MCQOPTIONS
 Saved Bookmarks
				This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 501. | 
                                    The most popular type of media in terms of total hours of consumption per year is _____.$? | 
                            
| A. | television | 
| B. | radio | 
| C. | Internet | 
| D. | newspaper | 
| Answer» B. radio | |
| 502. | 
                                    What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?$? | 
                            
| A. | Encryption | 
| B. | Public key encryption | 
| C. | Intrusion‚Äêdetection software | 
| D. | Security‚Äêauditing software | 
| Answer» C. Intrusion‚Äö√Ñ√™detection software | |
| 503. | 
                                    The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________.$? | 
                            
| A. | Digital rights management | 
| B. | Digital protection schemes | 
| C. | Digital distribution regulation | 
| D. | Digital rights protection | 
| Answer» B. Digital protection schemes | |
| 504. | 
                                    The major impact of Internet real estate sites is in ______.$? | 
                            
| A. | completing property transactions online | 
| B. | influencing offline decisions | 
| C. | reducing commissions | 
| D. | e-mail marketing to consumers | 
| Answer» C. reducing commissions | |
| 505. | 
                                    The number of business methods patents granted is ___________ compared to the number of patents applied for.? | 
                            
| A. | substantially smaller | 
| B. | slightly smaller | 
| C. | close to equal | 
| D. | equal | 
| Answer» B. slightly smaller | |
| 506. | 
                                    Which process can preventata from lose due to computer problems or human errors?? | 
                            
| A. | backup | 
| B. | recovery | 
| C. | benchmarking | 
| D. | data cleansing | 
| Answer» B. recovery | |
| 507. | 
                                    What is the first step in a P3P-enabled transaction?? | 
                            
| A. | send Web page | 
| B. | http GET request Web page | 
| C. | Send P3P policy files | 
| D. | http GET request P3P policy files | 
| Answer» C. Send P3P policy files | |
| 508. | 
                                    What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?? | 
                            
| A. | Web log | 
| B. | Clickstream | 
| C. | Anonymous Web browsing service | 
| D. | None of the above | 
| Answer» E. | |
| 509. | 
                                    What floods a Web site with so many requests for service that it slows down or crashes?? | 
                            
| A. | Computer virus | 
| B. | Worm | 
| C. | Denial‚Äêof‚Äêservice attack | 
| D. | None of the above | 
| Answer» D. None of the above | |
| 510. | 
                                    All of the following are types of social marketing except ______.? | 
                            
| A. | affiliate marketing | 
| B. | blog advertising | 
| C. | social network advertising | 
| D. | game advertising | 
| Answer» B. blog advertising | |
| 511. | 
                                    The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.? | 
                            
| A. | The Golden Rule | 
| B. | Slippery Slope | 
| C. | No Free Lunch | 
| D. | Universalism | 
| Answer» E. | |
| 512. | 
                                    Which is not a function of ERP?? | 
                            
| A. | Warehousing | 
| B. | sales | 
| C. | scheduling | 
| D. | None of the above | 
| Answer» E. | |
| 513. | 
                                    Redundant navigation refers to _________.? | 
                            
| A. | pages that work, load quickly, and point the customer toward your product offerings | 
| B. | simple, fool-proof navigation | 
| C. | a site working with the most popular browsers | 
| D. | alternative navigation to the same content | 
| Answer» E. | |
| 514. | 
                                    Which form of e‚Äêmarketplace brings together buyers and sellers from the same industry?? | 
                            
| A. | horizontal | 
| B. | Vertical | 
| C. | Integrated | 
| D. | Inclined | 
| Answer» C. Integrated | |
| 515. | 
                                    When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.? | 
                            
| A. | phishing | 
| B. | pharming | 
| C. | a Denial of Service (DoS) attack | 
| D. | spoofing | 
| Answer» D. spoofing | |
| 516. | 
                                    A combination of software and information designed to provide security and information for payment is called a what?? | 
                            
| A. | digital wallet | 
| B. | pop up ad | 
| C. | shopping cart | 
| D. | encryption | 
| Answer» B. pop up ad | |
| 517. | 
                                    The most common type of Internet crime according to the IC3 is ______.? | 
                            
| A. | Credit card fraud | 
| B. | Check fraud | 
| C. | Non-delivery | 
| D. | Auction fraud | 
| Answer» E. | |
| 518. | 
                                    Which of the following is an Internet‚Äêbased company that makes it easy for one person to pay another over the Internet?? | 
                            
