MCQOPTIONS
Saved Bookmarks
This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? |
| A. | acking |
| B. | racking |
| C. | umpster diving |
| D. | poofing |
| Answer» E. | |
| 152. |
What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors? |
| A. | S-CERT |
| B. | ECD |
| C. | C3 |
| D. | 3P |
| Answer» B. ECD | |
| 153. |
When a transaction is processed online, how can the merchant verify the customer's identity? |
| A. | se secure sockets layers |
| B. | se secure electronic transactions |
| C. | se electronic data interchange |
| D. | se financial electronic data interchange |
| Answer» C. se electronic data interchange | |
| 154. |
Malicious hackers who act with the intention of causing harm are __________. |
| A. | hite hats |
| B. | lack hats |
| C. | rey hats |
| D. | rown hats |
| Answer» C. rey hats | |
| 155. |
Which of the following is a method of transferring money from one person's account to another? |
| A. | lectronic check |
| B. | redit card |
| C. | ‐transfer |
| D. | one of the above |
| Answer» B. redit card | |
| 156. |
A worm is designed to spread _________. |
| A. | rom computer to computer |
| B. | rom file to file on a computer |
| C. | rom Web site to Web site |
| D. | rom Web site to computer |
| Answer» B. rom file to file on a computer | |
| 157. |
Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? |
| A. | lectronic check |
| B. | lectronic bill presentment and payment |
| C. | onversion rates |
| D. | inancial cybermediary |
| Answer» E. | |
| 158. |
All of the following are tools for optimizing a Web site's location in search engine listings except ________. |
| A. | eywords and page titles |
| B. | dentifying market niches |
| C. | uying ads |
| D. | enchmarking |
| Answer» E. | |
| 159. |
Which type of add appears on a web page? |
| A. | op‐under ad |
| B. | op‐up ad |
| C. | anner ad |
| D. | iscount ad |
| Answer» D. iscount ad | |
| 160. |
The ability to change the product to better fit the needs of the customer is called ________. |
| A. | ustomization |
| B. | ersonalization |
| C. | rivacy |
| D. | ccessibility |
| Answer» B. ersonalization | |
| 161. |
Which form of e‐marketplace brings together buyers and sellers from the same industry? |
| A. | orizontal |
| B. | ertical |
| C. | ntegrated |
| D. | nclined |
| Answer» C. ntegrated | |
| 162. |
Which, if any, of the following types of ads are people most willing to tolerate? |
| A. | op‐under ad |
| B. | op‐up ad |
| C. | anner ad |
| D. | one of the above |
| Answer» E. | |
| 163. |
In the e-commerce security environment, which of the following constitutes the inner-most layer? |
| A. | eople |
| B. | ata |
| C. | echnology solutions |
| D. | rganizational policies and procedures |
| Answer» C. echnology solutions | |
| 164. |
What type of ad appears under a web page? |
| A. | op‐under ad |
| B. | op‐up ad |
| C. | anner ad |
| D. | iscount ad |
| Answer» B. op‐up ad | |
| 165. |
The most common type of Internet crime according to the IC3 is ______. |
| A. | redit card fraud |
| B. | heck fraud |
| C. | on-delivery |
| D. | uction fraud |
| Answer» E. | |
| 166. |
Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials? |
| A. | orizontal |
| B. | ertical |
| C. | ntegrated |
| D. | nclined |
| Answer» B. ertical | |
| 167. |
The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _________. |
| A. | ctive Server Pages (ASP) |
| B. | ava Server Pages (JSP) |
| C. | ommon Gateway Interface (CGI) |
| D. | BScript |
| Answer» D. BScript | |
| 168. |
What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? |
| A. | irect marketplace |
| B. | 2B |
| C. | 2C |
| D. | lectronic marketplace |
| Answer» E. | |
| 169. |
Redundant navigation refers to _________. |
| A. | ages that work, load quickly, and point the customer toward your product offerings |
| B. | imple, fool-proof navigation |
| C. | site working with the most popular browsers |
| D. | lternative navigation to the same content |
| Answer» E. | |
| 170. |
Amazon.com is well‐known for which e‐commerce marketing technique? |
| A. | anner ads |
| B. | op‐up ads |
| C. | ffiliate programs |
| D. | iral marketing |
| Answer» D. iral marketing | |
| 171. |
What is a set of conditions used to measure how well a product or system functions? |
| A. | lexibility |
| B. | erformance |
| C. | apacity planning |
| D. | enchmark |
| Answer» E. | |
| 172. |
The set of applications and technologies that allow users to create, edit, and distribute content online is known as______. |
| A. | nternet |
| B. | ocial networking |
| C. | irtual life |
| D. | eb 2.0 |
| Answer» E. | |
| 173. |
Which factor represents a system's ability to change quickly? |
| A. | lexibility |
| B. | erformance |
| C. | apacity planning |
| D. | enchmark |
| Answer» B. erformance | |
| 174. |
E-business can be defined as_______. |
| A. | he uninhibited flow of information and goods on the Web |
| B. | he use of the Internet and the Web to transact business |
| C. | igitally enabled transactions and processes within an organization |
| D. | ommercial transactions involving electronic goods |
| Answer» D. ommercial transactions involving electronic goods | |
| 175. |
All of the following are examples of intelligent agent technology except ________. |
