MCQOPTIONS
Saved Bookmarks
This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 551. |
OTP stands for. |
| A. | On Time Password |
| B. | On Time processing |
| C. | One time processor |
| D. | None |
| Answer» B. On Time processing | |
| 552. |
The area of actual or potential commercial value in which a company intends to operate is a _______. |
| A. | market space |
| B. | marketplace |
| C. | perfect market |
| D. | Bertrand market |
| Answer» B. marketplace | |
| 553. |
In which website Global Easy Buy is facilitated? |
| A. | Ebay.com |
| B. | Amazon.com |
| C. | Yepme.com |
| D. | None of these |
| Answer» B. Amazon.com | |
| 554. |
The source of revenue in a subscription revenue model is __________. |
| A. | Fees from advertisers in exchange for advertisements |
| B. | Fees for business referrals |
| C. | Fees from subscribers in exchange for access to content or services |
| D. | Fees for enabling or execution a transaction |
| Answer» D. Fees for enabling or execution a transaction | |
| 555. |
The solution for all business needs is. |
| A. | EDI |
| B. | ERP |
| C. | SCM |
| D. | None of the above |
| Answer» C. SCM | |
| 556. |
Which of the following is not one of the stages of the development of the Internet? |
| A. | Innovation |
| B. | Institutionalization |
| C. | Globalization |
| D. | Commercialization |
| Answer» D. Commercialization | |
| 557. |
Which form of e‚Äêcommerce currently accounts for about 97% of all e‚Äêcommerce revenues?$ |
| A. | B2B |
| B. | B2C |
| C. | C2B |
| D. | C2C |
| Answer» B. B2C | |
| 558. |
What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? |
| A. | Direct materials |
| B. | Indirect materials |
| C. | EDI |
| D. | None of the above |
| Answer» B. Indirect materials | |
| 559. |
The idealistic market envisioned at the outset of the development of e-commerce is called a ______. |
| A. | Bailey market |
| B. | Baxter market |
| C. | Bergman market |
| D. | Bertrand market |
| Answer» E. | |
| 560. |
Broadband is generally considered to be any communication technology allowing streaming audio and video at or above _________. |
| A. | 100 Kbps |
| B. | 56.6 Kbps |
| C. | 30 Kbps |
| D. | 10 Kbps |
| Answer» B. 56.6 Kbps | |
| 561. |
Unique value auction is mainly applies to? |
| A. | New products |
| B. | Second hand products |
| C. | Engineering products |
| D. | None of the above |
| Answer» C. Engineering products | |
| 562. |
All of the following are examples of 2G wireless phone technologies except _________. |
| A. | CDMA |
| B. | W-CDMA |
| C. | TDMA |
| D. | GSM |
| Answer» C. TDMA | |
| 563. |
Which of the following statements accurately reflect the impact of technology? |
| A. | Technology has caused buyer power to increase |
| B. | Technology has lessened the entry barriers for many industries |
| C. | Technology has increased the threat of substitute products and services |
| D. | all of the above |
| Answer» E. | |
| 564. |
A _________ describes the flow of information at your e-commerce site and the infrastructure that will be used in the system. |
| A. | system design |
| B. | logical design |
| C. | tactical design |
| D. | physical design |
| Answer» C. tactical design | |
| 565. |
Which of the following is not one of the top three online career service providers? |
| A. | CareerBuilder |
| B. | Monster |
| C. | HotJobs |
| D. | USAJobs |
| Answer» E. | |
| 566. |
What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?$ |
| A. | Backup |
| B. | Anti‚Äêvirus |
| C. | Firewall |
| D. | Biometrics |
| Answer» E. | |
| 567. |
The top U.S online video site is ______. |
| A. | MySpace |
| B. | YouTube |
| C. | AOL |
| D. | Google Video |
| Answer» C. AOL | |
| 568. |
What checks out your computer or network for potential weaknesses? |
| A. | Encryption |
| B. | Public key encryption |
| C. | Security‚Äêauditing software |