| A. | electronic check | 
| B. | electronic bill presentment and payment | 
| C. | conversion rates | 
| D. | financial cybermediary | 
| Answer» E. | |
| 519. | 
                                    A security plan begins with a(n) is ______.? | 
                            
| A. | security policy | 
| B. | risk assessment | 
| C. | implementation plan | 
| D. | security organization | 
| Answer» C. implementation plan | |
| 520. | 
                                    When a transaction is processed online, how can the merchant verify the customer's identity?? | 
                            
| A. | use secure sockets layers | 
| B. | use secure electronic transactions | 
| C. | use electronic data interchange | 
| D. | use financial electronic data interchange | 
| Answer» C. use electronic data interchange | |
| 521. | 
                                    E-business can be defined as_______.? | 
                            
| A. | the uninhibited flow of information and goods on the Web | 
| B. | the use of the Internet and the Web to transact business | 
| C. | digitally enabled transactions and processes within an organization | 
| D. | commercial transactions involving electronic goods | 
| Answer» D. commercial transactions involving electronic goods | |
| 522. | 
                                    Which of the following market entry strategies are the most common for existing firms?? | 
                            
| A. | first mover | 
| B. | fast follower | 
| C. | brand extender | 
| D. | alliances | 
| Answer» D. alliances | |
| 523. | 
                                    Which factor determines who has the right to access different types of IT systems and information?? | 
                            
| A. | Availability | 
| B. | Accessibility | 
| C. | Reliability | 
| D. | Scalability | 
| Answer» C. Reliability | |
| 524. | 
                                    __________ influence the behavior of others through their personality, skills, or other factors.? | 
                            
| A. | Opinion leaders | 
| B. | Direct reference groups | 
| C. | Indirect reference groups | 
| D. | Lifestyle groups | 
| Answer» B. Direct reference groups | |
| 525. | 
                                    What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?? | 
                            
| A. | Disaster recovery plan | 
| B. | Hot site | 
| C. | Cold site | 
| D. | Disaster recovery cost curve | 
| Answer» B. Hot site | |
| 526. | 
                                    Digital signature is a. | 
                            
| A. | Digital id,send as an attachment to a web page/e‚Äêmail/message | 
| B. | Is used for verifying the attachments send using web | 
| C. | Both a and b | 
| D. | None of these | 
| Answer» D. None of these | |
| 527. | 
                                    Which of the following describes e‚Äêcommerce?$ | 
                            
| A. | Doing business electronically | 
| B. | Doing business | 
| C. | Sale of goods | 
| D. | All of the above | 
| Answer» B. Doing business | |
| 528. | 
                                    Which of the following refers to creating products tailored to individual customers? | 
                            
| A. | customization | 
| B. | aggregation | 
| C. | Direct materials | 
| D. | Reverse auction | 
| Answer» B. aggregation | |
| 529. | 
                                    What determines the future IT infrastructure requirements for new equipment and additional network capacity? | 
                            
| A. | Flexibility | 
| B. | Performance | 
| C. | Capacity planning | 
| D. | Benchmark | 
| Answer» D. Benchmark | |
| 530. | 
                                    In simple terms, what does risk assessment ask? | 
                            
| A. | What can go wrong? | 
| B. | How likely is it to go wrong? | 
| C. | What are the possible consequences if it does go wrong? | 
| D. | All of the above | 
| Answer» E. | |
| 531. | 
                                    Which of the following an accurate statement about internet phone calls? | 
                            
| A. | They are possible but not yet free | 
| B. | They are not possible | 
| C. | They are currently standard practice | 
| D. | None of the above is an accurate statement about internet phone calls | 
| Answer» B. They are not possible | |
| 532. | 
                                    PaisaPay is offered only by. | 
                            
| A. | Homeshop18.com | 
| B. | eBay.in | 
| C. | amazon.com | 
| D. | none | 
| Answer» C. amazon.com | |
| 533. | 
                                    A _________ is a B2B trading network that links a particular seller with its own trading partners. | 
                            
| A. | bitstream | 
| B. | virtual network | 
| C. | web community | 
| D. | private trading network | 
| Answer» E. | |
| 534. | 
                                    What is a fully‚Äêequipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt?$ | 
                            
