4. Pick the correct statement. A. Transmission Control Protocol is the communication network protocol used on the internet. B. Internet Protocol performs routing and addressing. C. Aand B. D. none of the above. 5. The two methods of transporting data across a network are A. e-mail and fax. B. fax and scanner. C. scanner and e-mail. D. circuit and packet switch. 6. Messages can be sent from one computer to another only when A. every server on the internet is uniquely addressable. B. they are the same brands. C. they are being operated by the same person. D. none of the above. 7. The key elements of the Web are: A. None at all here. B. URL and HTML. C. Network Protocol. D. B and C 8. Which of these are the components of Secure Electronic Transaction? A. cardholder wallet; and merchant server. B. payment gateway; and certificate authority. C. merchant server; and payment gateway. D. All of the above. 9. Which of the following is an example of authentication mechanism for personal characteristic? A. All of them below. B. Fingerprint. C. Voiceprint. D. Hand size. 10. Which of the following statements is NOT correct? a. Customers are not a viable source of innovative ideas, and firms need not find efficient and effective means of continual communication with customers. b. Failure to match competitors' unit costs-inefficiency is a strategic challenge. c. The need to process high volume physical flows is likely to result in economies of scale. d. Electronic commerce offers many opportunities to reformulate traditional modes of business.

Marketing
20th Edition
ISBN:9780357033791
Author:Pride, William M
Publisher:Pride, William M
Chapter18: Personal Selling And Sales Promotion
Section18.2: Salesforce.com Sold On Stakeholder Satisfaction
Problem 1C
icon
Related questions
Question
4. Pick the correct statement.
A. Transmission Control Protocol is the communication network protocol used on the
internet.
B. Internet Protocol performs routing and addressing.
C. Aand B.
D. none of the above.
5. The two methods of transporting data across a network are
A. e-mail and fax.
B. fax and scanner.
C. scanner and e-mail.
D. circuit and packet switch.
6. Messages can be sent from one computer to another only when
A. every server on the internet is uniquely addressable.
B. they are the same brands.
C. they are being operated by the same person.
D. none of the above.
7. The key elements of the Web are:
A. None at all here.
B. URL and HTML.
C. Network Protocol.
D. B and C
Transcribed Image Text:4. Pick the correct statement. A. Transmission Control Protocol is the communication network protocol used on the internet. B. Internet Protocol performs routing and addressing. C. Aand B. D. none of the above. 5. The two methods of transporting data across a network are A. e-mail and fax. B. fax and scanner. C. scanner and e-mail. D. circuit and packet switch. 6. Messages can be sent from one computer to another only when A. every server on the internet is uniquely addressable. B. they are the same brands. C. they are being operated by the same person. D. none of the above. 7. The key elements of the Web are: A. None at all here. B. URL and HTML. C. Network Protocol. D. B and C
8. Which of these are the components of Secure Electronic Transaction?
A. cardholder wallet; and merchant server.
B. payment gateway; and certificate authority.
C. merchant server; and payment gateway.
D. All of the above.
9. Which of the following is an example of authentication mechanism for personal
characteristic?
A. All of them below.
B. Fingerprint.
C. Voiceprint.
D. Hand size.
10. Which of the following statements is NOT correct?
a. Customers are not a viable source of innovative ideas, and firms need not find efficient
and effective means of continual communication with customers.
b. Failure to match competitors' unit costs-inefficiency is a strategic challenge.
c. The need to process high volume physical flows is likely to result in economies of scale.
d. Electronic commerce offers many opportunities to reformulate traditional modes of
business.
Transcribed Image Text:8. Which of these are the components of Secure Electronic Transaction? A. cardholder wallet; and merchant server. B. payment gateway; and certificate authority. C. merchant server; and payment gateway. D. All of the above. 9. Which of the following is an example of authentication mechanism for personal characteristic? A. All of them below. B. Fingerprint. C. Voiceprint. D. Hand size. 10. Which of the following statements is NOT correct? a. Customers are not a viable source of innovative ideas, and firms need not find efficient and effective means of continual communication with customers. b. Failure to match competitors' unit costs-inefficiency is a strategic challenge. c. The need to process high volume physical flows is likely to result in economies of scale. d. Electronic commerce offers many opportunities to reformulate traditional modes of business.
AI-Generated Solution
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
steps

Unlock instant AI solutions

Tap the button
to generate a solution

Recommended textbooks for you
Marketing
Marketing
Marketing
ISBN:
9780357033791
Author:
Pride, William M
Publisher:
South Western Educational Publishing
Principles of Management
Principles of Management
Management
ISBN:
9780998625768
Author:
OpenStax
Publisher:
OpenStax College