
Answer: C
Difficulty: Moderate
4) By 2019, it is estimated that advertisers will be spending which of the following amounts on
mobile marketing?
A) $82 million
B) $820 million
C) $8.2 billion
D) $82 billion
Answer: D
Difficulty: Moderate
AACSB: Analytical thinking
Learning Objective: 7.1: Understand the difference between traditional online marketing and the
new social-mobile-local marketing platforms and the relationships between social, mobile, and
local marketing.
5) By 2019, spending on social marketing will be almost triple the amount spent on mobile
marketing.
Answer: FALSE
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 7.1: Understand the difference between traditional online marketing and the
new social-mobile-local marketing platforms and the relationships between social, mobile, and
local marketing.
6) By 2018, mobile marketing is expected to account for almost 75% of all digital ad spending.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.1: Understand the difference between traditional online marketing and the
new social-mobile-local marketing platforms and the relationships between social, mobile, and
local marketing.
10) Which of the following is the first step in the social marketing process?
A) community
B) amplification
C) fan acquisition
D) engagement
Answer: C
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
11) Encouraging users to click a Like button is an example of which step in the social marketing
process?
A) fan acquisition
B) brand strength
C) community
D) amplification
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
12) Your Facebook News Feed includes all of the following except:
A) status updates.
B) app activity.
C) Likes.
D) tweets.
Answer: D
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
13) Which of the following statements about Facebook Exchange is not true?
A) It competes with DoubleClick.
B) It allows advertisers to target ads.
C) It is a social search engine.
D) It involves cookies.
Answer: C
Difficulty: Difficult
AACSB: Information technology
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
14) Ads that appear in a Facebook user's News Feed are called:
A) Marketplace Ads.
B) Promoted Ads.
C) Page Post Ads.
D) Brand Ads.
Answer: C
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
15) About how many hours a month do online social network users spend on average on all
social networks combined?
A) 15
B) 20
C) 25
D) 30
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
18) All of the following marketing tools on Facebook require payment except:
A) Brand Pages.
B) Right-Hand Sidebar Ads.
C) News Feed Page Post Ads.
D) Mobile Ads.
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
20) Which of the following Twitter marketing tools provides marketers with a real-time digital
dashboard so they can see tweet activity about a TV show, commercial, or brand?
A) Enhanced Profile Pages
B) Amplify
C) Lead Generation Cards
D) Promoted Accounts
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
21) Which of the following Twitter marketing tools involves a coupon or other promotional offer
that appears in users' Twitter timeline?
A) Promoted Tweet
B) Promoted Trend
C) Promoted Account
D) Lead Generation Card
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
23) Which of the following are features of both Pinterest and Twitter?
A) tweets
B) hashtags
C) pins
D) Image Hover widget
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
25) The number of people exposed to pins on Pinterest is a measure of which of the following?
A) engagement
B) community
C) brand strength
D) fan acquisition
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
26) Which of the following is an online service specifically aimed at measuring the impact of
Pinterest and other visual social media?
A) TweetDeck
B) Curalate
C) Amplify
D) Webtrends
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
Pinterest.
29) Facebook's share price fell dramatically after its IPO because investors feared that:
A) Facebook's new marketing solutions would be difficult to monetize.
B) new social networks such as Instagram were cannibalizing Facebook's audience.
C) privacy concerns were driving users away.
D) Facebook would be unable to increase advertising revenues fast enough to justify its price.
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
30) Which of the following allows Facebook to track user behavior on other sites?
A) Open Graph
B) Like button
C) hashtags
D) Whatsapp
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
31) Which of the following is not true about Facebook News Feed Page Post Ads?
A) They have a tiny tag indicating that they are sponsored.
B) They can be liked, shared, and commented on, just like any news feed post.
C) They cannot contain links.
D) They have social context.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
32) Which of the following is a micro-blogging social network site that allows users to send and
receive 140-character messages?
A) Facebook
B) Twitter
C) Pinterest
D) Instagram
Answer: B
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
33) Companies are not permitted to collect personal information from children under the age of
________ without parental consent.
A) 8
B) 10
C) 13
D) 16
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
34) Which of the following was the object of the FTC's highest penalty for a COPPA violation to
date?
A) Disney's Playdom
B) W3 Innovation
C) Snapchat
D) Yelp
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
36) Which social marketing proved the most effective for ExchangeHunterJumper.com?
A) Facebook
B) YouTube
C) Pinterest
D) Instagram
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
37) Which of the following refers to the number of interactions among members of a group and
reflects the "connectedness" of the group, even if these connections are forced on users?
A) engagement
B) information density
C) social density
D) amplification
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
38) Which of the following refers to those forms of social sharing that occur off the major social
networks, through alternative communication tools?
A) social density
B) dark social
C) amplification
D) engagement
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
39) Which of the following is a real-time bidding system that allows advertisers to target their
ads to specific users based on personal information provided by Facebook?
A) Amplify
B) FBX
C) DoubleClick
D) PTAT
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
40) Which of the following social networks allows a user to buy products directly on its site and
pay with Apple Pay?
A) Twitter
B) LinkedIn
C) Pinterest
D) Snapchat
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
41) Which of the following involves using a variety of tools to encourage users to interact with
content and brand?
A) social density
B) engagement
C) amplification
D) dark social
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
42) Which of the following involves using the inherent strength of social networks to encourage
visitors and fans to share their Likes and comments with friends?
A) social density
B) engagement
C) amplification
D) dark social
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
43) Which of the following is a Facebook feature that allows app developers to integrate their
apps into the Facebook pages of users who sign up for the app?
A) Whatsapp
B) Like button
C) Messenger
D) Open Graph
Answer: D
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
44) Facebook's Messenger app allows users to make payments to advertisers via Stripe or PayPal
without having to leave the app.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
45) Facebook's Search functionality includes everyone's public posts, Likes, photos, and
interests, and makes them available to all users of Facebook, even those who are not friends.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
47) Brand pages on Facebook typically attract more visitors than a brand's website.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
50) In 2017, Millennials make up almost 65% of Snapchat's monthly active U.S. users.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.2: Understand the social marketing process from fan acquisition to sales
and the marketing capabilities of social marketing platforms such as Facebook, Twitter, and
Pinterest.
56) Which of the following is the top app in terms of both audience size and share of time spent?
A) YouTube
B) iTunes
C) Twitter
D) Facebook
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
57) On average, users use about ________ apps a month on their smartphone.
A) 10
B) 15
C) 25
D) 50
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
59) Which of the following is the most popular use for mobile devices?
A) shopping
B) socializing
C) entertainment
D) performing tasks, such as finances
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
60) Which of the following is the second-most popular mobile marketing format?
A) search engine advertising
B) display advertising
C) video advertising
D) mobile messaging
Answer: C
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
61) Which of the following accounts for the most time people spend using a mobile device?
A) watching video
B) social networks
C) listening to music
D) reading news and magazines
Answer: C
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
62) While using apps, users spend about 75% of the time on just ________ of them.
A) 2
B) 3
C) 4
D) 10
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
63) By 2021, spending on mobile marketing is expected to account for almost ________ of all
online marketing and almost ________ times as much spent on desktop advertising.
A) 65%; three
B) 70%; three
C) 75%; four
D) 80%; four
Answer: C
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
64) Which of the following accounts for the most mobile ad spending?
A) display ads
B) search engine advertising
C) video ads
D) SMS text messages
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
65) Which of the following is not a major provider of mobile display advertising?
A) MoPub
B) Millennial Media
C) AdMob
D) Webtrends
Answer: D
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
66) Which of the following is the leading mobile retailer in the United States?
A) Walmart
B) Amazon
C) Google
D) QVC
Answer: B
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
67) Which of the following hardware technologies has Apple adopted for Apple Pay?
A) GPS
B) NFC
C) BLE
D) QR codes
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
69) What percentage of the population use a mobile device to research products online before
purchasing?
A) about 25%
B) about 33%
C) about 50%
D) about 75%
Answer: C
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
70) It is expected that by 2021, m-commerce will account for more 50% of all e-commerce in the
retail and travel industries.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
71) Purchases made on tablet computers are the fastest growing and largest source of m-
commerce revenues.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.3: Identify the key elements of a mobile marketing campaign.
76) Which of the following is currently a small part of the online marketing universe, but is
expected to triple over the next five years?
A) local marketing
B) location-based mobile marketing
C) mobile marketing
D) social marketing on Facebook
Answer: B
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 7.4: Understand the capabilities of location-based local marketing.
77) Macy's deployed which of the following technologies in many of its retail stores in 2014?
A) QR codes
B) iBeacon
C) E9-1-1
D) Geo-search
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 7.4: Understand the capabilities of location-based local marketing.
78) Which of the following dominates the local mobile search market?
A) Twitter
B) Apple
C) Facebook
D) Google
Answer: D
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 7.4: Understand the capabilities of location-based local marketing.
81) Google uses which of the following to build a global database of wireless access points and
their geographic locations?
A) E9-1-1
B) Street View cars
C) iBeacons
D) BLE
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 7.4: Understand the capabilities of location-based local marketing.
83) A cell phone's GPS is accurate to within five feet of the actual location of the phone.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 7.4: Understand the capabilities of location-based local marketing.
Learning Objectives
8.1 Understand why e-commerce raises ethical, social, and political
issues.
8.2 Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the
different methods that can be used to protect online privacy.
8.3 Understand the various forms of intellectual property and the
challenges involved in protecting it.
8.4 Understand how the Internet is governed and why taxation of e-
commerce raises governance and jurisdiction issues.
8.5 Identify major public safety and welfare issues raised by e-
commerce.
• Profiling
• Creation of data images that characterize online individual and group behavior
• Anonymous profiles
• Personal profiles
• Facial recognition a new dimension
• Advertising networks
• Track consumer and browsing behavior on Web
• Dynamically adjust what user sees on screen
• Build and refresh profiles of consumers
• Google’s new privacy policy
• Business perspective:
• Increases effectiveness of advertising, subsidizes content
• Enables sensing of demand for new products
• Critics’ perspective:
• Undermines expectation of anonymity and privacy
• Enables price discrimination
Privacy Policies
• Website Terms of Use Notices
• Recent study showed these polices would take average reader 8 hours to
read policies
• Have conflicting statements
• Little oversight and comparison between policies of different companies
Industry Self-Regulation
• Privacy seal programs
• Network Advertising Initiative (NAI)
• Ad Choices Program
• In general, self-regulation has not succeeded in reducing American fears of
privacy invasion or reducing the level of privacy invasion
Technology Solutions
• Solutions include
• Intelligent Tracking Protection (ITP)
• Differential privacy software
• Privacy default browsers
• Message encryption
• Spyware blockers
• Pop-up blockers and ad blockers
• Secure e-mail, anonymous remailers
• Cookie managers
• Public key encryption
Privacy Protection
• Privacy protection as a business
• Personal Data Economy (PDE)
• Internet of Me
• Life Management tools
• Privacy advocacy groups
E-commerce Patents
• 1998 State Street Bank & Trust v. Signature Financial Group
• Business method patents
• 2014 Alice Corporation lawsuit
• Supreme Court rules that software does not make a basic
business method or abstract idea patentable
• E-commerce patents
• Amazon: One-click purchasing
• Akamai: Internet content delivery global hosting system
Trademarks
• Identify, distinguish goods, and indicate their source
• Purpose
• Ensure consumer gets what is paid for/expected to receive
• Protect owner against piracy and misappropriation
• Infringement
• Dilution
• Federal Trademark Dilution Act and Trademark Dilution Revision Act
• Uniform Rapid Suspension System (URS)
Trade Secrets
• Business procedures, formulas, methods of manufacture and service
delivery
• May not be unique or novel
• Trade secrets are
• (a) secret
• (b) have commercial value to owner
• (c) owner has taken steps to protect
• 2016 Defend Trade Secrets Act
Taxation
• Non-local nature of Internet commerce complicates governance and jurisdiction issues
• Sales taxes
• Governments in Europe and U.S. rely on sales taxes
• As e-commerce grew, states began to argue their inability to tax remote e-commerce sales was
siphoning away billions of tax dollars
• Supreme Court ruled in South Dakota v Wayfair that states could tax online sales even when seller
ersus
Net Neutrality
• All Internet activities charged the same rate, regardless of bandwidth
used
• Netflix and YouTube together consume about 50% of bandwidth in
United States
• Prior to 2015, ISPs could throttle high-volume users
• February 2015, FCC ruled that broadband ISPs should be viewed and
regulated as public utilities
• Under Trump administration, net neutrality regulations have been
repealed, but many states are attempting to reinstate them via state
laws and regulations
Copyright
1) Which of the following e-commerce technology dimensions creates greater opportunities for
cyberbullying?
