Explore topic-wise MCQs in Commerce.

This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.

451.

Which item can a password be used to protect?$?

A. Network
B. File
C. Folder
D. All of the above
Answer» E.
452.

The most popular type of auction on eBay is the _________.$?

A. Dutch Internet auction
B. Name Your Own Price auction
C. English auction
D. Professional service auction
Answer» D. Professional service auction
453.

Which of the following captures screen images?$?

A. Key logger
B. Packet sniffer
C. Log analysis tools
D. Screen capture software
Answer» E.
454.

An auction that has multiple winners that all pay the same price is an example of________.$?

A. uniform pricing
B. discriminatory pricing
C. bid rigging
D. price matching
Answer» B. discriminatory pricing
455.

Which of the following is not a common approach to phishing?$?

A. Send an official‚Äêlooking e‚Äêmail asking for confidential information
B. Ask people to fill out and return a fake letter using postal mail
C. Ask people to click a link in an e‚Äêmail to open a submission form on a web page
D. All of the above are uncommon approaches to phishing
Answer» C. Ask people to click a link in an e‚Äö√Ñ√™mail to open a submission form on a web page
456.

The foundation for contemporary supply chain management systems includes all of the following except _________.$?

A. supply chain simplification
B. continuous inventory replenishment
C. ERP systems
D. B2B electronic storefronts
Answer» E.
457.

Unsolicited e‚Äêmail is called what?$?

A. Junk mail
B. Spam
C. Extra mail
D. None of the above
Answer» C. Extra mail
458.

Which one is not an offline payment mode?$?

A. Cash on delivery
B. Cash before delivery
C. Demand drafts
D. e‚Äêcheque
Answer» E.
459.

Which one is not a physical threat?$?

A. Hacking
B. Storm
C. Phishing
D. None of the above
Answer» B. Storm
460.

__________¬¨‚Ä is backbone of all E‚Äö√Ñ√™payments in E‚Äö√Ñ√™commerce.$?

A. EFT
B. EPS
C. PayPal
D. None of these
Answer» C. PayPal
461.

Secret key is used for.$?

A. Public key cryptography
B. Private key cryptography
C. Asymmetric key cryptography
D. None of these
Answer» C. Asymmetric key cryptography
462.

Which is used to identify mobile money?$?

A. MCID
B. MMID
C. RSID
D. NONE OF THE ABOVE
Answer» C. RSID
463.

Which is not a feature of eCommerce?$?

A. SCM
B. EDI
C. WWW
D. BPR
Answer» E.
464.

Which will harmomputer resources$?

A. Worm
B. Virus
C. Trojan horse
D. All the above
Answer» E.
465.

Which one is not a threat for E‚Äêcommerce?$?

A. Trojan horse
B. Viruses
C. Worm
D. None
Answer» E.
466.

Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?$?

A. Affiliate programs
B. Click‚Äêthrough
C. Spam
D. All of the above
Answer» C. Spam
467.

A _________ is the set of planned activities designed to result in a profit in a marketplace.$?

A. business model
B. profit model
C. business plan
D. revenue model
Answer» B. profit model
468.

Which products are people most likely to be comfortable buying on the Internet?$?

A. Books
B. PCs
C. CDs
D. All of the above
Answer» E.
469.

The _________ business model involves an independently owned vertical digital marketplace for direct inputs.$?

A. e-distributor
B. exchange
C. e-procurement
D. private industrial network
Answer» C. e-procurement
470.

What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?$?

A. Customer relationship management systems cards
B. E‚Äêgovernment identity cards
C. FEDI cards
D. Smart cards
Answer» E.
471.

Which protocol permits users to transfer files from the server to their client computer, and vice versa?$?

A. HTTP
B. SMTP
C. IMAP
D. FTP
Answer» E.
472.

A situation where there are no differences among products or services, and the only basis of choosing products is price is known as _________.$?

A. a value web
B. value chain
C. profit
D. commoditization
Answer» E.
473.

Which type of e‚Äêcommerce focuses on consumers dealing with each other?$?

A. B2B
B. B2C
C. C2B
D. C2C
Answer» E.
474.

The threat of new entrants is high when it is:$?

A. Hard for customers to enter the market
B. Hard for competitors to enter the market
C. Easy for competitors to enter the market
D. Easy for customers to enter the market
Answer» D. Easy for customers to enter the market
475.

