MCQOPTIONS
 Saved Bookmarks
				This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 451. | 
                                    Which item can a password be used to protect?$? | 
                            
| A. | Network | 
| B. | File | 
| C. | Folder | 
| D. | All of the above | 
| Answer» E. | |
| 452. | 
                                    The most popular type of auction on eBay is the _________.$? | 
                            
| A. | Dutch Internet auction | 
| B. | Name Your Own Price auction | 
| C. | English auction | 
| D. | Professional service auction | 
| Answer» D. Professional service auction | |
| 453. | 
                                    Which of the following captures screen images?$? | 
                            
| A. | Key logger | 
| B. | Packet sniffer | 
| C. | Log analysis tools | 
| D. | Screen capture software | 
| Answer» E. | |
| 454. | 
                                    An auction that has multiple winners that all pay the same price is an example of________.$? | 
                            
| A. | uniform pricing | 
| B. | discriminatory pricing | 
| C. | bid rigging | 
| D. | price matching | 
| Answer» B. discriminatory pricing | |
| 455. | 
                                    Which of the following is not a common approach to phishing?$? | 
                            
| A. | Send an official‚Äêlooking e‚Äêmail asking for confidential information | 
| B. | Ask people to fill out and return a fake letter using postal mail | 
| C. | Ask people to click a link in an e‚Äêmail to open a submission form on a web page | 
| D. | All of the above are uncommon approaches to phishing | 
| Answer» C. Ask people to click a link in an e‚Äö√Ñ√™mail to open a submission form on a web page | |
| 456. | 
                                    The foundation for contemporary supply chain management systems includes all of the following except _________.$? | 
                            
| A. | supply chain simplification | 
| B. | continuous inventory replenishment | 
| C. | ERP systems | 
| D. | B2B electronic storefronts | 
| Answer» E. | |
| 457. | 
                                    Unsolicited e‚Äêmail is called what?$? | 
                            
| A. | Junk mail | 
| B. | Spam | 
| C. | Extra mail | 
| D. | None of the above | 
| Answer» C. Extra mail | |
| 458. | 
                                    Which one is not an offline payment mode?$? | 
                            
| A. | Cash on delivery | 
| B. | Cash before delivery | 
| C. | Demand drafts | 
| D. | e‚Äêcheque | 
| Answer» E. | |
| 459. | 
                                    Which one is not a physical threat?$? | 
                            
| A. | Hacking | 
| B. | Storm | 
| C. | Phishing | 
| D. | None of the above | 
| Answer» B. Storm | |
| 460. | 
                                    __________¬¨‚Ä is backbone of all E‚Äö√Ñ√™payments in E‚Äö√Ñ√™commerce.$? | 
                            
| A. | EFT | 
| B. | EPS | 
| C. | PayPal | 
| D. | None of these | 
| Answer» C. PayPal | |
| 461. | 
                                    Secret key is used for.$? | 
                            
| A. | Public key cryptography | 
| B. | Private key cryptography | 
| C. | Asymmetric key cryptography | 
| D. | None of these | 
| Answer» C. Asymmetric key cryptography | |
| 462. | 
                                    Which is used to identify mobile money?$? | 
                            
| A. | MCID | 
| B. | MMID | 
| C. | RSID | 
| D. | NONE OF THE ABOVE | 
| Answer» C. RSID | |
| 463. | 
                                    Which is not a feature of eCommerce?$? | 
                            
| A. | SCM | 
| B. | EDI | 
| C. | WWW | 
| D. | BPR | 
| Answer» E. | |
| 464. | 
                                    Which will harmomputer resources$? | 
                            
| A. | Worm | 
| B. | Virus | 
| C. | Trojan horse | 
| D. | All the above | 
| Answer» E. | |
| 465. | 
                                    Which one is not a threat for E‚Äêcommerce?$? | 
                            
| A. | Trojan horse | 
| B. | Viruses | 
| C. | Worm | 
| D. | None | 
| Answer» E. | |
| 466. | 
                                    Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?$? | 
                            
| A. | Affiliate programs | 
| B. | Click‚Äêthrough | 
| C. | Spam | 
| D. | All of the above | 
| Answer» C. Spam | |
| 467. | 
                                    A _________ is the set of planned activities designed to result in a profit in a marketplace.$? | 
                            