A) information density
B) interactivity
C) social technology
D) ubiquity
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
2) Which of the following e-commerce technology dimensions has the potential to reduce
cultural diversity in products?
A) ubiquity
B) interactivity
C) information density
D) global reach
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
3) Which of the following is not one of the four basic principles shared by ethical schools of
thought in western culture?
A) accountability
B) privacy
C) responsibility
D) liability
Answer: B
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
5) Which ethical principle states that, when confronted with an ethical dilemma, individuals
1
Copyright © 2020 Pearson Education, Inc.
should take the action that achieves the greater value for all of society?
A) the Golden Rule
B) Risk Aversion
C) the Collective Utilitarian principle
D) the Social Contract Rule
Answer: C
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
6) Which ethical principle emphasizes putting oneself into the place of others and thinking of
oneself as the object of the decision?
A) the Golden Rule
B) Universalism
C) the Collective Utilitarian principle
D) the Social Contract Rule
Answer: A
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are
owned by someone else unless there is a specific declaration otherwise?
A) the Golden Rule
B) the Slippery Slope
C) the Social Contract Rule
D) No Free Lunch
Answer: D
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
8) Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to
take at all?
A) Universalism
B) the Slippery Slope
C) the Social Contract Rule
D) the Golden Rule
Answer: B
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
9) Which ethical principle asks you to consider the impact of your decision if the principles
underlying your decision became an organizing principle of the entire society?
A) the Golden Rule
B) Risk Aversion
C) the Slippery Slope
2
Copyright © 2020 Pearson Education, Inc.
10) Which ethical principle tells you that it is wise to assume perfect information markets?
A) the Golden Rule
B) the New York Times test
C) the Social Contract Rule
D) the Collective Utilitarian principle
Answer: B
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
11) Which ethical principle states that when confronted with an ethical dilemma, an individual
should take the action that produces the least harm, or the least potential cost?
A) the Slippery Slope
B) Risk Aversion
C) No Free Lunch
D) the Collective Utilitarian principle
Answer: B
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
13) Downloading a music track owned by a record company without paying for it is an example
of a violation of:
A) patent law.
B) copyright law.
C) trademark law.
D) privacy law.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
3
Copyright © 2020 Pearson Education, Inc.
14) Which of the following features of e-commerce technology can result in work and shopping
invading family life?
A) interactivity
B) ubiquity
C) information density
D) global reach
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
15) Liability is a feature of political systems in which a body of law is in place that permits
individuals to recover damages done to them by other actors, systems, or organizations.
Answer: TRUE
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
16) The principle of responsibility means that individuals, organizations, and societies should be
held accountable to others for the consequences of their actions.
Answer: FALSE
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
17) The ethical principle of Universalism states that if an action is not right for all situations,
then it is not right for any situation.
Answer: TRUE
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
18) Discuss in depth one ethical, social, or political issue that is presently in the news
surrounding the Internet and e-commerce.
Answer: A student might answer this issue by focusing on any one of a number of ethical, social,
or political issues currently surrounding the Internet and e-commerce. Possible topics include
privacy issues, intellectual property rights issues (copyright, patents, or trademarks), taxation,
Internet governance issues such as net neutrality and the impact of “big tech,” and Internet public
safety and welfare issues such as the regulation of online pornography, gambling, or the sale of
drugs.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
19) Describe the five-step process that can be used to analyze an ethical dilemma. What other
guidelines are there to help in understanding a complicated ethical or moral situation?
Answer: The five-step process is:
4
Copyright © 2020 Pearson Education, Inc.
1. Identify and describe the facts. Find out who did what to whom, and where, when, and how.
It helps to get the opposing parties involved in an ethical dilemma to agree on the facts.
2. Define the conflict or dilemma and identify the higher-order values involved. Ethical,
social, and political issues always reference higher values. Otherwise, there would be no debate.
The parties to a dispute all claim to be pursuing higher values (e.g., freedom, privacy, protection
of property, and the free enterprise system).
3. Identify the stakeholders. Every ethical, social, and political issue has stakeholders: players
in the game who have an interest in the outcome, who have invested in the situation, and usually
who have vocal opinions. Find out the identity of these groups and what they want. This will be
useful later when designing a solution.
4. Identify the options that you can reasonably take. You may find that none of the options
satisfies all the interests involved, but that some options do a better job than others. Sometimes,
arriving at a "good" or ethical solution may not always be a balancing of consequences to
stakeholders.
5. Identify the potential consequences of your options. Some options may be ethically correct,
but disastrous from other points of view. Other options may work in this one instance, but not in
other similar instances. Always ask yourself, "What if I choose this option consistently over
time?"
Other things to consider when appraising an ethical dilemma include basic ethical concepts such
as responsibility, accountability, and liability and how these play into the situation. Additionally,
you can judge the situation against candidate ethical principles, such as the Golden Rule, the
Slippery Slope theory, Universalism, the Collective Utilitarian principle, Risk Aversion theory,
the No Free Lunch theory, the New York Times test (Perfect Information rule), and the Social
Contract rule. Actions that do not easily pass these guidelines deserve some very close attention
and a great deal of caution because the appearance of unethical behavior may do as much harm
to you and your company as the actual behavior.
Difficulty: Moderate
AACSB: Analytical thinking; Written and oral communication; Ethical understanding and
reasoning
Learning Objective: 8.1: Understand why e-commerce raises ethical, social, and political issues.
20) Which of the following basic ethical concepts plays an important role in defining privacy?
A) responsibility
B) accountability
C) liability
D) due process
Answer: D
Difficulty: Difficult
AACSB: Ethical understanding and reasoning
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
21) Which of the following is not aimed at strengthening the ability of law enforcement agencies
to monitor Internet users without their knowledge?
A) USA PATRIOT Act
5
Copyright © 2020 Pearson Education, Inc.
22) Which of the following is used to track individuals as they move among thousands of
websites?
A) first-party cookies
B) digital wallets
C) advertising networks
D) shopping carts
Answer: C
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
23) Which of the following uses software installed at the ISP level to track user clickstream
behavior?
A) shopping carts
B) trusted computing environments
C) deep packet inspection
D) DRM
Answer: C
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
24) Which of the following statements about industry self-regulation regarding privacy is not
true?
A) The AdChoices program is an industry-sponsored initiative to encourage websites to be more
transparent about how they use personal information and to make it more likely that appropriate
ads are shown to users.
B) The NAI offers consumers a global opt-out feature to prevent network advertising agencies
from placing cookies on a user's computer.
C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion.
D) Critics argue that the most effective form of industry self-regulation to safeguard privacy are
online seal programs that attest to a company's privacy policies.
Answer: D
Difficulty: Difficult
6
Copyright © 2020 Pearson Education, Inc.
25) The Spokeo case involved a claim for damages based on which of the following?
A) Fair Credit Reporting Act
B) Digital Millennium Copyright Act
C) Anticybersquatting Consumer Protection Act
D) Defend Trade Secrets Act
Answer: A
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
26) Which of the following requires financial institutions to inform consumers of their privacy
policies and permits consumers some control over their records?
A) Freedom of Information Act
B) Gramm-Leach-Bliley Act
C) COPPA
D) HIPAA
Answer: B
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
27) Which of the following is a core Fair Information Practices (FIP) principle?
A) Choice/Consent
B) Access/Participation
C) Security
D) Enforcement
Answer: A
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
28) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the
collector of data?
A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
7
Copyright © 2020 Pearson Education, Inc.
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out
policies to be in place?
A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
30) What is the FTC recommendation regarding choice as it relates to personally identifiable
information (PII)?
A) Require firms to have consumers affirmatively opt-in before PII is collected.
B) Require firms to allow consumers to opt-out before PII is collected.
C) Make collection of PII illegal.
D) Require robust notice only before PII is collected.
Answer: A
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
31) "Do Not Track" falls under which of the following principles in the FTC's current privacy
framework?
A) Privacy by Design
B) Simplified Choice
C) Greater Transparency
D) Scope
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
32) Which of the following technologies reduces the ability to merge different files and de-
anonymize consumer data?
8
Copyright © 2020 Pearson Education, Inc.
A) anonymous surfing
B) anonymous remailers
C) differential privacy software
D) public key encryption
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
34) All of the following are required for information to be considered a trade secret except:
A) it must have commercial value to its owner.
B) the owner must have taken steps to protect it.
C) it must be unique.
D) it must be something that others do not know.
Answer: C
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
35) According to data from Pew Research Center, which of the following is the action which the
highest percentage of Internet users has taken to preserve their privacy online?
A) used an anonymous web browsing service
B) encrypted their communications
C) cleared web browser history and cookies
D) posted comments online anonymously
Answer: C
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
36) Which of the following statements about the General Data Protection Regulation (GDPR) is
9
Copyright © 2020 Pearson Education, Inc.
not true?
A) The GDPR replaces the Data Protection Directive.
B) The GDPR applies to any firm operating in any E.U. country.
C) The GDPR eliminate the right to be forgotten.
D) The GDPR limits the ability of companies to use data for purposes other than those for which
it was collected.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
38) Which of the following was the first state law in the United States requiring owners of
commercial websites or online services to post a privacy policy.
A) California Consumer Privacy Act
B) California Net Neutrality Act
C) California Electronic Communications Privacy Act
D) California Online Privacy Protection Act
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
39) In the United States, Google is not required to remove results from its search engine if
requested.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
40) The main objective of the GDPR is to strengthen the rights of citizens to their own personal
10
Copyright © 2020 Pearson Education, Inc.
information and to strengthen oversight of firms to ensure that they implement these individual
rights.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
41) The opt-in model for informed consent requires an affirmative action by the consumer before
a company can collect and use information.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
42) The Federal Communications Commission's privacy rules, applicable to broadband ISPs,
were repealed by Congress in 2017.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
44) In what ways has the European environment turned against American firms such as
Facebook and Google?
Answer: The EU General Data Protection Regulation (GDPR) is clearly aimed at Facebook,
Google, Twitter, and other ad-based online businesses that build collections of personal data by
tracking individuals across the Web, merging that data with data from firms and data brokers in
order to build comprehensive digital images (profiles) and to target these persons with ads.
Google and Facebook are both extremely popular in Europe, and dominate their markets, but at
the same time are widely criticized for invading privacy and not protecting PII. European
regulators and politicians point to Facebook allowing Cambridge Analytica, a political consulting
firm, to gain access to over 100 million user accounts in 2016 and a 2018 data breach of 50
million Facebook accounts as evidence that Facebook is unable to protect the privacy of
11
Copyright © 2020 Pearson Education, Inc.
Europeans. Google is also in the cross-hairs of EU regulators for its monopoly on search in the
EU, abuse of that monopoly by ranking Google services above others on its search pages, and
abuse of its ownership of the Android operating system by requiring smartphone manufacturers
to pre-install Google apps on Android phones, as well as evading taxes on revenues earned in EU
countries. Both firms, along with Microsoft’s Windows 10 operating system, are accused of
“deceit by design” through the use of threats against users who choose strong privacy protections
on their services, and screen designs that encourage users to give up as much personal
information as possible.
Difficulty: Moderate
AACSB: Application of knowledge; Written and oral communication
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
46) Describe the fantasy sport business and the issues it raises.
Answer: Two firms dominate the online fantasy sports market: DraftKings and FanDuel. Both
firms advertise heavily during college and professional sports games. In fantasy sports, players
assemble their ideal fantasy teams, drafting real-life athletes to their team, and then, based on the
performance of those players in real games, they can win significant prizes. The most popular
sports are college football and basketball, and professional football and baseball. Players are
given a budget that they can use to draft players, and some of the combined fees for each game
12
Copyright © 2020 Pearson Education, Inc.
make up the pool for which players compete. Entry fees range widely from less than a dollar, to
over $1,000. Fantasy sports were exempted from the Unlawful Internet Gambling Enforcement
Act of 2006 (UIGEA) under industry pressure from the then much smaller fantasy sports
business. The industry argued that fantasy sports are not gambling, but instead games of skill like
chess or Scrabble.
As the industry has grown to billion-dollar venture capital valuations, however, and with
allegations of cheating customers, deceptive practices, lack of transparency, and insider
irregularities, state and federal legislators are holding hearings and considering regulations. In
2015, the New York State attorney general told both DraftKings and FanDuel to stop taking
entries from New York State residents because, in the state's opinion, their operations constituted
illegal gambling and the sites engaged in false and misleading advertising. Citibank cut off credit
card processing for both sites.
After lengthy legislative hearings and strong support from sports fans, New York reversed its
position, agreeing that when played fairly, fantasy sports is a game of skill, not gambling. The
governor signed legislation legalizing fantasy sports as a state regulated industry, claiming it
would add $4 billion to the state's education fund. The sites also agreed to pay $12 million in
fines. In November 2016, DraftKings and FanDuel proposed to merge. Together the two
companies control more than 90% of the U.S. market. In June 2017, the FTC, along with the
attorneys general of California and the District of Columbia, sued to block the merger and in July
2017 the companies decided to abandon the plan.