| A. | utomated response systems |
| B. | utomatic shipping confirmation |
| C. | rder status reports |
| D. | nline web bugs |
| Answer» E. | |
| 176. |
Which factor ensures your IT systems are functioning correctly and providing accurate information? |
| A. | vailability |
| B. | ccessibility |
| C. | eliability |
| D. | calability |
| Answer» D. calability | |
| 177. |
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________. |
| A. | ersioning |
| B. | undling |
| C. | ransactive content |
| D. | rice discrimination |
| Answer» B. undling | |
| 178. |
Which factor determines who has the right to access different types of IT systems and information? |
| A. | vailability |
| B. | ccessibility |
| C. | eliability |
| D. | calability |
| Answer» C. eliability | |
| 179. |
Which factor determines when your IT system will be available for knowledge workers to access? |
| A. | vailability |
| B. | ccessibility |
| C. | eliability |
| D. | one of the above |
| Answer» B. ccessibility | |
| 180. |
The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______. |
| A. | ffiliate marketing |
| B. | iral marketing |
| C. | ermission marketing |
| D. | log marketing |
| Answer» C. ermission marketing | |
| 181. |
What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? |
| A. | isaster recovery plan |
| B. | ot site |
| C. | old site |
| D. | isaster recovery cost curve |
| Answer» E. | |
| 182. |
Which of the following market entry strategies are the most common for existing firms? |
| A. | irst mover |
| B. | ast follower |
| C. | rand extender |
| D. | lliances |
| Answer» D. lliances | |
| 183. |
What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? |
| A. | lient/server network |
| B. | ntranet |
| C. | xtranet |
| D. | hin client |
| Answer» D. hin client | |
| 184. |
A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______. |
| A. | ommodity |
| B. | ore product |
| C. | ctual product |
| D. | ugmented product |
| Answer» B. ore product | |
| 185. |
What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? |
| A. | lient/server network |
| B. | ntranet |
| C. | xtranet |
| D. | hin client |
| Answer» C. xtranet | |
| 186. |
__________ influence the behavior of others through their personality, skills, or other factors. |
| A. | pinion leaders |
| B. | irect reference groups |
| C. | ndirect reference groups |
| D. | ifestyle groups |
| Answer» B. irect reference groups | |
| 187. |
The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a ________. |
| A. | ardware platform |
| B. | ontent platform |
| C. | ransaction platform |
| D. | calability platform |
| Answer» B. ontent platform | |
| 188. |
Materials used in the normal operation of a business but not related to primary business operations are called what? |
| A. | upplies |
| B. | irect materials |
| C. | ndirect materials |
| D. | aily stuff |
| Answer» D. aily stuff | |
| 189. |
What Web server functionality allows it verify usernames and passwords and process certificates and encryption information? |
| A. | rocessing of HTTP requests |
| B. | ile Transfer Protocol |
| C. | ata capture |
| D. | ecurity services |
| Answer» E. | |
| 190. |
All of the following are types of data mining except ______. |
| A. | elective data mining |
| B. | uery-driven data mining |
| C. | odel-driven data mining |
| D. | ule-based data mining |
| Answer» B. uery-driven data mining | |
| 191. |
What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? |
| A. | isaster recovery plan |
| B. | ot site |
| C. | old site |
| D. | isaster recovery cost curve |
| Answer» D. isaster recovery cost curve | |
| 192. |
A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns. |
| A. | atabase management system |
| B. | ata warehouse |
| C. | QL query |
| D. | elational database |
| Answer» E. | |
| 193. |
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? |
| A. | isaster recovery plan |
| B. | ot site |
| C. | old site |
| D. | isaster recovery cost curve |
| Answer» B. ot site | |
| 194. |
__________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server. |
| A. | ing |
| B. | elnet |
| C. | racert |
| D. | SL |
| Answer» B. elnet | |
| 195. |
Which of the following are advantages normally associated with B2B e‐commerce? |
| A. | horter cycle times |
| B. | eduction in costs |
| C. | eaches wider audiences |
| D. | ll of the above |
| Answer» E. | |
| 196. |
Which protocol permits users to transfer files from the server to their client computer, and vice versa? |
| A. | TTP |
| B. | MTP |
| C. | MAP |
| D. | TP |
| Answer» E. | |
| 197. |
Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues? |
| A. | 2B |
| B. | 2C |
| C. | 2B |
| D. | 2C |
| Answer» B. 2C | |
| 198. |
Most individuals are familiar with which form of e‐commerce? |
| A. | 2B |
| B. | 2C |
| C. | 2B |
| D. | 2C |
| Answer» C. 2B | |
| 199. |
In 1961, __________ published a paper on "packet switching" networks. |
| A. | eonard Kleinrock |
| B. | ay Tomlinson |
| C. | ob Metcalfe |
| D. | int Cerf |
| Answer» B. ay Tomlinson | |
| 200. |
What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? |
| A. | ustomer relationship management systems cards |
| B. | ‐government identity cards |
| C. | EDI cards |
| D. | mart cards |
| Answer» E. | |