BU48S : eBusiness Strategy Question 1 __________ strategy is concerned primarily with how to compete within individual markets. Operational Corporate-level Differentiation Business unit Question 2

BU48S : eBusiness Strategy Question 1 __________ strategy is concerned primarily with how to compete within individual markets. Operational Corporate-level Differentiation Business unit Question 2 There are several ways of attaining __________, including having a strong and unique brand, a large and loyal customer base, and low-cost production facilities. lower transaction costs a competitive advantage economies of scale and scope increased customer value Question 3 Important factors in the __________ environment are interest and exchange rates, evolution of stock markets and, more generally, economic growth rates. economic social political and legal natural Question 4 Kotler proposes a number of different requirements that any type of market segmentation should fulfill. They include all of the following EXCEPT: substantial. differentiable. actionable. identifiable. Question 5 The __________ illustrates how information captured in the physical value chain can be used to develop new markets. virtual value chain value network ICDT model internal value chain Question 6 Doing this to the disruptive innovator means that a company tries to out-substitute the substitution. Defending Straddling Migrating/harvesting Leapfrogging Question 7 Potential adopters usually come to the __________ for advice and information about innovations. innovators early adopters early majority brand leaders Question 8 _________ management focuses on logistics and support functions. This business includes the building and management of physical facilities, such as manufacturing or assembly plants, retail outlets and truck fleets, for high-volume production and transportation processes. Logistics Customer relationship Infrastructure Production Question 9 A __________ is a website that displays content that users can incorporate as is, or modify at will. wiki blog media platform desktop application Question 10 __________ takes place when hackers misrepresent their true identity or misrepresent themselves by using fake email addresses. Phishing Malicious code Cyber-vandalism Spoofing

Do you need us to help you on this or any other assignment?


Make an Order Now