Difficulty: Moderate
AACSB: Application of knowledge; Written and oral communication
Learning Objective: 8.5: Identify major public safety and welfare issues raised by e-commerce.
47) Define privacy, information privacy, the right to be forgotten, and informed consent.
Answer: Privacy is the moral right of individuals to be left alone, free from surveillance or
interference from other individuals including the state.
Information privacy includes both the right to prohibit certain information from being collected
by either governments or businesses, and the right to control the use of whatever information is
collected about you. The core concept is the control of your own personal information.
The right to be forgotten is the claim of individuals to be able to edit and delete personal
information online.
Informed consent means that an individual has knowledge of all the material facts needed to
make a rational decision and consent has been given to collect information. In the United States,
business firms and government agencies can gather transaction data from the marketplace and
use it for other marketing purposes without the informed consent of the individual. In Europe, on
the other hand, this is illegal. European businesses can only use transaction data to support the
current transaction if they have asked for and received the informed consent of the individual.
Difficulty: Moderate
AACSB: Application of knowledge; Written and oral communication
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
13
Copyright © 2020 Pearson Education, Inc.
48) Discuss the Authors Guild's lawsuit against Google with respect to Google's Library Project
and explain why the courts ultimately ruled in Google's favor.
Answer: Google's Library Project involved an effort by Google to scan all the books in several
university and public libraries, and then make snippets and parts of the book available online
without receiving permission from the publishers or paying royalties. Google said it would never
show a full page, just relevant portions of a page in response to searches. In 2005, the Authors
Guild and the large book publishers filed a lawsuit seeking to prevent Google from implementing
the Library Project. Google argued that the Library Project constituted fair use of publishers'
copyrighted works because it only published snippets. Moreover, Google claimed that it was
simply helping libraries do what they are intended to do, namely, lend books. Library lending is
considered a fair use following an agreement in the late 1930s with publishers, and such lending
was codified into the Copyright Act of 1976. Google claimed that helping libraries make books
more available to the public was in the broader public interest and extended existing rights of
libraries to encourage book availability. In 2013, a federal court finally found in favor of Google
without reservation by ruling that Google's scanning and making snippets of text available to the
public was "fair use" under U.S. copyright law. The judge believed the project had a broad public
purpose of making it easier for students, researchers, teachers, and the general public to find
books, while also preserving consideration for author and publisher rights. The Google project
was "transformative" in the court's view, giving books a new character and purpose, making it
easier to discover old books, and leading to increased sales. The Supreme Court ruled in 2016
that Google's Library Project was fair use, and the matter is settled from a legal perspective. In
the meantime, the project itself has stalled, and efforts to scan so-called orphan books in libraries
where the copyright holder could not be identified have ended. Google now appears less than
enthusiastic about pursuing the project, in part, analysts believe, because the project offered no
hope of ever making a return on the investment and created a rift with the author and publishing
community upon which it depends for content against which to show ads.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
49) How does Apple’s Intelligent Tracking Prevention (ITP) technology work?
Answer: ITP uses machine learning techniques in the browser (not on a central server) to
identify which cookies represent a tracking threat and prevents them from communicating with
their servers, disarming them. Safari notifies the user when a cookie attempts to connect to a
third-party server, asking users if they want to allow it. If tracking cookies make three attempts
to communicate with external servers in 24 hours despite user choices, they are eliminated from
the browser.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 8.2: Understand basic concepts related to privacy and information rights,
the practices of e-commerce companies that threaten privacy, and the different methods that can
be used to protect online privacy.
50) Which of the following cases has chipped away at the Digital Millennium Copyright Act
(DMCA) safe harbor protection?
14
Copyright © 2020 Pearson Education, Inc.
51) What is the major reason why the Internet has such potential for destroying traditional
conceptions and implementations of intellectual property law?
A) the ability to make perfect copies of digital works at little cost
B) the anonymous nature of the Internet
C) the support for instant peer-to-peer communication
D) the use of standards for file formats
Answer: A
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
52) Which of the following protects original forms of expression in a tangible medium?
A) trade secret law
B) copyright law
C) patent law
D) trademark law
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
53) How long does copyright protection extend for corporate-owned works?
A) 25 years
B) 50 years
C) 75 years
D) 95 years
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
54) Which of the following situations would not qualify for the fair use exception to U.S.
copyright law?
A) A professor clips a newspaper article just before class and distributes copies of it to his class.
B) A journalist quotes a paragraph from a book in a review of the book.
15
Copyright © 2020 Pearson Education, Inc.
C) A student copies a photograph of his favorite band from a website created by the band's record
label and places it on the student's personal website.
D) Google posts thumbnail images of books in the Google Book Search Project.
Answer: C
Difficulty: Moderate
AACSB: Analytical thinking
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
55) All of the following are factors that will be considered in determining whether use of
copyrighted material is "fair use" except the:
A) nature of the work used.
B) amount of the work used.
C) market effect of the use.
D) free availability of the work on the Web.
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
56) All of the following are possible penalties for violating the Digital Millennium Copyright Act
(DMCA) except:
A) up to ten years imprisonment for a first offense.
B) fines up to $500,000 for a first offense.
C) fines up to $1 million for a repeat offense.
D) restitution to the injured parties for any losses due to infringement.
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
57) All of the following statements about the Digital Millennium Copyright Act (DMCA) are
true except:
A) the DMCA makes it illegal to circumvent technological measures to protect works.
B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting
websites or providing services to infringers regardless of whether the ISP is aware of
infringement.
C) the DMCA requires search engines to block access to infringing sites.
D) the DMCA allows libraries to make digital copies of works for internal use only.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
58) Which of the following allows someone to obtain an exclusive monopoly on the ideas behind
16
Copyright © 2020 Pearson Education, Inc.
59) All of the following statements about patents are true except:
A) it is more difficult to obtain a copyright than it is to obtain a patent.
B) the four types of inventions protected by patent law are machines, manmade products,
compositions of matter, and processing methods.
C) computer programs can be patented.
D) in order to be patented, an invention must be nonobvious.
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
60) Which case was instrumental in paving the way for Internet business methods patents?
A) Bilski et al. v. Kappos
B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) Ticketmaster Corp. v. Tickets.com
Answer: B
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
61) Which of the following is considered one of the most contentious e-commerce patents?
A) Acacia Technologies’ patent on streaming video media transmission
B) Priceline’s patent on buyer-driven name your price tools
C) Amazon’s patent on one-click purchasing
D) Google's PageRank patent
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
C) piracy.
D) infringement.
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
63) Registering a domain name similar or identical to trademarks of others to extort profits from
legitimate holders is an example of:
A) cybersquatting.
B) cyberpiracy.
C) framing.
D) metatagging.
Answer: A
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
64) Which of the following handles cybersquatting cases under its Uniform Dispute Resolution
procedures?
A) ICANN
B) FTC
C) WIPO
D) USPTO
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
65) Registering a domain name similar or identical to trademarks of others to divert web traffic
to their own sites is an example of:
A) cybersquatting.
B) cyberpiracy.
C) framing.
D) metatagging.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
66) Registering the domain name Faceboik.com with the intent to divert web traffic from people
misspelling Facebook.com is an example of:
A) cybersquatting.
B) typosquatting.
18
Copyright © 2020 Pearson Education, Inc.
C) metatagging.
D) linking.
Answer: B
Difficulty: Easy
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
67) In which of the following cases did the U.S. Supreme Court rule that basic business methods
cannot be patented?
A) State Street Bank & Trust v. Signature Financial Group, Inc.
B) Bilski et al. v. Kappos
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) BMG Rights Management v. Cox Communications
Answer: C
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
68) The display of a third-party's website or page within your own website is called:
A) cybersquatting.
B) metatagging.
C) framing.
D) deep linking.
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
69) Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all
the following lawsuits except:
A) a lawsuit filed by the Authors Guild and five major publishing companies against Google
B) a lawsuit brought by Viacom against YouTube and Google
C) BMG Rights Management v. Cox Communications.
D) Mavrix Photographs, LLC v. LiveJournal, Inc.
Answer: A
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
70) According to the chapter-ending case study, all of the following are examples of big tech
firms that have engaged in activities that raise antitrust issues, except:
A) Amazon
B) Apple
C) Google Drive
19
Copyright © 2020 Pearson Education, Inc.
D) Facebook
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: Learning Objective: 8.4: Understand how the Internet is governed and why
taxation of e-commerce raises governance and jurisdiction issues.
72) Which of the following involves bypassing the target site's home page and going directly to a
content page?
A) cybersquatting
B) metatagging
C) framing
D) deep linking
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
73) All of the following cases involved the doctrine of fair use except:
A) Spokeo v. Robins
B) Perfect 10, Inc. v. Amazon.com, Inc. et al.
C) Field v. Google, Inc.
D) Kelly v. Arriba Soft.
Answer: A
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
74) Copyright protection protects against others copying the underlying ideas in a work.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
20
Copyright © 2020 Pearson Education, Inc.
75) Owners of gTLDs have the right to create and sell new domains with the gTLD suffix.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
76) Google defended its Library Project on the grounds of fair use.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
77) Describe the purpose of intellectual property law and outline the main types of intellectual
property protection.
Answer: The purpose of intellectual property law is to balance two competing interests: the
public and the private. The public interest is served by the creation of inventions, works of art,
music, literature, and other types of intellectual expression. The private interest is served by
rewarding creators of intellectual property by a time-limited monopoly that grants exclusive use
to the creator.
There are three main types of intellectual property protection: copyright, patent, and trademark
law. Copyright law protects original forms of expression such as books, periodicals, and other
forms of written expression, art, drawings, photographs, music, movies, performances, and
computer programs. Patents grant the owner a 20-year exclusive monopoly on the ideas behind
an invention. There are four types of inventions for which patents are granted under patent law:
machines, manmade products, compositions of matter, and processing methods. Trademark law
is used to protect trademarks — marks used to identify and distinguish goods and indicate their
source.
Difficulty: Moderate
AACSB: Analytical thinking; Written and oral communication
Learning Objective: 8.3: Understand the various forms of intellectual property and the
challenges involved in protecting it.
78) Which of the following Supreme Court cases established that states can compel online
retailers to collect and remit sales taxes even if they do not have a physical presence within the
state?
A) South Dakota v. Wayfair
B) Bilski et al. v. Kappos
C) Quill v. North Dakota
D) Alice Corporation v. CLS Bank International
Answer: A
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 8.4: Understand how the Internet is governed and why taxation of e-
commerce raises governance and jurisdiction issues.
21
Copyright © 2020 Pearson Education, Inc.
79) The Day of Action was a protest to proposed changes in regulations pertaining to which of
the following?
A) fantasy sports
B) Internet sales taxes
C) net neutrality
D) the online sale of prescription drugs
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.4: Understand how the Internet is governed and why taxation of e-
commerce raises governance and jurisdiction issues.
80) Net neutrality refers to the idea that Internet service providers (ISPs), including cable
Internet and wireless carriers, should treat all data on the Internet in the same manner, and not
discriminate or price differentially by content, protocol, platform, hardware, or application.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.4: Understand how the Internet is governed and why taxation of e-
commerce raises governance and jurisdiction issues.
81) Explain why the taxation of e-commerce raises governance and jurisdiction issues.
Answer: The taxation of e-commerce illustrates the complexity of the governance and
jurisdictional issues in the global economy. Most of the issues surround the sales tax imposed by
various states or countries on products sold to residents of their state or country. Governments
the world over rely on sales taxes to fund various types of government initiatives and programs
including the building of roads, schools, and sewers or other utilities to support business
development.
In the United States, between the fifty states and the multiple counties and municipalities, there
are thousands of different tax rates and policies. For example, food is not taxed at all in some
states, and there are a myriad of different exceptions and inclusions depending on the locality.
The development of MOTO (mail order/telephone) retail in the 1970s began the discussion on
the taxing of remote sales. State and local tax authorities wanted MOTO retailers to collect taxes
based upon the address of the recipients, but the Supreme Court originally ruled that states could
not force MOTO retailers to collect taxes unless the business had a physical presence in the state.
Legislation to the contrary was never able to garner sufficient support in Congress due to
pressure from the catalog merchants, leaving intact an effective tax subsidy for MOTO
merchants.
The explosive growth of e-commerce raised the issue of how — and if — to tax online sales.
