Exam 3: Using Information Technology to Engage in Electronic Commerce
Exam 1: Introduction to Information Systems78 Questions
Exam 2: Information Systems for Competitive Advantage80 Questions
Exam 3: Using Information Technology to Engage in Electronic Commerce78 Questions
Exam 4: System Users and Developers80 Questions
Exam 5: Computing and Communications Resources80 Questions
Exam 6: Database Management Systems79 Questions
Exam 7: Systems Development80 Questions
Exam 8: Information in Action80 Questions
Exam 9: Information Security80 Questions
Exam 10: Ethical Implications of Information Technology80 Questions
Exam 11: Decision Support Systems79 Questions
Exam 12: Everyday Technology Skills20 Questions
Exam 13: Web/HTML Project Using Microsoft FrontPage20 Questions
Exam 14: Web/HTML Project Using Notepad20 Questions
Exam 15: Web/HTML Student Survey20 Questions
Exam 16: Web/HTML Book Purchase20 Questions
Exam 17: Spreadsheet Basics20 Questions
Exam 18: Spreadsheets with Data Capture - Vacation Choice20 Questions
Exam 19: Spreadsheets with Data Capture - Movie Ticket Purchase20 Questions
Exam 20: Database Forms and Reports20 Questions
Exam 21: Database Queries - Customer Database20 Questions
Exam 22: Database Queries - Inventory Database20 Questions
Exam 23: Reports Based on Queries20 Questions
Select questions type
What are the four factors that determine whether the firm will be proactive or reactive in adopting an interorganizational system?
Free
(Essay)
4.9/5
(38)
Correct Answer:
Competitive pressure, exercised power, internal need, and top management support are the four factors that determine whether a firm will be proactive or reactive in adopting an interorganizational system.
Top management support is the most frequent reason firms adopt EDI.
Free
(True/False)
5.0/5
(36)
Correct Answer:
False
What are three constraints for firms moving into electronic commerce, and how are those constraints beginning to disappear?
Free
(Essay)
4.9/5
(25)
Correct Answer:
The three constraints are high costs, security concerns, and immature or unavailable software. They are beginning to disappear because the cost of computing resources inevitably comes down according to Moore's Law. Networks are becoming more secure because of new encryption methods such as secure sockets layer. And firms are designing new software for electronic commerce that takes advantage of current Web browser software.
Explain the development of the World Wide Web and identify the person who is credited with its creation.
(Essay)
4.7/5
(45)
An encryption method called ___________ is extremely secure, easy to use, and inexpensive.
(Essay)
4.8/5
(32)
Sales made by a firm that does not operate a physical storefront are called:
(Multiple Choice)
4.8/5
(44)
B2C sites are required to have quick download times, more instructions for site navigation, shopping carts, and methods for keeping user profiles.
(True/False)
4.8/5
(38)
When trading partners can produce their goods and services with greater efficiency and produce their goods and services at lower costs to their customers, it is called:
(Multiple Choice)
4.8/5
(31)
When all participants realize they are working toward the same ends and gain mutual advantage, what is the indirect benefit of adopting an interorganizational system?
(Multiple Choice)
4.9/5
(35)
Intranets are important because they allow trusted users beyond the organization's boundaries to access programs and data on the organization's network.
(True/False)
4.8/5
(39)
The ability of a firm to resolve disagreements with its suppliers and customers to its own advantage is called interorganizational efficiency.
(True/False)
4.9/5
(38)
Increased profit is an anticipated benefit when firms engage in electronic commerce.
(True/False)
4.9/5
(36)
What was the travel and reservation retail industry segment percentage of e- commerce sales in 2003?
(Multiple Choice)
5.0/5
(37)
Consumer- to- consumer electronic commerce refers to transactions between a business and the final consumer of the product.
(True/False)
4.9/5
(32)
The address of the Web site where a Web page is stored is called ___________.
(Essay)
4.8/5
(26)
When the services that operate and manage the communications line are provided in addition to the line itself, it is referred to as a virtual private network (VPN).
(True/False)
4.7/5
(36)
Gopher is the software that enables you to copy files onto your computer from any Web site.
(True/False)
4.9/5
(39)
A ____________ is a set of standards that govern the communication of data.
(Essay)
4.9/5
(32)
Showing 1 - 20 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)