MCQOPTIONS
Saved Bookmarks
This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 401. |
_ Private Key cryptography is also known as¬¨‚Ä __________ cryptography.$? |
| A. | Public key |
| B. | Symmetric |
| C. | Asymmetric |
| D. | None |
| Answer» C. Asymmetric | |
| 402. |
_ A perfect market is one in which __________.$? |
| A. | One firm develops an advantage based on a factor of production that other firms cannot purchase |
| B. | One participant in the market has more resources than the others |
| C. | there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production |
| D. | competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage |
| Answer» D. competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage | |
| 403. |
_ The best products to sell in B2C e‚Äêcommerce are:$? |
| A. | Small products |
| B. | Digital products |
| C. | Specialty products |
| D. | Fresh products |
| Answer» C. Specialty products | |
| 404. |
_ Which of the following is an example of a portal?$? |
| A. | Amazon |
| B. | eBay |
| C. | Yahoo |
| D. | Face book |
| Answer» D. Face book | |
| 405. |
_ All of the following are techniques B2C e‚Äêcommerce companies use to attract customers, except:$? |
| A. | Registering with search engines |
| B. | Viral marketing |
| C. | Online ads |
| D. | Virtual marketing |
| Answer» E. | |
| 406. |
_ In 1961, __________ published a paper on "packet switching" networks.$? |
| A. | Leonard Kleinrock |
| B. | Ray Tomlinson |
| C. | Bob Metcalfe |
| D. | Vint Cerf |
| Answer» B. Ray Tomlinson | |
| 407. |
_ Which of the following are advantages normally associated with B2B e‚Äêcommerce?$? |
| A. | Shorter cycle times |
| B. | Reduction in costs |
| C. | Reaches wider audiences |
| D. | all of the above |
| Answer» E. | |
| 408. |
_ What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?$? |
| A. | Direct materials |
| B. | Indirect materials |
| C. | EDI |
| D. | None of the above |
| Answer» C. EDI | |
| 409. |
_ The primary source of financing during the early years of e-commerce was _______.$? |
| A. | bank loans |
| B. | large retail firms |
| C. | venture capital funds |
| D. | initial public offerings |
| Answer» D. initial public offerings | |
| 410. |
_ Which of the following connections allows the fastest download speeds?$? |
| A. | DSL |
| B. | cable modem |
| C. | T1 |
| D. | T3 |
| Answer» E. | |
| 411. |
_ Paisapay is facilitated in.$? |
| A. | eBay.co.in |
| B. | amazon.com |
| C. | flipkart.com |
| D. | none of the above |
| Answer» B. amazon.com | |
| 412. |
_ All of the following are wireless Internet access network technologies except ________.$? |
| A. | Wi-Fi |
| B. | Bluetooth |
| C. | Zigbee |
| D. | GigaPoP |
| Answer» E. | |
| 413. |
_ A business cannot be all things to all people. Instead, a business must:$? |
| A. | Identify target customers |
| B. | Identify the value of products/services as perceived by customers |
| C. | all of the above |
| D. | None of the above |
| Answer» D. None of the above | |
| 414. |
_ All of the following are factors in optimizing Web site performance except _________.$? |
| A. | page retrieval |
| B. | page generation |
| C. | page delivery |
| D. | page content |
| Answer» B. page generation | |
| 415. |
__The largest segment in the recruitment business is________.__ |
| A. | General job recruitment |
| B. | Executive search |
| C. | Specialized job placement services |
| D. | Managerial recruitment |
| Answer» B. Executive search | |
| 416. |
__All of the following are considered biometrics, except:__ |
| A. | Fingerprint |
| B. | Retina |
| C. | Password |
| D. | Voice |
| Answer» D. Voice | |
| 417. |
__Which of the following is not a type of media convergence?__ |
| A. | technological convergence |
| B. | content convergence |
| C. | industry convergence |
| D. | community convergence |
| Answer» E. | |
| 418. |
__Which of the following to viruses harm?__ |
| A. | Your keyboard |
| B. | Your monitor |
| C. | Your processor |
| D. | Viruses do not harm any of the above |
| Answer» E. | |
| 419. |
__What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?__ |
| A. | Risk management |
| B. | Risk assessment |
| C. | Security |
| D. | None of the above |
| Answer» C. Security | |
| 420. |
__Who protects system from external threats?__ |
| A. | firewall |
| B. | EDI |
| C. | ERP |
| D. | Script kiddies |
| Answer» B. EDI | |
| 421. |
__The __________ is the first major effort to adjust the copyright laws to the Internet age.__ |
| A. | Platform for Privacy Preferences (P3P) |
| B. | Center for Democracy and Technology |
| C. | Digital Millennium Copyright Act (DMCA) |
| D. | E-Government Act of 2002 |
| Answer» D. E-Government Act of 2002 | |
| 422. |
__All of the following are acts Congress has passed or attempted to pass to protect children online except __________.__ |
| A. | Video Privacy Protection Act |
| B. | Children's Online Protection Act |
| C. | Communications Decency Act |
| D. | Children's Internet Protection Act |
| Answer» B. Children's Online Protection Act | |
| 423. |
__Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry?__ |
| A. | barriers to entry |
| B. | power of suppliers |
| C. | power of consumers |
| D. | industry value chain |
| Answer» B. power of suppliers | |
| 424. |
__What sends work assignments through an e‚Äêmail system?__ |
| A. | Database‚Äêbased enterprise information portal |
| B. | Messaging‚Äêbased enterprise information portal |
| C. | Database‚Äêbased workflow system |