Since its inception, e-commerce has benefited from a tax subsidy of up to 13% for goods shipped
to high sales tax areas. Local retail merchants complained bitterly about the e-commerce tax
subsidy. E-commerce merchants argued that e-commerce needed to be nurtured and encouraged,
and that in any event, the crazy quilt of sales and use tax regimes would be difficult to administer
for Internet merchants. Online giants like Amazon originally argued they should not have to pay
taxes in states where they had no operations because they did not benefit from local schools,
22
Copyright © 2020 Pearson Education, Inc.
police, fire, and other governmental services. State and local governments meanwhile saw
billions of tax dollars slipping from their reach. As Amazon's business model changed with its
building of large distribution centers close to urban areas to enable next-day delivery, its
opposition to paying sales taxes softened. In 2015, the Supreme Court upheld a challenge to a
Colorado law that would have required firms to report online sales to state residents as one step
to ensure the residents paid taxes on such sales in Colorado, which is required by state law.
In 2018, in the landmark South Dakota v. Wayfair case, the Supreme Court reversed its earlier
position and ruled that states can levy sales taxes on online sales. The businesses that may be
most drastically affected by the Wayfair ruling are smaller sellers, such as third-party Amazon
merchants, sellers on smaller marketplaces such as Etsy, and other independent e-commerce
retailers who will now have to comply with thousands of tax jurisdiction requirements across the
country. These sellers will be forced to invest in tax reporting software and other compliance
technology, which may prove prohibitive for businesses without the profit margins to sustain the
additional costs. Congress is expected to introduce legislation protecting small businesses from
potential overreach from states by 2019. A group of senators from states that do not levy sales
taxes have already put forth a bill that would reverse the Wayfair decision and reintroduce the
provisions of the Quill ruling and regulate the powers of the states to control interstate e-
commerce. It’s not clear that this bill will succeed where so many others have failed, but at the
very least, small businesses will now be eagerly looking to Congress to create federal guidelines
for regulatory compliance, relieving businesses of much of the burden facing them in the wake of
Wayfair.
Difficulty: Difficult
AACSB: Analytical thinking; Written and oral communication
Learning Objective: 8.4: Understand how the Internet is governed and why taxation of e-
commerce raises governance and jurisdiction issues.
82) Which of the following is not an e-commerce public safety and welfare issue?
A) regulation of gambling
B) regulation of cigarette sales
C) regulation of pornography
D) regulation of taxation
Answer: D
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.5: Identify major public safety and welfare issues raised by e-commerce.
83) The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme
Court as unconstitutional.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.5: Identify major public safety and welfare issues raised by e-commerce.
84) Section 230 of the Communications Decency Act (CDA) provides immunity for providers
and users of interactive computer services (such as ISPs and websites) from being considered a
publisher that might be liable for harmful content posted by others.
23
Copyright © 2020 Pearson Education, Inc.
Answer: TRUE
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 8.5: Identify major public safety and welfare issues raised by e-commerce.
24
Copyright © 2020 Pearson Education, Inc.
2) ________ is the ability to ensure that e-commerce participants do not deny their online
actions.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Answer: A
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the
key dimensions of e-commerce security, and the tension between security and other values.
3) ________ is the ability to identify the person or entity with whom you are dealing on the
Internet.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the
key dimensions of e-commerce security, and the tension between security and other values.
1
Copyright © 2020 Pearson Education, Inc.
key dimensions of e-commerce security, and the tension between security and other values.
5) ________ is the ability to ensure that an e-commerce site continues to function as intended.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Answer: C
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the
key dimensions of e-commerce security, and the tension between security and other values.
7) ________ is the ability to ensure that messages and data are only available to those authorized
to view them.
A) Confidentiality
B) Integrity
C) Privacy
D) Availability
Answer: A
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the
key dimensions of e-commerce security, and the tension between security and other values.
8) Typically, the more security measures added to an e-commerce site, the slower and more
difficult it becomes to use.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the
key dimensions of e-commerce security, and the tension between security and other values.
loss.
Difficulty: Easy
AACSB: Analytical thinking; Written and oral communication
Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the
key dimensions of e-commerce security, and the tension between security and other values.
10) Which of the following statements about data breaches in 2017 is not true?
A) According to the Identity Theft Resource Center, the number of breaches in 2017 increased by
almost 45% from 2016.
B) According to the Identity Theft Resource Center, over 50% of data breaches involved social
security numbers.
C) According to the Identity Theft Resource Center, employee error was the leading cause of
data breaches.
D) According to the Identity Theft Resource Center, data breaches involving the business sector
represented over 55% of all breaches.
Answer: C
Difficulty: Difficult
AACSB: Application of knowledge
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
12) The overall rate of online credit card fraud is ________ of all online card transactions.
A) less than 1%
B) around 5%
C) around 10%
D) around 15%
Answer: A
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
13) Which of the following did the Internet Advertising Bureau urge advertisers to abandon?
A) HTML
B) HTML5
C) Adobe Flash
D) Adobe Acrobat
Answer: C
Difficulty: Moderate
AACSB: Information technology
3
Copyright © 2020 Pearson Education, Inc.
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
15) Which of the following is not a key factor for establishing e-commerce security?
A) data integrity
B) technology
C) organizational policies
D) laws and industry standards
Answer: A
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the
key dimensions of e-commerce security, and the tension between security and other values.
18) Software that is used to obtain private user information such as a user's keystrokes or copies
of e-mail is referred to as:
A) spyware.
B) a backdoor.
C) browser parasite.
4
Copyright © 2020 Pearson Education, Inc.
D) adware.
Answer: A
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
19) According to Symantec, almost half of the e-mail addresses involved in business e-mail
compromise (BEC) phishing that it analyzed had an IP address originating in:
A) China.
B) Russia.
C) Nigeria.
D) North Korea.
Answer: C
Difficulty: Easy
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
20) What is the most frequent cause of stolen credit cards and card information today?
A) lost cards
B) the hacking and looting of corporate servers storing credit card information
C) sniffing programs
D) phishing attacks
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
23) The attack on Dyn Inc. in 2016 is an example of which of the following?
5
Copyright © 2020 Pearson Education, Inc.
25) Malware that comes with a downloaded file that a user requests is called a:
A) Trojan horse.
B) backdoor.
C) drive-by download.
D) PUP.
Answer: C
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
26) Which of the following is not an example of a potentially unwanted program (PUP)?
A) adware
B) browser parasite
C) drive-by download
D) spyware
Answer: C
Difficulty: Difficult
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
27) Which of the following was designed to cripple Iranian nuclear centrifuges?
A) Stuxnet
B) Shamoon
C) Snake
D) Storm
Answer: A
Difficulty: Moderate
AACSB: Information technology
6
Copyright © 2020 Pearson Education, Inc.
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
28) Automatically redirecting a web link to a different address is an example of which of the
following?
A) sniffing
B) social engineering
C) pharming
D) DDoS attack
Answer: C
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
29) According to the Identity Theft Resource Center, the number of data breaches in 2017
increased by ________ compared to 2016.
A) 15%
B) 45%
C) 55%
D) 75%
Answer: C
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.1: Understand the scope of e-commerce crime and security problems, the
key dimensions of e-commerce security, and the tension between security and other values.
30) According to Ponemon Institute's 2017 survey, which of the following was not among the
causes of the most costly cybercrimes?
A) malicious insiders
B) malicious code
C) denial of service
D) botnets
Answer: D
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
31) ________ typically attack governments, organizations, and sometimes individuals for
political purposes.
A) Crackers
B) White hats
C) Grey hats
D) Hacktivists
Answer: D
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
32) IoT botnets became the preferred platform for launching DDoS attacks in 2017.
7
Copyright © 2020 Pearson Education, Inc.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
33) A Trojan horse appears to be benign, but then does something other than expected.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
36) Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP
address.
Answer: TRUE
Difficulty: Difficult
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
37) Exploit kits can be purchased by users to protect their computers from malware.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
38) A drive-by download is malware that comes with a downloaded file that a user intentionally
or unintentionally requests.
Answer: TRUE
Difficulty: Difficult
AACSB: Information technology
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
40) What is the Internet of Things (IoT) and what security issues and challenges does it raise?
Answer: The Internet of Things (IoT) involves the use of the Internet to connect a wide variety
of sensors, devices, and machines, and is powering the development of a multitude of smart
connected things, such as home electronics (smart TVs, thermostats, home security systems, and
more). IoT also includes connected cars, medical devices and industrial equipment that supports
manufacturing, energy, transportation, and other industrial sectors.
Unfortunately, IoT raises a host of security issues similar to existing security challenges, but
even more challenging, given the need to deal with a wider range of devices, operating in a less
controlled, and global environment. In a world of connected things, the devices, the data
produced and used by the devices, and the systems and applications supported by those devices,
can all potentially be attacked. For instance, many IoT devices, such as sensors, are intended to
be deployed on a much greater scale than traditional Internet-connected devices, creating a vast
quantity of interconnected links that can be exploited. Existing tools, methods, and strategies
need to be developed to deal with this unprecedented scale. Many instances of IoT consist of
collections of identical devices that all have the same characteristics, which magnifies the
potential impact of security vulnerabilities.
Many IoT devices are anticipated to have a much longer service life than typical equipment,
which raises the possibility that devices may "outlive" the manufacturer, leaving them without
long-term support that creates persistent vulnerabilities. Many IoT devices are intentionally
designed without the ability to be upgraded, or the upgrade process is difficult, which raises the
possibility that vulnerable devices cannot or will not be fixed, leaving them perpetually
vulnerable. Many IoT devices do not provide the user with visibility into the workings of the
device or the data being produced, nor alert the user when a security problem arises, so users
may believe an IoT device is functioning as intended when in fact, it may be performing in a
malicious manner. Finally, some IoT devices, such as sensors, are unobtrusively embedded in the
environment such that a user may not even be aware of the device, so a security breach might
persist for a long time before being noticed.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
41) Define the terms tiger team, white hat, black hat, and grey hat and discuss the difference
between them.
Answer:
Groups of hackers called tiger teams are sometimes used by corporate security departments to
test their own security measures. By hiring hackers to break into the system from the outside, the
company can identify weaknesses in the computer system’s armor. These “good hackers” became
known as white hats because of their role in helping organizations locate and fix security flaws.
White hats do their work under contract, with agreement from the target firms that they will not
be prosecuted for their efforts to break in. Hardware and software firms such as Apple,
Microsoft, Intel, HP, and many others pay bounties of $25,000 to $250,000 to white hat hackers
for discovering bugs in their software and hardware.
In contrast, black hats are hackers who engage in the same kinds of activities but without pay or
any buy-in from the targeted organization, and with the intention of causing harm. They break
9
Copyright © 2020 Pearson Education, Inc.
into websites and reveal the confidential or proprietary information they find. These hackers
believe strongly that information should be free, so sharing previously secret information is part
of their mission.
Somewhere in the middle are the grey hats, hackers who believe they are pursuing some greater
good by breaking in and revealing system flaws. Grey hats discover weaknesses in a system’s
security, and then publish the weakness without disrupting the site or attempting to profit from
their finds. Their only reward is the prestige of discovering the weakness. Grey hat actions are
suspect, however, especially when the hackers reveal security flaws that make it easier for other
criminals to gain access to a system.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
42) What is a sniffing attack and how does it differ from a MitM attack?
Answer: A sniffer is a type of eavesdropping program that monitors information traveling over a
network. When used legitimately in a sniffing attack, hackers use sniffers to steal proprietary
information from a network, including passwords, e-mail messages, company files, and
confidential reports. A man-in-the-middle (MitM) attack also involves eavesdropping but is more
active than a sniffing attack, which typically involves passive monitoring. In a MitM attack, the
attacker can intercept communications between two parties who believe they are directly
communicating with one another, when in fact the attacker is controlling the communications.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
43) Discuss and explain the various types of malicious code and how they work. Include the
different types of viruses.
Answer: Malicious code includes a variety of threats such as viruses, worms, Trojan horses,
ransomware, and bot programs. A virus is a computer program that can replicate or make copies
of itself and spread to other files. Viruses can range in severity from simple programs that display
a message or graphic as a "joke" to more malevolent code that will destroy files or reformat the
hard drive of a computer, causing programs to run incorrectly. Worms are designed to spread not
only from file to file but from computer to computer and do not necessarily need to be activated
in order to replicate. A Trojan horse is not itself a virus because it does not replicate but it is a
method by which viruses or other malicious code can be introduced into a computer system. It
appears benign and then suddenly does something harmful. For example, it may appear to be
only a game and then it will steal passwords and mail them to another person. A backdoor is a
feature of worms, viruses, and Trojans that allow attackers to remotely access compromised
computers. Ransomware is a type of malware (often a worm) that locks your computer or files to
stop you from accessing them. Bot programs are a type of malicious code that can be covertly
installed on a computer when it is attached to the Internet. Once installed, the bot responds to
external commands sent by the attacker, and many bots can be coordinated by a hacker into a
botnet.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 5.2: Identify the key security threats in the e-commerce environment.
