MCQOPTIONS
Saved Bookmarks
This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
A strategy designed to compete in all markets around the globe is called a _________ strategy. |
| A. | cope |
| B. | ifferentiation |
| C. | ost |
| D. | ocus |
| Answer» B. ifferentiation | |
| 2. |
What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities? |
| A. | irect materials |
| B. | ndirect materials |
| C. | DI |
| D. | one of the above |
| Answer» C. DI | |
| 3. |
A situation where there are no differences among products or services, and the only basis of choosing products is price is known as _________. |
| A. | value web |
| B. | alue chain |
| C. | rofit |
| D. | ommoditization |
| Answer» E. | |
| 4. |
What is the percentage of customers who visit a Web site and actually buy something called? |
| A. | ffiliate programs |
| B. | lick‐through |
| C. | pam |
| D. | onversion rate |
| Answer» E. | |
| 5. |
A perfect market is one in which __________. |
| A. | ne firm develops an advantage based on a factor of production that other firms cannot purchase |
| B. | ne participant in the market has more resources than the others |
| C. | here are no competitive advantages or asymmetries because all firms have equal access to all the factors to production |
| D. | ompetition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage |
| Answer» D. ompetition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage | |
| 6. |
Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? |
| A. | ffiliate programs |
| B. | lick‐through |
| C. | pam |
| D. | ll of the above |
| Answer» C. pam | |
| 7. |
Compared to Internet users, the number of cell phone subscribers is _________. |
| A. | bout the same |
| B. | lightly fewer |
| C. | uch fewer |
| D. | uch larger |
| Answer» E. | |
| 8. |
All of the following are techniques B2C e‐commerce companies use to attract customers, except: |
| A. | egistering with search engines |
| B. | iral marketing |
| C. | nline ads |
| D. | irtual marketing |
| Answer» E. | |
| 9. |
The _________ business model involves an independently owned vertical digital marketplace for direct inputs. |
| A. | -distributor |
| B. | xchange |
| C. | -procurement |
| D. | rivate industrial network |
| Answer» C. -procurement | |
| 10. |
Which of the following is not a key element of a business model? |
| A. | alue proposition |
| B. | ompetitive advantage |
| C. | arket strategy |
| D. | niversal standards |
| Answer» E. | |
| 11. |
The best products to sell in B2C e‐commerce are: |
| A. | mall products |
| B. | igital products |
| C. | pecialty products |
| D. | resh products |
| Answer» C. pecialty products | |
| 12. |
A _________ is the set of planned activities designed to result in a profit in a marketplace. |
| A. | usiness model |
| B. | rofit model |
| C. | usiness plan |
| D. | evenue model |
| Answer» B. rofit model | |
| 13. |
Which segment is eBay an example? |
| A. | 2B |
| B. | 2B |
| C. | 2C |
| D. | one of the above |
| Answer» E. | |
| 14. |
The primary source of financing during the early years of e-commerce was _______. |
| A. | ank loans |
| B. | arge retail firms |
| C. | enture capital funds |
| D. | nitial public offerings |
| Answer» D. nitial public offerings | |
| 15. |
Which type of e‐commerce focuses on consumers dealing with each other? |
| A. | 2B |
| B. | 2C |
| C. | 2B |
| D. | 2C |
| Answer» E. | |
| 16. |
A business competing in a commodity like environment must focus on which of the following? |
| A. | rice |
| B. | ase / speed of delivery |
| C. | ase of ordering |
| D. | ll of the above |
| Answer» E. | |
| 17. |
All of the following are factors in optimizing Web site performance except _________. |
| A. | age retrieval |
| B. | age generation |
| C. | age delivery |
| D. | age content |
| Answer» B. age generation | |
| 18. |
Which type of products is lesser purchased using eCommerce? |
| A. | utomobiles |
| B. | ooks |
| C. | oftwares |
| D. | one |
| Answer» B. ooks | |
| 19. |
How the transactions occur in e‐commerce? |
| A. | sing e‐medias |
| B. | sing computers only |
| C. | sing mobile phones only |
| D. | one of the above |
| Answer» B. sing computers only | |
| 20. |
Digital products are best suited for B2C e‐commerce because they: |
| A. | re commodity like products |
| B. | an be mass‐customized and personalized |
| C. | an be delivered at the time of purchase |
| D. | ll of the above |
| Answer» E. | |
| 21. |
Which of the following is an example of a portal? |
| A. | mazon |
| B. | Bay |
| C. | ahoo |
| D. | ace book |
| Answer» D. ace book | |
| 22. |
Which products are people most likely to be comfortable buying on the Internet? |
| A. | ooks |
| B. | Cs |
| C. | Ds |
| D. | ll of the above |
| Answer» E. | |
| 23. |
All of the following are steps in the systems development life cycle except ______. |
| A. | ystems Design |
| B. | esting |
| C. | mplementation |
| D. | ebugging |
| Answer» E. | |
| 24. |
A business cannot be all things to all people. Instead, a business must: |
| A. | dentify target customers |
| B. | dentify the value of products/services as perceived by customers |
| C. | ll of the above |
| D. | one of the above |
| Answer» D. one of the above | |
| 25. |
Which of the following was the first commercial Web browser? |