| D. | None of the above |
| Answer» D. None of the above | |
| 569. |
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? |
| A. | Risk management |
| B. | Risk assessment |
| C. | Security |
| D. | None of the above |
| Answer» B. Risk assessment | |
| 570. |
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved? |
| A. | Performance |
| B. | Capacity planning |
| C. | Benchmarking |
| D. | Data cleansing |
| Answer» D. Data cleansing | |
| 571. |
The ability of consumers to review and contest the accuracy and completeness of data collected about them involves which of the following FTC fair information practice principles? |
| A. | Security |
| B. | Enforcement |
| C. | Choice/Consent |
| D. | Access/Participation |
| Answer» E. | |
| 572. |
Which is not a component of ERP? |
| A. | Legacy systems |
| B. | Bolt on applications |
| C. | Operational database |
| D. | Cybersoft |
| Answer» E. | |
| 573. |
During which period of Internet governance was Network Solutions given a monopoly to assign and track high-level domains? |
| A. | Government Control Period |
| B. | Privatization |
| C. | Self-Regulation |
| D. | Governmental Regulation |
| Answer» C. Self-Regulation | |
| 574. |
All of the following are challenges to online retail except ______. |
| A. | Consumer concerns about the security of transactions |
| B. | Consumer concerns about the privacy of personal information given to Web sites |
| C. | Delays in delivery of goods when compared to store shopping |
| D. | Inability to change prices nearly instantly |
| Answer» E. | |
| 575. |
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? |
| A. | Workflow |
| B. | EIP |
| C. | Workflow system |
| D. | SLA |
| Answer» B. EIP | |
| 576. |
Which of the following is the primary characteristic of an intranet? |
| A. | People outside the organization can access it |
| B. | People inside the organization can't access it |
| C. | People outside the organization can't access it |
| D. | None of the above |
| Answer» D. None of the above | |
| 577. |
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year? |
| A. | loyalty |
| B. | reach |
| C. | recency |
| D. | unique visitors |
| Answer» B. reach | |
| 578. |
Amazon.com is well‚Äêknown for which e‚Äêcommerce marketing technique?$ |
| A. | Banner ads |
| B. | Pop‚Äêup ads |
| C. | Affiliate programs |
| D. | Viral marketing |
| Answer» D. Viral marketing | |
| 579. |
Which of the following is not a widely used midrange or high-end e-commerce suite? |
| A. | Microsoft Commerce Server |
| B. | WebTrends Marketing Lab2 |
| C. | IBM WebSphere Commerce |
| D. | Broadvision Commerce |
| Answer» B. WebTrends Marketing Lab2 | |
| 580. |
An electronic check is one form of what? |
| A. | e‚Äêcommerce |
| B. | online banking |
| C. | e‚Äêcash |
| D. | check |
| Answer» C. e‚Äö√Ñ√™cash | |
| 581. |
The most widely used encryption standard is ______. |
| A. | Advanced Encryption Standard (AES) |
| B. | Data Encryption Standard (DES) |
| C. | Universal Encryption Standard (UES) |
| D. | Optimal Encryption Standard (OES) |
| Answer» B. Data Encryption Standard (DES) | |
| 582. |
What type of ad appears on top of a web page? |
| A. | pop‚Äêunder ad |
| B. | pop‚Äêup ad |
| C. | banner ad |
| D. | discount ad |
| Answer» C. banner ad | |
| 583. |
All of the following are major categories of computer viruses except _________. |
| A. | Macro viruses |
| B. | File-infecting viruses |
| C. | Script viruses |
| D. | Trojan viruses |
| Answer» E. | |
| 584. |
Which of the following is used in B2B to pay for purchases? |
| A. | e‚Äêcommerce |
| B. | financial electronic data interchange |
| C. | electronic data exchange |
| D. | electronic checks |
| Answer» C. electronic data exchange | |
| 585. |
The most prevalent online payment method is ______. |
| A. | PayPal |
| B. | checks |
| C. | credit cards |
| D. | debit |