10
Copyright © 2020 Pearson Education, Inc.
46) All the following statements about symmetric key cryptography are true except:
A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt
and decrypt a message.
B) the Data Encryption Standard is a symmetric key encryption system.
C) symmetric key cryptography is computationally slower.
D) symmetric key cryptography is a key element in digital envelopes.
Answer: C
Difficulty: Difficult
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
48) All of the following statements about public key cryptography are true except:
A) public key cryptography uses two mathematically related digital keys.
11
Copyright © 2020 Pearson Education, Inc.
50) All of the following statements about PKI are true except:
A) the term PKI refers to the certification authorities and digital certificate procedures that are
accepted by all parties.
B) PKI is not effective against insiders who have a legitimate access to corporate systems
including customer information.
C) PKI guarantees that the verifying computer of the merchant is secure.
D) the acronym PKI stands for public key infrastructure.
Answer: C
Difficulty: Difficult
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
52) Which of the following dimensions of e-commerce security is not provided for by
encryption?
A) confidentiality
B) availability
12
Copyright © 2020 Pearson Education, Inc.
C) message integrity
D) nonrepudiation
Answer: B
Difficulty: Difficult
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
53) All of the following are methods of securing channels of communication except:
A) SSL/TLS.
B) digital certificates.
C) VPN.
D) FTP.
Answer: D
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
54) A ________ is hardware or software that acts as a filter to prevent unwanted packets from
entering a network.
A) firewall
B) virtual private network
C) proxy server
D) PPTP
Answer: A
Difficulty: Easy
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
57) An intrusion detection system can perform all of the following functions except:
A) examining network traffic.
B) setting off an alarm when suspicious activity is detected.
C) checking network traffic to see if it matches certain patterns or preconfigured rules.
D) blocking suspicious activity.
Answer: D
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
62) Which of the following is the most common protocol for securing a digital channel of
communication?
A) DES
B) SSL/TLS
C) VPN
D) HTTP
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
64) The easiest and least expensive way to prevent threats to system integrity is to install anti-
virus software.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
65) Explain the difference between symmetric key cryptography and public key cryptography.
Which dimensions of e-commerce security does encryption address?
Answer: Symmetric key cryptography involves the use of a secret cipher that transforms plain
text into cipher text. Both the sender and the receiver use the same key to encrypt and decrypt the
message. The possibilities for simple substitution and transposition ciphers are endless, but there
are several flaws in these types of systems that make them inadequate for use today. First, for the
sender and the receiver to have the same key, it must be sent over a communication medium that
is insecure or they must meet in person to exchange the key. If the secret key is lost or stolen, the
encryption system fails. This method can be used effectively for data storage protection but is
less convenient for e-mail since the correspondents must pass the secret key to one another over
15
Copyright © 2020 Pearson Education, Inc.
another secure medium prior to commencing the communication. Second, in the digital age,
computers are so fast and powerful that these ancient encryption techniques can be quickly and
easily broken. Modern digital encryption systems must use keys with between 56 and 512 binary
digits to ensure that decryption would be unlikely. Third, for commercial use on an e-commerce
site each of the parties in a transaction would need a secret key. In a population of millions of
Internet users, thousands of millions of keys would be needed to accommodate all e-commerce
customers.
Public key cryptography solves the problem of exchanging keys. In this method every user has a
pair of numeric keys: private and public. The public key is not secret; on the contrary, it is
supposed to be disseminated widely. Public keys may be published in company catalogs or on
online. The public key is used by outside parties to encrypt the messages addressed to you. The
private or secret key is used by the recipient to decipher incoming messages. The main advantage
of a public key cryptographic system is its ability to begin secure correspondence over the
Internet without prior exchanging of the keys and, therefore, without the need for a meeting in
person or using conventional carriers for key exchange.
Encryption can provide four of the six key dimensions of e-commerce security. It can provide
assurance that the message has not been altered (integrity), prevent the user from denying that
he/she has sent the message (nonrepudiation), provide verification of the identity of the message
(authentication), and give assurance that the message has not been read by others
(confidentiality).
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
66) What dimensions do digital signatures and hash digests add to public key cryptography and
how do they work?
Answer: Digital signatures and hash digests can add authentication, nonrepudiation, and
integrity when used with public key encryption. Encryption technology also allows for digital
signatures and authentication. The sender encrypts the message yet again using their private key
to produce a digital signature.
To check the confidentiality of a message and ensure it has not been altered in transit, a hash
function is used first to create a digest of the message. A hash function is an algorithm that
produces a fixed-length number called a hash or message digest. To ensure the authenticity of the
message and to ensure nonrepudiation, the sender encrypts the entire block of cipher text one
more time using the sender's private key. This produces a digital signature or "signed" cipher
text. The result of this double encryption is sent over the Internet to the recipient. Then, the
recipient first uses the sender's public key to authenticate the message. Once authenticated, the
recipient uses his or her private key to obtain the hash result and original message. As a final
step, the recipient applies the same hash function to the original text and compares the result with
the result sent by the sender. If the results are the same, the recipient now knows the message has
not been changed during transmission. The message has integrity.
Difficulty: Difficult
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 5.3: Describe how technology helps secure Internet communications
16
Copyright © 2020 Pearson Education, Inc.
67) Discuss the security of communications channels. Include definitions and explanations for
the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS), secure negotiated session,
session key, and VPN.
Answer: The Secure Sockets Layer of the Transmission Control Protocol/Internet Protocol
(TCP/IP) communications protocol is the main method for securing communications channels on
the Web. When you receive a message from a web server then you will be communicating
through a secure channel; this means that SSL/TLS will be used to establish a secure negotiated
session. A secure negotiated session is a client-server session in which the URL of the requested
document, its contents, and the contents of the forms filled out by the user on the page, as well as
the cookies that are exchanged, are all encrypted. The browser and the server exchange digital
certificates with one another, determine the strongest shared form of encryption, and begin
communicating using a unique symmetric encryption key, agreed upon for just this encounter.
This is called a session key. SSL/TLS provides data encryption, server authentication, optional
client authentication (as yet still rare for individual users), and message integrity for the TCP/IP
connections between two computers.
SSL/TLS addresses the threat of authenticity by allowing users to verify another user's identity
or the identity of a server. It also protects the integrity of the messages exchanged. However,
once the merchant receives the encrypted credit and order information, that information is
typically stored in unencrypted format on the merchant's servers. While SSL/TLS provides
secure transactions between merchant and consumer, it only guarantees server-side
authentication. Client authentication is optional. In addition, SSL/TLS cannot provide
irrefutability — consumers can order goods or download information products and then claim
the transaction never occurred.
Virtual private networks (VPNs) enable remote users to access an internal network from the
Internet. They use protocols to create a private connection between a user on a local ISP and a
private network. This process is called tunneling because it creates a private connection by
adding an encrypted wrapper around the message to hide its content. It is called virtual because it
appears to be a dedicated secure line when in fact it is a temporary secure line. VPNs are used
primarily for transactions between business partners because dedicated connections can be very
expensive. The Internet and VPNs can be used to significantly reduce the costs of secure
communications.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 5.3: Describe how technology helps secure Internet communications
channels and protect networks, servers, and clients.
Learning Objective: 5.4: Appreciate the importance of policies, procedures, and laws in creating
security.
69) To allow lower-level employees access to the corporate network while preventing them from
accessing private human resources documents, you would use:
A) a firewall.
B) an authorization management system.
C) security tokens.
D) an authorization policy.
Answer: B
Difficulty: Easy
AACSB: Information technology
Learning Objective: 5.4: Appreciate the importance of policies, procedures, and laws in creating
security.
72) All of the following statements about Apple Pay are true except which of the following?
A) Apple Pay is the most popular alternative payment method in the United States.
B) Apple Pay is an example of a universal proximity mobile wallet.
C) Apple Pay can be used for mobile payments at the point of sale at a physical store.
D) Apple Pay has more users than either Google Pay or Samsung Pay.
Answer: A
Difficulty: Moderate
AACSB: Information technology
18
Copyright © 2020 Pearson Education, Inc.
Learning Objective: 5.5: Identify the major e-commerce payment systems in use today.
75) Which of the following is not a major trend in e-commerce payments in 2018-2019?
A) Mobile retail payment volume decreases.
B) PayPal remains the most popular alternative payment method.
C) Large banks enter the mobile wallet and P2P payments market.
D) Payment by credit and/or debit card remains the dominant form of online payment.
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 5.5: Identify the major e-commerce payment systems in use today.
76) All of the following are limitations of the existing online credit card payment system except:
A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.
Answer: B
Difficulty: Moderate
AACSB: Application of knowledge
Learning Objective: 5.5: Identify the major e-commerce payment systems in use today.
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.5: Identify the major e-commerce payment systems in use today.
78) Which of the following is a set of short-range wireless technologies used to share
information among devices within about two inches of each other?
A) DES
B) NFC
C) IM
D) text messaging
Answer: B
Difficulty: Difficult
AACSB: Information technology
Learning Objective: 5.5: Identify the major e-commerce payment systems in use today.
83) Explain how an online credit card transaction works, identifying the parties involved and
describing how SSL/TLS is involved. What are the limitations of online credit card payment
systems?
Answer: The five parties involved in a credit card transaction are the consumer, the merchant,
the clearinghouse, the merchant bank (acquiring bank), and the consumer's card issuing bank.
The basic payment transaction process works like this: The consumer first makes an online
payment by sending his or her credit card information via an online form at the merchant's
website. Once this information is received by the merchant, the merchant software contacts a
clearinghouse (a financial intermediary that authenticates credit cards and verifies account
20
Copyright © 2020 Pearson Education, Inc.
balances). The clearinghouse contacts the card issuing bank to verify the account information.
Once verified, the issuing bank credits the account of the merchant at the merchant's bank. The
debit to the consumer account is transmitted to the consumer in a monthly statement. SSL is
involved in sending the consumer's credit card information safely to the merchant's website.
When the consumer checks out using the merchant's shopping cart software, a secure tunnel
through the Internet is created using SSL/TLS. Using encryption, SSL/TSL secures the session
during which credit card information will be sent to the merchant and protects the information
from interlopers on the Internet.
There are a number of limitations to the existing credit card payment system, most importantly
involving security, merchant risk, cost, and social equity. The security of the transaction is very
poor because neither the merchant nor the consumer can be fully authenticated. The risks
merchants face is high. Banks think of Internet credit card orders as the same type of transactions
as mail orders or telephone orders. In these transactions, the credit card is not present. There is
no way for the merchant to verify the legitimacy of the customer's card or identity before
confirming the order. In these transactions, the merchant carries all the risk for fraudulent credit
card use. Consumers can disclaim charges even though the items have already been shipped.
Merchants also must pay significant charges. These high costs make it unprofitable to sell small
items such as individual articles or music tracks over the Internet. Furthermore, credit cards are
not very democratic. Millions of young adults and other adult Americans who cannot afford
credit cards or who have low incomes and are, therefore, considered poor credit risks cannot
participate in e-commerce as it is presently structured in the United States.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 5.5: Identify the major e-commerce payment systems in use today.
84) Today, online bill payment accounts for ________ of all bill payments, while paper checks
account for ________.
A) less than 10%; less than 25%
B) about 25%; about 10%
C) more than 55%; less than 20%
D) about 95%; about 5%
Answer: C
Difficulty: Difficult
AACSB: Information technology
Learning Objective: 5.6: Describe the features and functionality of electronic billing
presentment and payment systems.
85) Define and explain how electronic billing presentment and payment systems (EBPP) systems
work. Describe each of the main EBPP business models.
Answer: EBPP refers to electronic billing presentment and payment systems, which are systems
that enable the online delivery and payment of monthly bills. EBPP services allow consumers to
view bills electronically using either their desktop PC or mobile device and pay them through
electronic funds transfers from bank or credit card accounts. More and more companies are
choosing to issue statements and bills electronically, rather than mailing out paper versions,
especially for recurring bills such as utilities, insurance, and subscriptions.
There are four main types of EBPP business models: online banking, biller-direct, mobile, and
21
Copyright © 2020 Pearson Education, Inc.
consolidator. The online banking model is the most widely used today. Consumers establish an
online payment service with their banks and use it to pay bills as they come due or automatically
make payments for, say, rent. The payments are made directly to the seller's bank account. This
model has the advantage of convenience for the consumer because the payments are deducted
automatically, usually with a notice from the bank or the merchant that their account has been
debited. In the biller-direct model, consumers are sent bills by e-mail notification, and go to the
merchant's website to make payments using their banking credentials. This model has the
advantage of allowing the merchant to engage with the consumer by sending coupons or
rewards.