| A. | business model | 
| B. | profit model | 
| C. | business plan | 
| D. | revenue model | 
| Answer» B. profit model | |
| 468. | 
                                    Which products are people most likely to be comfortable buying on the Internet?$? | 
                            
| A. | Books | 
| B. | PCs | 
| C. | CDs | 
| D. | All of the above | 
| Answer» E. | |
| 469. | 
                                    The _________ business model involves an independently owned vertical digital marketplace for direct inputs.$? | 
                            
| A. | e-distributor | 
| B. | exchange | 
| C. | e-procurement | 
| D. | private industrial network | 
| Answer» C. e-procurement | |
| 470. | 
                                    What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?$? | 
                            
| A. | Customer relationship management systems cards | 
| B. | E‚Äêgovernment identity cards | 
| C. | FEDI cards | 
| D. | Smart cards | 
| Answer» E. | |
| 471. | 
                                    Which protocol permits users to transfer files from the server to their client computer, and vice versa?$? | 
                            
| A. | HTTP | 
| B. | SMTP | 
| C. | IMAP | 
| D. | FTP | 
| Answer» E. | |
| 472. | 
                                    A situation where there are no differences among products or services, and the only basis of choosing products is price is known as _________.$? | 
                            
| A. | a value web | 
| B. | value chain | 
| C. | profit | 
| D. | commoditization | 
| Answer» E. | |
| 473. | 
                                    Which type of e‚Äêcommerce focuses on consumers dealing with each other?$? | 
                            
| A. | B2B | 
| B. | B2C | 
| C. | C2B | 
| D. | C2C | 
| Answer» E. | |
| 474. | 
                                    The threat of new entrants is high when it is:$? | 
                            
| A. | Hard for customers to enter the market | 
| B. | Hard for competitors to enter the market | 
| C. | Easy for competitors to enter the market | 
| D. | Easy for customers to enter the market | 
| Answer» D. Easy for customers to enter the market | |
| 475. | 
                                    All of the following are goals of Internet 2 except ______.$? | 
                            
| A. | Creating a leading-edge very high-speed network capability for the national research community | 
| B. | Eliminating censorship from the Internet | 
| C. | Enabling revolutionary Internet applications | 
| D. | Ensuring the rapid transfer of new network services and applications to the broader Internet community | 
| Answer» C. Enabling revolutionary Internet applications | |
| 476. | 
                                    Which of the following is not related to security mechanism?$? | 
                            
| A. | encryption | 
| B. | decryption | 
| C. | e‚Äêcash | 
| D. | all the above | 
| Answer» D. all the above | |
| 477. | 
                                    Which of the following was the first commercial Web browser?$? | 
                            
| A. | Mosaic | 
| B. | Mozilla | 
| C. | Netscape Navigator | 
| D. | Internet Explorer | 
| Answer» D. Internet Explorer | |
| 478. | 
                                    Which type of products is lesser purchased using eCommerce?$? | 
                            
| A. | automobiles | 
| B. | books | 
| C. | softwares | 
| D. | none | 
| Answer» B. books | |
| 479. | 
                                    What is the first step in a P3P-enabled transaction?$? | 
                            
| A. | send Web page | 
| B. | http GET request Web page | 
| C. | Send P3P policy files | 
| D. | http GET request P3P policy files | 
| Answer» C. Send P3P policy files | |
| 480. | 
                                    What floods a Web site with so many requests for service that it slows down or crashes?$? | 
                            
| A. | Computer virus | 
| B. | Worm | 
| C. | Denial‚Äêof‚Äêservice attack | 
| D. | None of the above | 
| Answer» D. None of the above | |
| 481. | 
                                    The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.$? | 
                            
| A. | The Golden Rule | 
| B. | Slippery Slope | 
| C. | No Free Lunch | 
| D. | Universalism | 
| Answer» E. | |
| 482. | 
                                    Which process can preventata from lose due to computer problems or human errors?$? | 
                            
| A. | backup | 
| B. | recovery | 
| C. | benchmarking | 
| D. | data cleansing | 
| Answer» B. recovery | |
| 483. | 
                                    The number of business methods patents granted is ___________ compared to the number of patents applied for.$? | 
                            
| A. | substantially smaller | 
| B. | slightly smaller | 
| C. | close to equal | 
| D. | equal | 
| Answer» B. slightly smaller | |
| 484. | 
                                    What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?$? | 
                            