| A. | Wearable computer | 
| B. | GPS | 
| C. | Implant chip | 
| D. | None of the above | 
| Answer» B. GPS | |
| 535. | 
                                    The type of Net marketplace characterized by indirect inputs and spot purchasing is called an _______. | 
                            
| A. | industry consortium | 
| B. | independent exchange | 
| C. | e-distributor | 
| D. | e-procurement marketplace | 
| Answer» D. e-procurement marketplace | |
| 536. | 
                                    Which of the following applies to the implementation of an idea? | 
                            
| A. | Copyright | 
| B. | Intellectual property | 
| C. | Patent | 
| D. | Denial‚Äêof‚Äêservice attack | 
| Answer» D. Denial‚Äö√Ñ√™of‚Äö√Ñ√™service attack | |
| 537. | 
                                    Technologies that help enhance resolution of e-book reader display screens are known as _________. | 
                            
| A. | high-res pixel formatting | 
| B. | screen resolution technologies | 
| C. | sub-screen smoothing technologies | 
| D. | sub-pixel display technologies | 
| Answer» E. | |
| 538. | 
                                    Which of the following records logons and deletions? | 
                            
| A. | Key logger | 
| B. | Packet sniffer | 
| C. | Log analysis tools | 
| D. | Screen captures | 
| Answer» D. Screen captures | |
| 539. | 
                                    Which of the following is not considered to be a drawback of Internet auctions? | 
                            
| A. | market inefficiency | 
| B. | trust risks | 
| C. | fulfillment costs | 
| D. | delayed consumption costs | 
| Answer» B. trust risks | |
| 540. | 
                                    Companies can gather information about employees and potential employees from which of the following places? | 
                            
| A. | Job applications | 
| B. | Credit reports | 
| C. | Companies that track Web surfers | 
| D. | All of the above | 
| Answer» E. | |
| 541. | 
                                    Which portal business model best describes Yahoo? | 
                            
| A. | general purpose portal | 
| B. | affinity group based vertical market | 
| C. | focused content based vertical market | 
| D. | none of the above | 
| Answer» B. affinity group based vertical market | |
| 542. | 
                                    What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? | 
                            
| A. | Ethics | 
| B. | Intellectual property | 
| C. | Copyright | 
| D. | Fair Use Doctrine | 
| Answer» D. Fair Use Doctrine | |
| 543. | 
                                    All of the following are potential benefits of B2B e-commerce except_________. | 
                            
| A. | reduced amount of 'first-mover' advantages | 
| B. | decreased product cycle time | 
| C. | increased opportunities for collaborating with suppliers and distributors | 
| D. | increased production flexibility | 
| Answer» B. decreased product cycle time | |
| 544. | 
                                    Secure communication means. | 
                            
| A. | Protect transmission of credit card number | 
| B. | Guarantee privacy of customer | 
| C. | Unauthorized access of payment details | 
| D. | All the above | 
| Answer» E. | |
| 545. | 
                                    Which one is not a server level threat? | 
                            
| A. | Malicious code | 
| B. | CGI threats | 
| C. | Database threats | 
| D. | Buffer overflows | 
| Answer» B. CGI threats | |
| 546. | 
                                    E‚ÄêBanking is also known as.$ | 
                            
| A. | ATMs | 
| B. | Net banking | 
| C. | Traditional banking | 
| D. | None of these | 
| Answer» C. Traditional banking | |
| 547. | 
                                    Which e‚Äêgovernment arena is being used when governmental agencies send out and accept bids for work?$ | 
                            
| A. | G2G¬¨‚Ä ¬¨‚Ä | 
| B. | G2B | 
| C. | G2C | 
| D. | G2G | 
| Answer» C. G2C | |
| 548. | 
                                    Which one is the third party payment providers who offer digital wallets for E‚Äêmerchants?$ | 
                            
| A. | Oxicash | 
| B. | PayMate | 
| C. | PayPass | 
| D. | All the above | 
| Answer» E. | |
| 549. | 
                                    Which of the smart card uses a sim like structure for reading and writing data? | 
                            
| A. | Contact smart card | 
| B. | Contactless smart card | 
| C. | Proximity smart card | 
| D. | Both B and C | 
| Answer» B. Contactless smart card | |
| 550. | 
                                    Which one is not layer of E‚Äêcommerce infrastructure?$ | 
                            
| A. | Physical layer | 
| B. | Product layer | 
| C. | Service layer | 
| D. | None | 
| Answer» E. | |