All of the following are goals of Internet 2 except ______.$?

A. Creating a leading-edge very high-speed network capability for the national research community
B. Eliminating censorship from the Internet
C. Enabling revolutionary Internet applications
D. Ensuring the rapid transfer of new network services and applications to the broader Internet community
Answer» C. Enabling revolutionary Internet applications
476.

Which of the following is not related to security mechanism?$?

A. encryption
B. decryption
C. e‚Äêcash
D. all the above
Answer» D. all the above
477.

Which of the following was the first commercial Web browser?$?

A. Mosaic
B. Mozilla
C. Netscape Navigator
D. Internet Explorer
Answer» D. Internet Explorer
478.

Which type of products is lesser purchased using eCommerce?$?

A. automobiles
B. books
C. softwares
D. none
Answer» B. books
479.

What is the first step in a P3P-enabled transaction?$?

A. send Web page
B. http GET request Web page
C. Send P3P policy files
D. http GET request P3P policy files
Answer» C. Send P3P policy files
480.

What floods a Web site with so many requests for service that it slows down or crashes?$?

A. Computer virus
B. Worm
C. Denial‚Äêof‚Äêservice attack
D. None of the above
Answer» D. None of the above
481.

The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.$?

A. The Golden Rule
B. Slippery Slope
C. No Free Lunch
D. Universalism
Answer» E.
482.

Which process can preventata from lose due to computer problems or human errors?$?

A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» B. recovery
483.

The number of business methods patents granted is ___________ compared to the number of patents applied for.$?

A. substantially smaller
B. slightly smaller
C. close to equal
D. equal
Answer» B. slightly smaller
484.

What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?$?

A. Web log
B. Clickstream
C. Anonymous Web browsing service
D. None of the above
Answer» E.
485.

All of the following are types of social marketing except ______.$?

A. affiliate marketing
B. blog advertising
C. social network advertising
D. game advertising
Answer» B. blog advertising
486.

Which is not a function of ERP?$?

A. Warehousing
B. sales
C. scheduling
D. None of the above
Answer» E.
487.

When a transaction is processed online, how can the merchant verify the customer's identity?$?

A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange
Answer» C. use electronic data interchange
488.

When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.$?

A. phishing
B. pharming
C. a Denial of Service (DoS) attack
D. spoofing
Answer» D. spoofing
489.

A combination of software and information designed to provide security and information for payment is called a what?$?

A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
Answer» B. pop up ad
490.

A security plan begins with a(n) is ______.$?

A. security policy
B. risk assessment
C. implementation plan
D. security organization
Answer» C. implementation plan
491.

The most common type of Internet crime according to the IC3 is ______.$?

A. Credit card fraud
B. Check fraud
C. Non-delivery
D. Auction fraud
Answer» E.
492.

Which of the following is an Internet‚Äêbased company that makes it easy for one person to pay another over the Internet?$?

A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary
Answer» E.
493.

Redundant navigation refers to _________.$?

A. pages that work, load quickly, and point the customer toward your product offerings
B. simple, fool-proof navigation
C. a site working with the most popular browsers
D. alternative navigation to the same content
Answer» E.
494.

Which form of e‚Äêmarketplace brings together buyers and sellers from the same industry?$?

A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer» C. Integrated
495.

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?$?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer» B. Hot site
496.

Which of the following market entry strategies are the most common for existing firms?$?

A. first mover
B. fast follower
C. brand extender
D. alliances
Answer» D. alliances
497.

Which factor determines who has the right to access different types of IT systems and information?$?

A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer» C. Reliability
498.

E-business can be defined as_______.$?

A. the uninhibited flow of information and goods on the Web
B. the use of the Internet and the Web to transact business
C. digitally enabled transactions and processes within an organization
D. commercial transactions involving electronic goods
Answer» D. commercial transactions involving electronic goods
499.

__________ influence the behavior of others through their personality, skills, or other factors.$?

A. Opinion leaders
B. Direct reference groups
C. Indirect reference groups
D. Lifestyle groups
Answer» B. Direct reference groups
500.

What software detects and removes or quarantines computer viruses?$?

A. Backup
B. Anti‚Äêvirus
C. Firewall
D. Biometrics
Answer» C. Firewall