The threat of new entrants is high when it is:
a. Hard for customers to enter the market
b. Hard for competitors to enter the market
c. Easy for competitors to enter the market
d. Easy for customers to enter the market

1 Answer

Answer :

c. Easy for competitors to enter the market

Related questions

Description : If it is easy for competitors to enter the market, the threat of new entrants is considered: a. High b. Low c. More d. Less

Last Answer : a. High

Description : If it is easy for competitions to enter the market, the threat of new entrants is considered: a) High b) Low c) More d) Less

Last Answer : a) High

Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs

Last Answer : c. Entry barriers

Description : Michael Porter has identified five forces that determine the intrinsic long-run attractiveness of a market or market segment. Which of the following would NOT be among Porter’s five forces? A. Industry competitors B. Technological partners C. Substitutes D. Buyers E. Potential entrants

Last Answer : B. Technological partners

Description : An industry is less attractive for suppliers when the rivalry among existing competitors is: a. High b. Low c. More d. Less

Last Answer : a. High

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above

Last Answer : d. All the above

Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows

Last Answer : a. Malicious code

Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above

Last Answer : d. All the above

Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above

Last Answer : d. All of the above

Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets. a. Threat b. Danger c. Error d. None of the above

Last Answer : a. Threat

Description : Which of the following statements accurately reflect the impact of technology? a. Technology has caused buyer power to increase b. Technology has lessened the entry barriers for many industries c. Technology has increased the threat of substitute products and services d. all of the above

Last Answer : d. all of the above

Description : If the threat of substitute products or services is low it is a(n): a. Disadvantage to the supplier b. Advantage to the buyer c. Advantage to the supplier d. None of the above

Last Answer : c. Advantage to the supplier

Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : c. Extranet

Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange

Last Answer : b. use secure electronic transactions

Description : Which of the following refers to creating products tailored to individual customers? a. customization b. aggregation c. Direct materials d. Reverse auction

Last Answer : a. customization

Description : A business cannot be all things to all people. Instead, a business must: a. Identify target customers b. Identify the value of products/services as perceived by customers c. all of the above d. None of the above

Last Answer : c. all of the above

Description : What is the percentage of customers who visit a Web site and actually buy something called? a. Affiliate programs b. Click‐through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : All of the following are techniques B2C e‐commerce companies use to attract customers, except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual marketing

Last Answer : d. Virtual marketing

Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Last Answer : b. There is only one standard

Description : Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? a. electronic check b. electronic bill presentment and payment c. conversion rates d. financial cybermediary

Last Answer : d. financial cybermediary

Description : In which website Global Easy Buy is facilitated? a. Ebay.com b. Amazon.com c. Yepme.com d. None of these

Last Answer : a. Ebay.com

Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace

Last Answer : d. Electronic marketplace

Description : In Capstone©, pricing standards are set by: a. Customers (Market Segment). b. Competitors. c. You, The Company. d. a range of the prices from all Teams. e. Random Selection.

Last Answer : a. Customers (Market Segment).

Description : Firms that truly adopt the marketing concept develop a distinct organisational culture based on a shared set of beliefs that make __________ the pivotal point of the firm's decisions ... beating competitors B)increasing market share C)customers' needs D)marketing implementation E)marketing control

Last Answer : C)customers' needs

Description : In which section of the marketing plan would you find detailed information about the marketing environment, market trends, customers and competitors? A)marketing analysis B)marketing strategies C)product/market background D)situation analysis

Last Answer : A)marketing analysis

Description : 4) The channel that includes both a manufacturer's agent and an industrial distributor may be appropriate under which of the following circumstances? A)When a marketer wishes to enter a new ... marketer is thinking of cutting it down C)When customers are highly concentrated in one geographic area

Last Answer : A)When a marketer wishes to enter a new geographic market but does not wish to expand the existing sales force

Description : The wheel of retailing hypothesis suggests that: A)retailers tend to provide more limited services to customers as the business ages. B)new retailers enter the market with low prices, low profit margins ... decreases. D)a retail firm must grow to compete with other retail firms on an equal basis.

Last Answer : B)new retailers enter the market with low prices, low profit margins and low status but eventually trade up.

Description : The channel that includes both a manufacturers' agent and an industrial distributor may be appropriate under which of the following circumstances? A)When the firm wants specialised personnel to follow ... is thinking of cutting it down E)When customers are highly concentrated in one geographic area

Last Answer : B)When the marketer wishes to enter a new geographic market but does not wish to expand the existing sales force

Description : What is the name of the new anti‐Spam bill? a. No‐Spam b. CAN‐Spam c. Spam‐Away d. Stop Spam

Last Answer : b. CAN‐Spam

Description : What determines the future IT infrastructure requirements for new equipment and additional network capacity? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : c. Capacity planning

Description : Unique value auction is mainly applies to? a. New products b. Second hand products c. Engineering products d. None of the above

Last Answer : b. Second hand products

Description : New entrants to an industry are more likely when (i.e., entry barriers are low when…) A. It is difficult to gain access to distribution channels. B. Economies of scale in the industry are high. C. Product differentiation in the industry is low. D. Capital requirements in the industry are high.

Last Answer : Product differentiation in the industry is low.

Description : New entrants to an industry are more likely when (i.e., entry barriers are low when…) A. It is difficult to gain access to distribution channels. B. Economies of scale in the industry are high. C. Product differentiation in the industry is low. D. Capital requirements in the industry are high.

Last Answer : Product differentiation in the industry is low.

Description : Personal selling tries to achieve three general goals : finding prospects, convincing prospects to buy, and 1. monitoring new products being developed 2. being aware of competitors' sales activities 3. depending on one-sale customers 4. avoiding repeat sales 5. keeping customers satisfied

Last Answer : keeping customers satisfied

Description : Competitors prices and the marketing mix variables that competitors emphasise partly determine: A)the selection of a pricing policy. B)the timing of the introduction of new products. C)whether to use a pioneer or psychological pricing policy. D)how important price will be to customers.

Last Answer : D)how important price will be to customers.

Description : Personal selling tries to achieve three general goals: finding prospects, convincing prospects to buy, and A)monitoring new products being developed. B)being aware of competitors' sales activities. C)depending on one -sale customers. D)avoiding repeat sales. E)keeping customers satisfied.

Last Answer : E)keeping customers satisfied.

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs