Chat with us, powered by LiveChat strategy is concerned primarily with how to compete within individual markets. - Credence Writers
+1(978)310-4246 [email protected]

BU48S : eBusiness Strategy
Question 1
__________ strategy is concerned primarily with how to compete within individual markets.
Operational
Corporate-level
Differentiation
Business unit

Question 2
There are several ways of attaining __________, including having a strong and unique brand, a large and loyal customer base, and low-cost production facilities.
lower transaction costs
a competitive advantage
economies of scale and scope
increased customer value

Question 3
Important factors in the __________ environment are interest and exchange rates, evolution of stock markets and, more generally, economic growth rates.
economic
social
political and legal
natural

Question 4
Kotler proposes a number of different requirements that any type of market segmentation should fulfill. They include all of the following EXCEPT:
substantial.
differentiable.
actionable.
identifiable.

Question 5
The __________ illustrates how information captured in the physical value chain can be used to develop new markets.
virtual value chain
value network
ICDT model
internal value chain

Question 6
Doing this to the disruptive innovator means that a company tries to out-substitute the substitution.
Defending
Straddling
Migrating/harvesting
Leapfrogging

Question 7
Potential adopters usually come to the __________ for advice and information about innovations.
innovators
early adopters
early majority
brand leaders

Question 8
_________ management focuses on logistics and support functions. This business includes the building and management of physical facilities, such as manufacturing or assembly plants, retail outlets and truck fleets, for high-volume production and transportation processes.
Logistics
Customer relationship
Infrastructure
Production

Question 9
A __________ is a website that displays content that users can incorporate as is, or modify at will.
wiki
blog
media platform
desktop application

Question 10
__________ takes place when hackers misrepresent their true identity or misrepresent themselves by using fake email addresses.
Phishing
Malicious code
Cyber-vandalism
Spoofing

error: Content is protected !!