The biller-direct model is a two-step process, and less convenient for consumers. The mobile
model allows consumers to make payments using mobile apps, once again relying on their bank
credentials as the source of funds. Consumers are notified of a bill by text message and authorize
the payment. An extension of this is the social-mobile model, where social networks like
Facebook integrate payment into their messaging services. The mobile model has several
advantages, not least of which is the convenience for consumers of paying bills while using their
phones, but also the speed with which bills can be paid in a single step. This is the fastest
growing form of EBPP. In 2016, Facebook and PayPal announced a deal in which Facebook
users can pay for purchases on Facebook using PayPal. Facebook Messenger can be used for P2P
payments and payments to groups to pay for meals and other activities. Facebook is not charging
for these transfers and receives 97% of its Messenger revenue from advertising.
In the consolidator model, a third party, such as a financial institution or a focused portal such as
Intuit's Paytrust, Fiserv's MyCheckFree, Mint Bills, and others, aggregates all bills for consumers
and permits one-stop bill payment. This model has the advantage of allowing consumers to see
all their bills at one website or app. However, because bills come due at different times,
consumers need to check their portals often. The consolidator model faces several challenges.
For billers, using the consolidator model means an increased time lag between billing and
payment, and inserts an intermediary between the company and its customer.
Supporting these primary business models are infrastructure providers such as Fiserv, Yodlee,
FIS Global, ACI Worldwide, MasterCard RPPS (Remote Payment and Presentment Service), and
others that provide the software to create the EBPP system or handle billing and payment
collection for the biller.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral communication
Learning Objective: 5.6: Describe the features and functionality of electronic billing
presentment and payment systems.
22
Copyright © 2020 Pearson Education, Inc.
A) privacy.
B) authenticity.
C) integrity.
D) nonrepudiation.
Answer: A
2) ________ refers to the ability to ensure that e-commerce participants do not deny
their online actions.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity Answer: A
3) ________ refers to the ability to identify the person or entity with whom you are
dealing on the Internet.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Answer: B
A) A Web site is not actually operated by the entity the customer believes it to be.
C) A customer denies that he or she is the person who placed the order.
D) An unauthorized person intercepts an online communication and changes its
contents.
Answer: D
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Answer: C
B) your online purchasing history being sold to other merchants without your consent
Answer: B
7) ________ refers to the ability to ensure that messages and data are only available to
those authorized to view them.
A) Confidentiality
B) Integrity
C) Privacy
D) Availability
Answer: A
10) All of the following experienced high-profile data breaches in 2014 except:
A) eBay.
B) Home Depot.
C) Amazon.
D) Sony.
Answer: C
A) digital cash.
B) virtual currency.
D) an EBPP system.
Answer: A
12) The overall rate of online credit card fraud is ________ of all online card
transactions.
A) less than 1%
B) around 5%
C) around 10%
D) around 15%
Answer: A
13) Which of the following has the Internet Advertising Bureau urged advertisers to
abandon?
A) HTML
B) HTML5
C) Adobe Flash
D) Adobe Acrobat
Answer: C
14) Accessing data without authorization on Dropbox is an example of which of the
following?
D) sniffing
Answer: B
A) Anonymous.
B) LulzSec.
C) Impact Team.
D) Avid Life.
Answer: D
A) virus
B) worm
C) Trojan horse
D) botnet
Answer: B
A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks
Answer: C
18) Software that is used to obtain private user information such as a user's keystrokes
or copies of e-mail is referred to as:
A) spyware.
B) a backdoor.
C) browser parasite.
D) adware.
Answer: A
D) a browser parasite
Answer: A
20) What is the most frequent cause of stolen credit cards and card information today?
A) lost cards
B) the hacking and looting of corporate servers storing credit card information
C) sniffing programs
D) phishing attacks
Answer: B
A) integrity
B) availability
A) scareware
B) Trojan horse
C) bot
D) sniffer
Answer: D
B) browser parasite
C) DDoS attack
D) Trojan horse/botnet
Answer: D
A) worm
B) botnet
C) phishing
D) hacktivism
Answer: B
25) Malware that comes with a downloaded file that a user requests is called a:
A) Trojan horse.
B) backdoor.
C) drive-by download.
D) PUP.
Answer: C
A) adware
B) browser parasite
C) drive-by download
D) spyware
Answer: C
27) Which of the following was designed to cripple Iranian nuclear centrifuges?
A) Stuxnet
B) Flame
C) Snake
D) Storm
Answer: A
A) sniffing
B) social engineering
C) pharming
D) DDoS attack
Answer: C
A) mobile malware
B) software vulnerability
C) botnet
D) Trojan horse
Answer: B
30) According to Ponemon Institute's 2015 survey, which of the following was not
among the causes of the most costly cybercrimes?
A) malicious insiders
B) malicious code
C) denial of service
D) botnets
Answer: C
A) Crackers
B) White hats
C) Grey hats
D) Hacktivists
Answer: D
Answer: C
C) PGP.
D) PKI.
Answer: B
46) All the following statements about symmetric key cryptography are true except:
A) in symmetric key cryptography, both the sender and the receiver use the same key
to encrypt and decrypt a message.
Answer: C
A) 8
B) 56
C) 256
D) 512
Answer: B
48) All of the following statements about public key cryptography are true except:
Answer: B
49) Which of the following is the current standard used to protect Wi-Fi networks?
A) WEP
B) TLS
C) WPA2
D) WPA3
Answer: C
50) All of the following statements about PKI are true except:
A) The term PKI refers to the certification authorities and digital certificate
procedures that are accepted by all parties.
B) PKI is not effective against insiders who have a legitimate access to corporate
systems including customer information.
Answer: C
Answer: A.
52) Which of the following dimensions of e-commerce security is not provided for by
encryption?
A) confidentiality
B) availability
C) message integrity
D) nonrepudiation
Answer: B
53) All of the following are methods of securing channels of communication except:
A) SSL/TLS.
B) certificates.
C) VPN.
D) FTP.
Answer: D
A) firewall
C) proxy server
D) PPTP
Answer: A
A) firewalls.
B) application gateways.
D) packet filters.
Answer: C
A) digital signatures.
B) certificates of authority.
C) biometric devices.
D) packet filters.
Answer: D
57) An intrusion detection system can perform all of the following functions except:
Answer: D
A) firewalls
B) proxy servers
C) digital signatures
D) login passwords
Answer: C
Answer: C
Answer: A
Answer: A
62) Which of the following is the most common protocol for securing a digital
channel of communication?
Answer: B
Answer: C
69) To allow lower-level employees access to the corporate network while preventing
them from accessing private human resources documents, you would use:
Answer: B
D) The Federal Trade Commission has asserted that it has authority over corporations'
data security practices.
Answer: C
71) All of the following are examples of social/mobile peer-to-peer payment systems
except:
Answer: B
72) All of the following statements about Apple Pay are true except which of the
following?
C) Apple Pay can be used for mobile payments at the point of sale at a physical store.
Answer: A
Answer: A
Answer: B
D) Payment by credit and/or debit card remains the dominant form of online payment.
Answer: A
76) All of the following are limitations of the existing online credit card payment
system except:
Answer: B
77) Linden Dollars, created for use in Second Life, are an example of:
Answer: B
78) Which of the following is a set of short-range wireless technologies used to share
information among devices within about two inches of each other?
Answer: B
84) In 2014, online bill payment accounted for ________ of all bill payments, while paper
checks accounted for ________.
A) less than 10%; less than 25%
B) about 25%; about 10%
C) more than 50%; less than 25%
D) 100%; 0%
Answer: C
Chapter 6. E-commerce Marketing and Advertising Concepts
1) Around ________ % of households in the United States have broadband access to the
Internet.
A) 45
B) 55
C) 75
D) 85
Answer: C
2) Which of the following online advertising formats attracted the least amount of spending
in 2015?
A) search
B) classifieds
C) rich media
D) e-mail
Answer: D
3) Which of the following is not one of the main stages of the online purchasing process? A)
post-purchase service and loyalty
B) awareness
C) engagement
D) conversation
Answer: D
4) In 2015, what was the approximate Internet penetration rate for individuals that have
attained less than a high-school education?
A) 25%
B) 33%
C) 66%
D) 75%
Answer: C
5) All of the following are online communications that are used to support the evaluation of
alternatives stage of the consumer decision process except:
A) search engines.
B) online catalogs.
C) social networks.
D) targeted banner ads.
Answer: D
6) Online buyers constitute approximately ________ % of the online Internet audience.
A) 65
B) 75
C) 85
D) 95
Answer: B
7) In modeling online consumer behavior, the concept of "consumer skills" refers to the:
A) education level of the consumer.
B) communication skills of the consumer.
C) knowledge consumers have about how to conduct online transactions.
D) product evaluation skills of the consumer.
Answer: C
13) Google introduced which of the following changes to its search algorithm in 2011 to
weed out low quality sites from search results?
A) Penguin
B) Hummingbird
C) Panda
D) Knowledge Graph
Answer: C
14) Which of the following forms of online advertising is expected to grow the fastest
between 2015 and 2019?
A) paid search
B) sponsorships
C) search engines
D) rich media
Answer: D
15) Which of the following is not one of the four main methods advertisers use to
behaviorally target ads?
A) Nielsen ratings
B) data collected from social networks
C) integration of online data with offline data
D) clickstream data
Answer: A
16) Which of the following search engine algorithm updates enables Google's search engine
to evaluate an entire sentence rather than just a key word?
A) Panda
B) Penguin
C) Hummingbird
D) Graph Search
Answer: C
17) Which of the following is not true about search engine advertising?
A) Spending on search engine advertising constitutes over 40% of all online advertising
spending.
B) The top three search engine providers supply over 95% of all online searches.
C) The click-through rate for search engine marketing has been fairly steady over the years.
D) Search engine advertising is the fastest growing type of online advertising.
Answer: D
18) Which of the following is not a practice that degrades the results and usefulness of
search engines?
A) social search
B) link farms
C) content farms
D) click fraud
Answer: A
19) Amazon's Associates program is an example of which of the following?
A) viral marketing
B) local marketing
C) affiliate marketing
D) lead generation marketing
Answer: C
20) Ad blockers operate in a manner very similar to which of the following?
A) anti-virus software
B) firewalls
C) Flash cookies
D) anonymous browsing
Answer: B
21) Which of the following is not a primary source of ad fraud?
A) browser extensions that insert ads into a premium publisher's Web site and then list the
ads as available on a programmatic ad exchange
B) ad targeting firms that create bots that imitate the behavior of real shoppers and then
charge advertisers
C) botnets hired by publishers to click on Web pages to create phony traffic
D) native advertising that is displayed on a social media site
Answer: D
22) In the first seven months of 2015, the percentage of all e-mail that is spam averaged
around ________ %.
A) 50
B) 60
C) 70
D) 80
Answer: A
23) Which of the following statements about CAN-SPAM is not true?
A) CAN-SPAM went into effect in January 2004.
B) CAN-SPAM prohibits unsolicited e-mail (spam).
C) CAN-SPAM prohibits the use of deceptive subject lines and false headers.
D) Large spammers are among CAN-SPAM's biggest supporters.
Answer: B
24) Which of the following statements about Canada's anti-spam law is not true?
A) Canada's law is based on an opt-in model.
B) The law has no impact on companies located within the United States.
C) The first phase of the law went into effect in 2014.
D) The law applies to e-mail, texts, and social media messaging.
Answer: B
25) Which of the following is the most important tool in establishing a relationship with the
customer?
A) company Web site
B) company CRM system
C) Facebook
D) search engine display ads
Answer: A
26) All of the following are "traditional" online marketing tools except:
A) affiliate marketing.
B) e-mail and permission marketing.
C) social marketing.
D) sponsorship marketing.
Answer: C
27) All of the following are among those most frequently affected by ad-blocking except:
A) gaming sites.
B) newsgroup/forums.
C) social network sites.
D) online retailers.
Answer: D
28) The Nike iD program is an example of which of the following marketing techniques?
A) customer co-production
B) transactive content
C) price discrimination
D) permission marketing
Answer: A
29) The incremental cost of building the next unit of a good is called the:
A) Law of One Price.
B) variable cost.
C) marginal cost.
D) fixed cost.
Answer: C
30) Which of the following statements about a free pricing strategy is false?
A) Free products and services can knock out potential and actual competitors.
B) The free pricing strategy was born in the early days of the Web.
C) It is difficult to convert free customers into paying customers.
D) Free products and services can help build market awareness.
Answer: B
31) Creating multiple variations of information goods and selling these to different market
segments at different prices is called:
A) bundling.
B) customization.
C) dynamic pricing.
D) versioning.
Answer: D
32) All of the following are fixed price strategies except:
A) bundling.
B) versioning.
C) free pricing.
D) yield management.
Answer: D
33) Which of the following involves getting customers to pass along a company's marketing
message to friends, family, and colleagues?