| A. | Web log | 
| B. | Clickstream | 
| C. | Anonymous Web browsing service | 
| D. | None of the above | 
| Answer» E. | |
| 485. | 
                                    All of the following are types of social marketing except ______.$? | 
                            
| A. | affiliate marketing | 
| B. | blog advertising | 
| C. | social network advertising | 
| D. | game advertising | 
| Answer» B. blog advertising | |
| 486. | 
                                    Which is not a function of ERP?$? | 
                            
| A. | Warehousing | 
| B. | sales | 
| C. | scheduling | 
| D. | None of the above | 
| Answer» E. | |
| 487. | 
                                    When a transaction is processed online, how can the merchant verify the customer's identity?$? | 
                            
| A. | use secure sockets layers | 
| B. | use secure electronic transactions | 
| C. | use electronic data interchange | 
| D. | use financial electronic data interchange | 
| Answer» C. use electronic data interchange | |
| 488. | 
                                    When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.$? | 
                            
| A. | phishing | 
| B. | pharming | 
| C. | a Denial of Service (DoS) attack | 
| D. | spoofing | 
| Answer» D. spoofing | |
| 489. | 
                                    A combination of software and information designed to provide security and information for payment is called a what?$? | 
                            
| A. | digital wallet | 
| B. | pop up ad | 
| C. | shopping cart | 
| D. | encryption | 
| Answer» B. pop up ad | |
| 490. | 
                                    A security plan begins with a(n) is ______.$? | 
                            
| A. | security policy | 
| B. | risk assessment | 
| C. | implementation plan | 
| D. | security organization | 
| Answer» C. implementation plan | |
| 491. | 
                                    The most common type of Internet crime according to the IC3 is ______.$? | 
                            
| A. | Credit card fraud | 
| B. | Check fraud | 
| C. | Non-delivery | 
| D. | Auction fraud | 
| Answer» E. | |
| 492. | 
                                    Which of the following is an Internet‚Äêbased company that makes it easy for one person to pay another over the Internet?$? | 
                            
| A. | electronic check | 
| B. | electronic bill presentment and payment | 
| C. | conversion rates | 
| D. | financial cybermediary | 
| Answer» E. | |
| 493. | 
                                    Redundant navigation refers to _________.$? | 
                            
| A. | pages that work, load quickly, and point the customer toward your product offerings | 
| B. | simple, fool-proof navigation | 
| C. | a site working with the most popular browsers | 
| D. | alternative navigation to the same content | 
| Answer» E. | |
| 494. | 
                                    Which form of e‚Äêmarketplace brings together buyers and sellers from the same industry?$? | 
                            
| A. | horizontal | 
| B. | Vertical | 
| C. | Integrated | 
| D. | Inclined | 
| Answer» C. Integrated | |
| 495. | 
                                    What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?$? | 
                            
| A. | Disaster recovery plan | 
| B. | Hot site | 
| C. | Cold site | 
| D. | Disaster recovery cost curve | 
| Answer» B. Hot site | |
| 496. | 
                                    Which of the following market entry strategies are the most common for existing firms?$? | 
                            
| A. | first mover | 
| B. | fast follower | 
| C. | brand extender | 
| D. | alliances | 
| Answer» D. alliances | |
| 497. | 
                                    Which factor determines who has the right to access different types of IT systems and information?$? | 
                            
| A. | Availability | 
| B. | Accessibility | 
| C. | Reliability | 
| D. | Scalability | 
| Answer» C. Reliability | |
| 498. | 
                                    E-business can be defined as_______.$? | 
                            
| A. | the uninhibited flow of information and goods on the Web | 
| B. | the use of the Internet and the Web to transact business | 
| C. | digitally enabled transactions and processes within an organization | 
| D. | commercial transactions involving electronic goods | 
| Answer» D. commercial transactions involving electronic goods | |
| 499. | 
                                    __________ influence the behavior of others through their personality, skills, or other factors.$? | 
                            
| A. | Opinion leaders | 
| B. | Direct reference groups | 
| C. | Indirect reference groups | 
| D. | Lifestyle groups | 
| Answer» B. Direct reference groups | |
| 500. | 
                                    What software detects and removes or quarantines computer viruses?$? | 
                            
| A. | Backup | 
| B. | Anti‚Äêvirus | 
| C. | Firewall | 
| D. | Biometrics | 
| Answer» C. Firewall | |