| Answer» D. debit | |
| 586. |
Which factor represents how well your system can adapt to increased demands? |
| A. | Availability |
| B. | Accessibility |
| C. | Reliability |
| D. | Scalability |
| Answer» E. | |
| 587. |
What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? |
| A. | Disaster recovery plan |
| B. | Hot site |
| C. | Cold site |
| D. | Disaster recovery cost curve |
| Answer» C. Cold site | |
| 588. |
The per-product price consumers are willing to pay for a bundle ____________ as the number of goods in the bundle increases. |
| A. | decreases |
| B. | increases |
| C. | varies from product to product |
| D. | stays the same |
| Answer» C. varies from product to product | |
| 589. |
What is a model of a proposed product, service, or system? |
| A. | Prototyping |
| B. | Prototype |
| C. | Proof‚Äêof‚Äêconcept prototype |
| D. | Selling prototype |
| Answer» C. Proof‚Äö√Ñ√™of‚Äö√Ñ√™concept prototype | |
| 590. |
Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect. |
| A. | Bertrand's Law |
| B. | the Law of Universal Prices |
| C. | the Law of One Price |
| D. | the Law of Perfect Commerce |
| Answer» D. the Law of Perfect Commerce | |
| 591. |
E‐cheques are …………# |
| A. | Prepaid |
| B. | Postpaid |
| C. | Both prepaid and postpaid |
| D. | None of these |
| Answer» B. Postpaid | |
| 592. |
The dimension of e-commerce that enables commerce across national boundaries is called _______. |
| A. | interactivity |
| B. | global reach |
| C. | richness |
| D. | ubiquity |
| Answer» C. richness | |
| 593. |
The dominant Web server software is __________. |
| A. | Zeus |
| B. | Apache |
| C. | Microsoft IIS |
| D. | |
| Answer» C. Microsoft IIS | |
| 594. |
Which of the following represents a limiting factor for the growth of e-commerce? |
| A. | Persistent cultural attraction of physical markets and traditional shopping experiences |
| B. | Inadequate selection of goods compared to physical marketplaces |
| C. | E-commerce lacks the convenience of other methods of transacting business |
| D. | The potential audience for e-commerce is too low to support it as a widespread method of commerce |
| Answer» B. Inadequate selection of goods compared to physical marketplaces | |
| 595. |
Which of the following is an advantage of e-books? |
| A. | reduced transaction costs for the user |
| B. | requirement of expensive devices to use |
| C. | portability compared to print books |
| D. | copyright management |
| Answer» B. requirement of expensive devices to use | |
| 596. |
Which type of technology will increase portability and mobility? |
| A. | Implant chips |
| B. | Micro‚Äêpayments |
| C. | Internet phone calls |
| D. | All of the above |
| Answer» E. | |
| 597. |
______________ marketing is the Internet version of word-of-mouth marketing. |
| A. | Visceral |
| B. | Virile |
| C. | Viral |
| D. | Virtual |
| Answer» D. Virtual | |
| 598. |
Which of the following is not a reason why digital cash has turned out to be extremely difficult? |
| A. | If your system crashes you lose your money |
| B. | There is only one standard |
| C. | Digital cash makes money laundering easy |
| D. | Digital cash travels across the vast Internet and is susceptible to begin stolen |
| Answer» C. Digital cash makes money laundering easy | |
| 599. |
All of the following are objectives of private industrial networks except ________. |
| A. | developing efficient purchasing and selling business processes industry-wide |
| B. | operating on a local scale |
| C. | creating increased supply chain visibility |
| D. | reducing industry risk |
| Answer» C. creating increased supply chain visibility | |
| 600. |
What is a program, when installed on a computer, records every keystroke and mouse click? |
| A. | Key logger software |
| B. | Hardware key logger |
| C. | Cookie |
| D. | Adware |
| Answer» B. Hardware key logger | |