A) affiliate marketing
B) viral marketing
C) native advertising
D) lead generation marketing
Answer: B
34) Google's AdSense is an example of which of the following?
A) context advertising
B) SEO
C) programmatic advertising
D) viral marketing
Answer: A
35) Which of the following is based on the idea of complete price transparency in a perfect
information marketplace?
A) the Law of One Price
B) dynamic pricing
C) price discrimination
D) versioning
Answer: A
36) Which of the following industries accounts for the highest percentage of spending on
online advertising?
A) financial services
B) retail
C) automotive
D) entertainment
Answer: B
37) Which of the following statements about native advertising is not true?
A) Native advertising is controversial.
B) Native advertising is a new form of advertising found only online.
C) Native advertising is growing rapidly, especially on social networks.
D) Consumers look at native ads much more frequently than display ads.
Answer: B
38) Which of the following is an automated, auction-based method for matching demand
and supply for online display ads?
A) retargeting
B) behavioral targeting
C) programmatic advertising
D) keyword advertising
Answer: C
50) Which of the following would you implement to collect and analyze your company's
Big Data?
A) data warehouse
B) Hadoop
C) SQL
D) profiling
Answer: B
51) Which of the following statements about the Internet's impact on marketing is not true?
A) The Internet has broadened the scope of marketing communications.
B) The Internet has decreased the impact of brands.
C) The Internet has increased the richness of marketing communications.
D) The Internet has expanded the information intensity of the marketplace.
Answer: B
52) Which of the following features of e-commerce technology has reduced the cost of
delivering marketing messages and receiving feedback from users?
A) ubiquity
B) richness
C) information density
D) universal standards
Answer: D
53) Which of the following features of e-commerce technology allows fine-grained, highly
detailed information on consumers' real-time behavior to be gathered and analyzed?
A) personalization/customization
B) information density
C) ubiquity
D) interactivity
Answer: B
54) The richness made possible by e-commerce technologies does which of the following?
A) It reduces the cost of delivering marketing messages and receiving feedback from users.
B) It allows consumers to become co-producers of the goods and services being sold.
C) It allows video, audio, and text to be integrated into a single marketing message and
consuming experience.
D) It enables worldwide customer service and marketing communications.
Answer: C
55) For a Web site that has 100,000 visitors a month, and where on average, a visitor makes
five page requests per visit, there will be ________ entries in the transaction log each
month.
A) 50,000
B) 500,000
C) 5 million
D) 50 million
Answer: B
56) All of the following statements about cookies are true except:
A) cookies can be used with Web bugs to create cross-site profiles of users.
B) the data typically stored in cookies includes a unique ID and e-mail address.
C) cookies make shopping carts possible by allowing a site to keep track of a user's actions.
D) the more cookies are deleted, the less accurate ad server metrics become.
Answer: B
57) A Web beacon is:
A) a cookie that carries a virus.
B) an executable cookie.
C) an automated applet for performing Web searches.
D) a tiny graphics file embedded in an e-mail or Web page.
Answer: D
58) ________ is an industry-standard database query and manipulation language.
A) SQL
B) PHP
C) DBMS
D) JSP
Answer: A
59) A ________ is a repository of customer information that records all of the contacts that
a customer has with a firm and generates a customer profile available to everyone in the
firm with a need to know the customer.
A) customer service chat system
B) CRM system
C) data warehouse
D) transactive content system
Answer: B
60) The marketing technique known as ________ involves merchants offering products or
services for a very low price for a short period of time.
A) long tail marketing
B) flash marketing
C) yield management
D) bait-and-switch
Answer: B
61) To answer a question such as "At what time of day does our company sell the most
products?" you would use ________ data mining.
A) query-driven
B) customer profiling
C) model-driven
D) behavioral
Answer: A
69) If you want to determine the size of your Web site's audience, the metric you will use for
the most accurate measurement will be:
A) page views.
B) unique visitors.
C) hits.
D) reach.
Answer: B
70) Impressions are a measure of the:
A) number of times an ad is clicked.
B) number of times an ad is served.
C) number of http requests.
D) number of pages viewed.
Answer: B
71) View-through rate measures the ________ response rate to an ad.
A) 30-minute
B) 24-hour
C) 7-day
D) 30-day
Answer: D
72) Uber has been criticized for using which of the following?
A) flash marketing
B) bundling
C) surge pricing
D) freemium
Answer: C
73) Hits are a measure of the:
A) number of times an ad is clicked.
B) number of times an ad is served.
C) number of HTTP requests.
D) number of pages viewed.
Answer: C
74) Purchasing an online ad on a CPA basis means that the advertiser:
A) pays for impressions in 1,000 unit lots.
B) pays a pre-negotiated fee for each click an ad receives.
C) pays only for those users who perform a specific action, such as registering, purchasing,
etc.
D) exchanges something of equal value for the ad space.
Answer: C
75) eCPM measures the ROI of an ad by dividing the total earnings of the ad by which of
the following?
A) the total number of impressions
B) the total number of impressions in hundreds
C) the total number of impressions in thousands
D) the total number of impressions in millions
Answer: C
76) Which of the following measures the average length of stay at a Web site?
A) loyalty
B) stickiness
C) page views
D) retention rate
Answer: B
77) Acquisition rate is a measure of the:
A) percentage of visitors who indicate an interest in a site's products by registering or
visiting a product's pages.
B) percentage of visitors who become customers.
C) percentage of existing customers who continue to buy on a regular basis.
D) percentage of shoppers who do not return within a year after their initial purchase.
Answer: A
78) Recency refers to the:
A) percentage of customers who do not return during the next year after an initial purchase.
B) time elapsed since the last visit made by a customer.
C) percentage of existing customers who continue to buy on a regular basis.
D) percentage of customers who return to the site within a year to make additional
purchases.
Answer: B
79) Conversion rate is a measure of the:
A) percentage of visitors who indicate an interest in a site's products by registering or
visiting a product's pages.
B) percentage of visitors who become customers.
C) percentage of existing customers who continue to buy on a regular basis.
D) percentage of shoppers who do not return within a year after their initial purchase.
Answer: B
80) Which of the following measures the ratio of items purchased to product views?
A) conversion rate
B) cart conversion rate
C) browse-to-buy ratio
D) view-to-cart ratio
Answer: C
81) Which of the following measures the percentage of e-mails that could not be delivered?
A) abandonment rate
B) unsubscribe rate
C) bounce-back rate
D) attrition rate
Answer: C
82) Which of the following is the most meaningful metric for video ads?
A) view time
B) click-through rate
C) completion rate
D) skip rate
Answer: C
83) Which of the following measures the percentage of customers who purchase once but
never return within a year?
A) retention rate
B) attrition rate
C) loyalty rate
D) conversion rate
Answer: B
Chapter 7 Social, Mobile, and Local Marketing
1) All of the following were popular types of online marketing before 2007 except:
Answer: C
Answer: A
3) The second most popular social network in terms of average minutes per visitor is:
Answer: D
C) valuing quality over quantity at each stage in the Web site development process
D) establishing customer needs and habits as the top priority in all marketing
decisions
Answer: D
Answer: B
10) Which of the following is the first step in the social marketing process?
A) community B) amplification C) fan acquisition D) engagement
Answer: C
11) Encouraging users to click a Like button is an example of which step in the social
marketing process?
Answer: D
12) Your Facebook News Feed includes all of the following except:
Answer: D
13) Which of the following statements about Facebook Exchange is not true?
D) It involves cookies.
Answer: C
14) Ads that appear in a Facebook user's News Feed are called:
Answer: C
15) Which of the following do Facebook users spend the most time on?
Answer: A
Answer: B
17) Which of the following statements is not true?
A) About 75% of Facebook's ad revenue in 2015 is expected to come from its mobile
ad platform
B) The only way to access Facebook from a mobile device is to use a mobile app.
Answer: B
18) All of the following marketing tools on Facebook require payment except:
A) Brand Pages.
D) Mobile Ads.
Answer: A
Answer: D
20) Which of the following provides marketers with a real-time digital dashboard so
they can see tweet activity about a TV show, commercial, or brand?
Answer: B
21) Which of the following involves a coupon or other promotional offer that appears
in users' Twitter timeline?
A) Pinned photos and photo boards are available to all Pinterest users.
C) Pinterest enables users to integrate their pins into their Facebook News Feeds and
Twitter streams.
D) Pinterest is the only one of the major social networks that does not accept paid
advertising.
Answer: D
23) Which of the following are features of both Pinterest and Twitter?
Answer: B
Answer: D
25) The number of people exposed to pins is a measure of which of the following?
Answer: D
26) Which of the following is an online service specifically aimed at measuring the
impact of Pinterest and other visual social media?
Answer: B
Answer: B
28) All of the following are examples of dark social except:
Answer: B
29) Facebook's share price fell dramatically after its IPO because investors feared that:
Answer: D
30) Which of the following allows Facebook to track user behavior on other sites and
then sell the information to marketers?
Answer: B
31) Which of the following is not true about Facebook News Feed Page Post Ads?
B) They can be liked, shared, and commented on, just like any News Feed post.
Answer: C
32) Which of the following is a micro-blogging social network site that allows users to
send and receive 140-character messages?
Answer: B
33) Companies are not permitted to collect personal information from children under
the age of ________ without parental consent.
A) 8 B) 10 C) 13 D) 16
Answer: C
34) Which of the following was the object of the FTC's first-ever COPPA enforcement
action involving mobile apps?
Answer: B
Answer: B
37) Which of the following refers to the number of interactions among members of a
group and reflects the "connectedness" of the group, even if these connections are
forced on users?
Answer: C
38) Which of the following refers to those forms of social sharing that occur off the
major social networks, through alternative communication tools?
Answer: B
39) Which of the following is a real-time bidding system that allows advertisers to
target their ads to specific users based on personal information provided by Facebook?
Answer: B
40) All of the following are in the process of either testing or offering Buy button to
advertisers except:
Answer: B
41) Which of the following involves using a variety of tools to encourage users to
interact with content and brand?
Answer: B
42) Which of the following involves using the inherent strength of social networks to
encourage visitors and fans to share their Likes and comments with friends?
Answer: C
43) Which of the following is a Facebook feature that allows app developers to
integrate their apps into the Facebook pages of users who sign up for the app?
Answer: D
D) People use most of their mobile minutes while they are on the go.
Answer: D
56) Which of the following is the top app in terms of both audience size and share of
time spent?
Answer: D
57) How many retail-oriented apps are there in the top 25 apps?
A) 0 B) 1 C) 2 D) 5
Answer: C
Answer: A
59) Which of the following is the most popular use for mobile devices?
Answer: C
Answer: C
61) Which of the following accounts for the most time people spend using a mobile
device?
Answer: C
A) 10 B) 26 C) 30 D) 50
Answer: B
63) In 2015, mobile marketing was about ________% of all online marketing.
A) 15% B) 25% C) 40% D) 50%
Answer: C
64) Which of the following accounts for the most mobile ad spending?
Answer: B
65) Which of the following is not a major provider of mobile display advertising?
Answer: D
66) Which of the following is the leading mobile retailer in the United States?
Answer: B
67) Which of the following technologies has Apple adopted in its hardware for Apple
Pay?
Answer: B
Answer: A
Answer: C
76) Which of the following is currently a small part of the online marketing universe,
but is expected to triple over the next five years?
Answer: B
77) Macy's deployed which of the following technologies in many of its retail stores
in 2014?
Answer: B
78) Which of the following earns the most location-based marketing revenue?
Answer: D
Answer: A
80) A recent Google survey found that ________ % of smartphone users visit a store
within a day of conducting a local search.
A) 15 B) 25 C) 50 D) 75
Answer: C
81) Google uses which of the following to build a global database of wireless access points
and their geographic locations?
A) E9-1-1
B) Street View cars
C) iBeacons
D) BLE
Answer: B
Chapter 8. Ethical, Social, and Political Issues in E-commerce
1) Which of the following e-commerce technology dimensions creates greater opportunities
for cyberbullying?
A) information density
B) interactivity
C) social technology
D) ubiquity
Answer: C
2) Which of the following e-commerce technology dimensions has the potential to reduce
cultural diversity in products?
A) ubiquity
B) interactivity
C) information density
D) global reach
Answer: D
3) Which of the following is not one of the four basic principles shared by ethical schools of
thought in western culture?
A) accountability
B) privacy
C) responsibility
D) liability
Answer: B
4) What is the first step in analyzing an ethical dilemma?
A) Define the conflict or dilemma and identify the higher-order values involved.
B) Identify the potential consequences of your opinions.
C) Identify the options you can reasonably take.
D) Identify and describe the facts.
Answer: D
5) Which ethical principle states that, when confronted with an ethical dilemma, individuals
should take the action that achieves the greater value for all of society?