| A. | osaic |
| B. | ozilla |
| C. | etscape Navigator |
| D. | nternet Explorer |
| Answer» D. nternet Explorer | |
| 26. |
A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? |
| A. | witching costs |
| B. | oyalty programs |
| C. | ntry barriers |
| D. | ffiliate programs |
| Answer» D. ffiliate programs | |
| 27. |
All of the following are wireless Internet access network technologies except ________. |
| A. | i-Fi |
| B. | luetooth |
| C. | igbee |
| D. | igaPoP |
| Answer» E. | |
| 28. |
Which of the following is not related to security mechanism? |
| A. | ncryption |
| B. | ecryption |
| C. | ‐cash |
| D. | ll the above |
| Answer» D. ll the above | |
| 29. |
If it is easy for competitors to enter the market, the threat of new entrants is considered: |
| A. | igh |
| B. | ow |
| C. | ore |
| D. | ess |
| Answer» B. ow | |
| 30. |
Which of the following connections allows the fastest download speeds? |
| A. | SL |
| B. | able modem |
| C. | 1 |
| D. | 3 |
| Answer» E. | |
| 31. |
The threat of new entrants is high when it is: |
| A. | ard for customers to enter the market |
| B. | ard for competitors to enter the market |
| C. | asy for competitors to enter the market |
| D. | asy for customers to enter the market |
| Answer» D. asy for customers to enter the market | |
| 32. |
Which of the following is not considered to be one of the three phases of e-commerce? |
| A. | nnovation |
| B. | onsolidation |
| C. | reservation |
| D. | einvention |
| Answer» D. einvention | |
| 33. |
Which of the following is part of the four main types for e‐commerce? |
| A. | 2B |
| B. | 2C |
| C. | 2B |
| D. | ll of the above |
| Answer» E. | |
| 34. |
Which one of the following is not one of the major types of e-commerce? |
| A. | 2B |
| B. | 2C |
| C. | 2B |
| D. | 2C |
| Answer» B. 2C | |
| 35. |
Which of the following describes e‐commerce? |
| A. | oing business electronically |
| B. | oing business |
| C. | ale of goods |
| D. | ll of the above |
| Answer» B. oing business | |
| 36. |
Which of the following is a new and disruptive Web feature or service? |
| A. | ML |
| B. | iffserv |
| C. | logs |
| D. | DMA |
| Answer» D. DMA | |
| 37. |
Paisapay is facilitated in. |
| A. | Bay.co.in |
| B. | mazon.com |
| C. | lipkart.com |
| D. | one of the above |
| Answer» B. mazon.com | |
| 38. |
All of the following are goals of Internet 2 except ______. |
| A. | reating a leading-edge very high-speed network capability for the national research community |
| B. | liminating censorship from the Internet |
| C. | nabling revolutionary Internet applications |
| D. | nsuring the rapid transfer of new network services and applications to the broader Internet community |
| Answer» C. nabling revolutionary Internet applications | |
| 39. |
The viruses spreads through __________.%! |
| A. | Mails |
| B. | Pen drives and cds |
| C. | Websites |
| D. | All the above |
| Answer» E. | |
| 40. |
The virus that are attached with vb and java files are called.%! |
| A. | Macro |
| B. | Trojan horse |
| C. | Script virus |
| D. | None of the above |
| Answer» D. None of the above | |
| 41. |
The virus that are commonly found in word documents are called __________.%! |
| A. | Macro |
| B. | Trojan horse |
| C. | Script virus |
| D. | None of the above |
| Answer» B. Trojan horse | |
| 42. |
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‚Äêmail and other Internet traffic?%! |
| A. | Computer virus |
| B. | Worm |
| C. | Denial‚Äêof‚Äêservice attack |
| D. | None of the above |
| Answer» C. Denial‚Äö√Ñ√™of‚Äö√Ñ√™service attack | |
| 43. |
Products are made to prior to orders received based on estimated demand under a _________.%! |
| A. | supply-push model |
| B. | demand-push model |
| C. | supply-pull model |
| D. | demand-pull model |
| Answer» B. demand-push model | |
| 44. |
Which service encompasses all technologies used to transmit and process information on an across a network?%! |
| A. | Interoperability |
| B. | Scalability |
| C. | Benchmarking |
| D. | Web services |
| Answer» E. | |
| 45. |
A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.%! |
| A. | 10 |
| B. | 20 |
| C. | 30 |
| D. | 40 |
| Answer» C. 30 | |
| 46. |
Who breaks into other people's computer systems and steals and destroys information?%! |
| A. | Hackers |
| B. | softwares |
| C. | Hacktivists |
| D. | Script kiddies |
| Answer» B. softwares | |
| 47. |
Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?%! |
| A. | Cdt.org |
| B. | PrivacyInternational.org |
| C. | Epic.org |
| D. | Privacy.org |
| Answer» B. PrivacyInternational.org | |
| 48. |
What is the process of making a copy of the information stored on a computer?%! |
| A. | Backup |
| B. | Anti‚Äêvirus |
| C. | Firewall |
| D. | Biometrics |
| Answer» B. Anti‚Äö√Ñ√™virus | |
| 49. |
The majority of job seekers rely on which of the following?%! |
| A. | Word-of-mouth leads |
| B. | Employment agencies |
| C. | Internet and newspapers equally |
| D. | Internet only |
| Answer» D. Internet only | |
| 50. |
What scrambles the contents of a file so you can't read it without having the right decryption key?%! |
| A. | Encryption |
| B. | Intrusion‚Äêdetection software |
| C. | Security‚Äêauditing software |
| D. | All of the above |
| Answer» B. Intrusion‚Äö√Ñ√™detection software | |