| D. | Messaging‚Äêbased workflow system |
| Answer» E. | |
| 425. |
__Which concept suggests that different applications and computer systems should be able to communicate with one another?__ |
| A. | Integration |
| B. | Web services |
| C. | Scalability |
| D. | Interoperability |
| Answer» E. | |
| 426. |
__All of the following are metrics for e-mail campaigns except _________.__ |
| A. | open rate |
| B. | delivery rate |
| C. | bounce-back rate |
| D. | cart conversion rate |
| Answer» E. | |
| 427. |
_What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‚Äêcommerce or commerce‚Äêrelated activities?$? |
| A. | Direct marketplace |
| B. | B2B |
| C. | B2C |
| D. | Electronic marketplace |
| Answer» E. | |
| 428. |
_The ability to change the product to better fit the needs of the customer is called ________.$? |
| A. | customization |
| B. | personalization |
| C. | privacy |
| D. | accessibility |
| Answer» B. personalization | |
| 429. |
_If you need to transfer money to another person via the internet, which of the following methods could you use?$? |
| A. | financial cybermediary |
| B. | electronic check |
| C. | electronic bill presentment and payment |
| D. | all of the above |
| Answer» E. | |
| 430. |
_The most common form of securing channels is through ________.$? |
| A. | S-HTTP |
| B. | VPNs |
| C. | SSL |
| D. | PPTP |
| Answer» D. PPTP | |
| 431. |
_What type of ad appears under a web page?$? |
| A. | pop‚Äêunder ad |
| B. | pop‚Äêup ad |
| C. | banner ad |
| D. | discount ad |
| Answer» B. pop‚Äö√Ñ√™up ad | |
| 432. |
_A worm is designed to spread _________.$? |
| A. | from computer to computer |
| B. | from file to file on a computer |
| C. | from Web site to Web site |
| D. | from Web site to computer |
| Answer» B. from file to file on a computer | |
| 433. |
_Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.$? |
| A. | encryption, decryption |
| B. | private, public |
| C. | encryption, public |
| D. | public, private |
| Answer» E. | |
| 434. |
_What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?$? |
| A. | US-CERT |
| B. | OECD |
| C. | IC3 |
| D. | P3P |
| Answer» B. OECD | |
| 435. |
_Which factor represents a system's ability to change quickly?$? |
| A. | Flexibility |
| B. | Performance |
| C. | Capacity planning |
| D. | Benchmark |
| Answer» B. Performance | |
| 436. |
_What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?$? |
| A. | Disaster recovery plan |
| B. | Hot site |
| C. | Cold site |
| D. | Disaster recovery cost curve |
| Answer» E. | |
| 437. |
_Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________.$? |
| A. | versioning |
| B. | bundling |
| C. | transactive content |
| D. | price discrimination |
| Answer» B. bundling | |
| 438. |
_What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?$? |
| A. | Client/server network |
| B. | Intranet |
| C. | Extranet |
| D. | Thin client |
| Answer» C. Extranet | |
| 439. |
_A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.$? |
| A. | database management system |
| B. | data warehouse |
| C. | SQL query |
| D. | relational database |
| Answer» E. | |
| 440. |
_Which one is the component of cybercash payment system?$? |
| A. | CC user software |
| B. | CC merachant software |
| C. | CC Server Software |
| D. | All of the above |
| Answer» E. | |
| 441. |
_Which one of the following is not one of the major types of e-commerce?$? |
| A. | C2B |
| B. | B2C |
| C. | B2B |
| D. | C2C |
| Answer» B. B2C | |
| 442. |
_What Web server functionality allows it verify usernames and passwords and process certificates and encryption information?$? |
| A. | Processing of HTTP requests |
| B. | File Transfer Protocol |
| C. | Data capture |
| D. | Security services |
| Answer» E. | |
| 443. |
_The fastest growing form of online advertising is _________.$? |
| A. | banner ads |
| B. | pop-up ads |
| C. | rich media/video ads |
| D. | pop-under ads |
| Answer» D. pop-under ads | |
| 444. |
_After television, the next largest major player in the commercial entertainment industry is _________.$? |
| A. | video games |
| B. | music |
| C. | radio |
| D. | film |
| Answer» E. | |
| 445. |
What are the most commonly used input devices today?$? |
| A. | Keyboard |
| B. | Mouse |
| C. | All of the above |
| D. | None of the above |
| Answer» D. None of the above | |
| 446. |
Why would a merchant want to customize products?$? |
| A. | To charge a higher price |
| B. | To decrease costs |
| C. | It is required in EC |
| D. | Customers will only accept customized products |
| Answer» B. To decrease costs | |
| 447. |
Smart card is better protected than other cards using.$? |
| A. | Encryption |
| B. | Firewall |
| C. | Hub |
| D. | All the above |
| Answer» B. Firewall | |
| 448. |
Which of the following is not one of the benefits of e-commerce to sellers?$? |
| A. | E-commerce offers greater flexibility in meeting customer needs |
| B. | E-commerce is a powerful tool for customer relationship building |
| C. | E-commerce can help to reduce costs |
| D. | E-commerce increases the net cost per contact |
| Answer» E. | |
| 449. |
What is software you don't want hidden inside software you do want?$? |
| A. | Adware |
| B. | Trojan‚Äêhorse software |
| C. | Spyware |
| D. | All of the above |
| Answer» E. | |
| 450. |
The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.$? |
| A. | general community |
| B. | practice network |
| C. | affinity community |
| D. | interest-based social network |
| Answer» E. | |