A) the Golden Rule
B) Risk Aversion
C) the Collective Utilitarian principle
D) the Social Contract rule
Answer: C
6) Which ethical principle emphasizes putting oneself into the place of others and thinking
of oneself as the object of the decision?
A) the Golden Rule
B) Universalism
C) the Collective Utilitarian principle
D) the Social Contract rule
Answer: A
7) Which ethical principle asks you to assume that virtually all tangible and intangible
objects are
owned by someone else unless there is a specific declaration otherwise?
A) the Golden Rule
B) the Slippery Slope
C) the Social Contract rule
D) No Free Lunch
Answer: D
8) Which ethical principle states that if an action cannot be taken repeatedly, then it is not
right to
take at all?
A) Universalism
B) the Slippery Slope
C) the Social Contract rule
D) the Golden Rule
Answer: B
9) Which ethical principle asks you to consider the impact of your decision if the principles
underlying your decision became an organizing principle of the entire society?
A) the Golden Rule
B) Risk Aversion
C) the Slippery Slope
D) the Social Contract rule
Answer: D
10) Which ethical principle tells you that it is wise to assume perfect information markets?
A) the Golden Rule
B) the New York Times test
C) the Social Contract rule
D) the Collective Utilitarian principle
Answer: B
11) Which ethical principle states that when confronted with an ethical dilemma, an
individual
should take the action that produces the least harm, or the least potential cost?
A) the Slippery Slope
B) Risk Aversion
C) No Free Lunch
D) the Collective Utilitarian principle
Answer: B
12) A social consequence of the richness of Internet information is:
A) an increase in shallowness.
B) an increase in the ease of creating misleading information.
C) very persuasive messages might reduce the need for multiple independent sources of
information.
D) an increase in vulnerability to hacking attacks.
Answer: C
13) Downloading music tracks owned by record companies without paying for them is an
example of a violation of:
A) patent law.
B) copyright law.
C) trademark law.
D) privacy law.
Answer: B
14) Which of the following features of e-commerce technology can result in work and
shopping invading family life?
A) interactivity
B) ubiquity
C) information density
D) global reach
Answer: B
20) Which of the following basic ethical concepts plays an important role in defining
privacy?
A) responsibility
B) accountability
C) liability
D) due process
Answer: D
21) Which of the following is not aimed at strengthening the ability of law enforcement
agencies to monitor Internet users without their knowledge?
A) the USA PATRIOT Act
B) the Homeland Security Act
C) the Communications Assistance for Law Enforcement Act
D) the USA Freedom Act
Answer: D
22) Which of the following tools can companies use to track user statements and views on
newsgroups, chat groups, and other public forums?
A) cookies
B) digital wallets
C) search engines
D) shopping carts
Answer: C
23) Which of the following can be used to record all keyboard activity of a user?
A) shopping carts
B) trusted computing environments
C) spyware
D) DRM
Answer: C
24) Which of the following statements about industry self-regulation regarding privacy is
not true?
A) OPA members are required to implement the OPA's privacy guidelines.
B) The primary focus of industry efforts has been the use of online "seals" that attest to the
site's policies.
C) Industry efforts have not so far succeeded in reducing American fears of privacy
invasion.
D) The NAI's privacy policies have established the TRUSTe seal.
Answer: D
25) The sharing of a user's stored cookie information between Web sites and without the
user's knowledge is:
A) legal in the United States but illegal in Europe.
B) illegal in the United States but legal in Europe.
C) legal in both the United States and Europe.
D) illegal in both the United States and Europe.
Answer: A
26) Which of the following requires financial institutions to inform consumers of their
privacy policies and permits consumers some control over their records?
A) Freedom of Information Act
B) Gramm-Leach-Bliley Act
C) COPPA
D) HIPAA
Answer: B
27) Which of the following is a core Fair Information Practices (FIP) principle?
A) Choice/Consent
B) Access/Participation
C) Security
D) Enforcement
Answer: A
28) Which of the FTC's Fair Information Practices (FIP) principles requires identification of
the collector of data?
A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
Answer: A
29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out
policies to be in place?
A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
Answer: B
30) What is the FTC recommendation regarding choice as it relates to personally
identifiable information (PII)?
A) Require firms to have consumers affirmatively opt-in before PII is collected.
B) Require firms to allow consumers to opt-out before PII is collected.
C) Make collection of PII illegal.
D) Require robust notice only before PII is collected.
Answer: A
31) "Do Not Track" falls under which of the following principles in the FTC's new privacy
framework?
A) Privacy by Design
B) Simplified Choice
C) Greater Transparency
D) Scope
Answer: B
32) Which of the following technologies allows you to send e-mail without a trace?
A) anonymous surfing
B) P3P
C) anonymous remailers
D) public key encryption
Answer: C
33) Which of the following is not true about the evolution of Facebook's privacy policies
over the ten-year period from 2005 to 2015?
A) The amount of information gathered and monitored by Facebook increased.
B) Facebook's privacy policies improved from 2005 to 2009.
C) Facebook's privacy policy became easier to understand.
D) Facebook's privacy policies have steadily declined since 2009.
Answer: C
34) The President's Council of Advisors on Science and Technology has called for all of the
following except:
A) a consumer privacy bill of rights.
B) a data breach law requiring firms to report losses of consumer data.
C) an amendment of the Electronic Communications Privacy Act to strengthen protections
against government surveillance.
D) a blanket prohibition on commercial data brokers.
Answer: D
35) According to data from Pew Research Center, which of the following is the action
which the highest percentage of Internet users has taken to preserve their privacy online?
A) used an anonymous Web browsing service
B) encrypted their communications
C) cleared Web browser history and cookies
D) posted comments online anonymously
Answer: C
36) Which of the following statements about the new proposed E.U. General Data
Protection Regulation (GDPR) is not true?
A) The GDPR will replace the E.U.'s existing Data Protection Directive.
B) The GDPR will apply across all E.U. countries.
C) The GDPR eliminate the right to be forgotten.
D) The GDPR will limit the ability of companies to use data for purposes other than those
for which it was collected.
Answer: C
37) Which of the following is not a privacy advocacy group?
A) Epic.org
B) Reputation.com
C) Cdt.org
D) Privacy.org
Answer: B
38) Which of the following operates the largest private personal database in the world?
A) Experian
B) Acxiom
C) TransUnion Corporation
D) Apple
Answer: B
50) Which of the following is a tiered notice and response system aimed at reducing
copyright infringement over P2P networks?
A) the CAS
B) FIP
C) Surfright
D) the Open Internet Order
Answer: A
51) What is the major reason that the Internet has such potential for destroying traditional
conceptions and implementations of intellectual property law?
A) the ability to make perfect copies of digital works at little cost
B) the anonymous nature of the Internet
C) the support for instant peer-to-peer communication
D) the use of standards for file formats
Answer: A
52) Which of the following protects original forms of expression in a tangible medium?
A) trade secret law
B) copyright law
C) patent law
D) trademark law
Answer: B
53) How long does copyright protection extend for corporate-owned works?
A) 25 years
B) 50 years
C) 75 years
D) 95 years
Answer: D
54) Which of the following situations would not qualify for the fair use exception to U.S.
copyright law?
A) A professor clips a newspaper article just before class and distributes copies of it to his
class.
B) A journalist quotes a paragraph from a book in a review of the book.
C) A student copies a photograph of his favorite band from a Web site created by the band's
record label and places it on the student's personal Web site.
D) Google posts thumbnail images of books in the Google Book Search Project.
Answer: C
55) All of the following are factors that will be considered in determining whether use of
copyrighted material is "fair use" except the:
A) nature of the work used.
B) amount of the work used.
C) market effect of the use.
D) free availability of the work on the Web.
Answer: D
56) All of the following are possible penalties for violating the Digital Millennium
Copyright Act (DMCA) except:
A) up to ten years imprisonment for a first offense.
B) fines up to $500,000 for a first offense.
C) fines up to $1 million for a repeat offense.
D) restitution to the injured parties for any losses due to infringement.
Answer: A
57) All of the following statements about the Digital Millennium Copyright Act (DMCA)
are true except:
A) the DMCA makes it illegal to circumvent technological measures to protect works.
B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for
hosting Web sites or providing services to infringers regardless of whether the ISP is aware
of infringement.
C) the DMCA requires search engines to block access to infringing sites.
D) the DMCA allows libraries to make digital copies of works for internal use only.
Answer: B
58) Which of the following allows someone to obtain an exclusive monopoly on the ideas
behind an invention for 20 years?
A) copyright law
B) trade secret law
C) patent law
D) trademark law
Answer: C
59) All of the following statements about patents are true except:
A) it is more difficult to obtain a copyright than it is to obtain a patent.
B) the four types of inventions protected by patent law are machines, manmade products,
compositions of matter, and processing methods.
C) computer programs can be patented.
D) in order to be patented, an invention must be nonobvious.
Answer: A
60) Which case was instrumental in paving the way for Internet business methods patents?
A) Brown Bag v. Symantec
B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) Ticketmaster Corp. v. Tickets.com
Answer: B
61) Amazon has a patent on:
A) download-based sales
B) display of third-party advertisements in floating windows.
C) one-click purchasing.
D) hyperlinks.
Answer: C
62) Disputes over federal trademarks involve establishing:
A) underlying ideas.
B) intent.
C) piracy.
D) infringement.
Answer: D
63) Registering a domain name similar or identical to trademarks of others to extort profits
from legitimate holders is an example of:
A) cybersquatting.
B) cyberpiracy.
C) framing.
D) metatagging.
Answer: A
64) Which of the following handles cybersquatting cases under its Uniform Dispute
Resolution procedures?
A) ICANN
B) FTC
C) WIPO
D) USPTO
Answer: C
65) Registering a domain name similar or identical to trademarks of others to divert Web
traffic to their own sites is an example of:
A) cybersquatting.
B) cyberpiracy.
C) framing.
D) metatagging.
Answer: B
66) Registering the domain name Faceboik.com with the intent to divert Web traffic from
people misspelling Facebook.com is an example of:
A) cybersquatting.
B) typosquatting.
C) metatagging.
D) linking.
Answer: B
67) In which of the following cases did the U.S. Supreme Court rule that basic business
methods cannot be patented?
A) State Street Bank & Trust v. Signature Financial Group, Inc.
B) Bilski et al. v. Kappos
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) Brown Bag Software v. Symantec Corp.
Answer: C
68) The display of a third-party's Web site or page within your own Web site is called:
A) cybersquatting.
B) metatagging.
C) framing.
D) deep linking.
Answer: C
69) Which of the following statements about the patent battle between Apple and Samsung
is not true?
A) The courts have decided that Apple does not have a valid patent on the iPhone's user
interface.
B) The courts have ruled that Samsung has infringed on some of Apple's patents.
C) Analysts believe the cost to Apple of this litigation is at least equal to the damage award
it may ultimately be paid.
D) Over the last five years of litigation, Samsung has changed its interface and functionality
to greatly reduce its infringement.
Answer: A
70) Megaupload's founder, Kim Dotcom, was arrested in connection with which of the
following?
A) copyright infringement
B) patent infringement
C) trademark infringement
D) privacy violation
Answer: A
71) Which of the following cases involved the issue of keywording?
A) Ticketmaster Corp. v. Tickets.com
B) Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc.
C) Government Employees Insurance Company v. Google, Inc.
D) E. & J. Gallo Winery v. Spider Webs Ltd.
Answer: C
72) Which of the following involves bypassing the target site's home page and going
directly to a content page?
A) cybersquatting
B) metatagging
C) framing
D) deep linking
Answer: D
73) All of the following cases involved the doctrine of fair use except:
A) Brown Bag Software vs. Symantec Corp.
B) Perfect 10, Inc. v. Amazon.com, Inc. et al.
C) Field v. Google, Inc.
D) Kelly v. Arriba Soft.
Answer: A
78) Which of the following is not one of the issues complicating the taxation of e-commerce
sales?
A) Taxes raised are used for different government purposes.
B) Sales taxes and policies vary by state and country.
C) Retailers legally only have to charge sales tax if they have operations located in the same
state as a consumer.
D) Small online businesses are unable to manage sales taxes to thousands of different
jurisdictions.
Answer: A
79) Which of the following statements about net neutrality is not true?
A) The FCC now regulates ISP pricing.
B) The FCC ruled that Internet broadband service providers should be viewed as public
utilities similar to telephone companies.
C) The FCC overruled state laws that made it difficult for cities to operate their own
broadband networks.
D) ISPs can no longer discriminate against users on the basis of protocol or amount of
usage.
Answer: A
82) Which of the following is not a major e-commerce public safety and welfare issue?
A) regulation of gambling
B) regulation of cigarette sales
C) regulation of pornography
D) regulation of taxation
Answer: D