Explore topic-wise MCQs in Commerce.

This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.

601.

Social networking sites primarily earn their revenue through _________.

A. advertising
B. subscriptions
C. donations
D. service fees
Answer» B. subscriptions
602.

Which of the following are ways to prove access rights?

A. What you know, like a password
B. What you have, like an ATM card
C. What you look like
D. All of the above
Answer» E.
603.

A dynamically priced market that features few buyers and many sellers is a market that exhibits ______.

A. market neutrality
B. buyer bias
C. seller bias
D. owner bias
Answer» C. seller bias
604.

Which of the following is not a dimension of privacy?

A. Need for personal space
B. Need to feel in control of our possessions
C. Need to feel in control of our personal information
D. All of the above are dimensions of privacy
Answer» E.
605.

Which of the following best describes predicted growth in C2C and B2C auction spending?

A. B2C spending will overtake C2C spending
B. Both types of spending will increase
C. C2C spending will decrease while B2C increases
D. Both types of spending will decline at similar rates
Answer» C. C2C spending will decrease while B2C increases
606.

What might identity thieves do with your identity?

A. Apply for and use credit cards
B. Apply for a loan
C. Change their identity
D. All of the above
Answer» E.
607.

A materials requirements planning (MRP) system is an example of ______.

A. spot purchasing
B. a multi-tier supply chain
C. a legacy computer system
D. electronic data interchange
Answer» D. electronic data interchange
608.

Cookies are used to do which of the following?

A. Store your ID and password for subsequent logons to the site
B. Store contents of electronic shopping carts
C. To track web activity
D. All of the above and more
Answer» E.
609.

Which one is threat for E‚Äêcommerce?#

A. Trojan horse
B. firewall
C. encryption
D. None
Answer» B. firewall
610.

Which one is an encryption technique?

A. RSA
B. DES
C. AES
D. All of the above
Answer» E.
611.

The protocol which allows the file transfer between computers is.

A. TCP/IP
B. FTP
C. HTTP
D. SOA
Answer» C. HTTP
612.

Which one is not used as a security mechanism?

A. Encryption
B. Cryptography
C. Wallets
D. Digital signature
Answer» D. Digital signature
613.

What is C stands in CIA of smart card?

A. confidentiality
B. conference
C. congress
D. None of the above
Answer» B. conference
614.

‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™¬¨‚Ä card is read only.#

A. Contact smart card
B. Contactless smart card
C. Proximity smart card
D. Both B and C
Answer» D. Both B and C
615.

What is an arrangement made between e‚Äêcommerce sites that direct users from one site to the other?#

A. Spam
B. Viral marketing
C. Affiliate programs
D. None of the above
Answer» D. None of the above
616.

which one is not an E‚Äêpayment method used in India?#

A. Debit card
B. Credit card
C. e‚Äêcheque
D. none
Answer» E.
617.

Industry structure is defined as __________.

A. the nature of the players in an industry and their relative bargaining power
B. a set of plans for achieving long term returns on the capital invested in a business firm
C. set of planned activities designed to result in a profit in a marketplace
D. how a company's product or service fulfills the needs of customers
Answer» B. a set of plans for achieving long term returns on the capital invested in a business firm
618.

All of the following are technologies used to gather information about you online except ______.

A. spy ware
B. cookies
C. Gmail
D. anonymizers
Answer» E.
619.

Which products are people most likely to be more uncomfortable buying on the Internet?

A. Books
B. Furniture
C. Movies
D. All of the above¬¨‚Ä ¬¨‚Ä
Answer» C. Movies
620.

All of the following are major B2C business models except ______.

A. content provider
B. industry consortium
C. transaction broker
D. service provider
Answer» C. transaction broker
621.

What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left?

A. B2B marketplace
B. Intranet
C. Reverse auction
D. Internet
Answer» D. Internet
622.

The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is ________.

A. TCP
B. IP
C. the Network Layer
D. the Application Layer
Answer» C. the Network Layer
623.

Which of the following is not a horizontal portal?

A. AOL
B. Yahoo
C. Sailnet
D. MSN/Windows Live
Answer» D. MSN/Windows Live
624.

Which segment do eBay, Amazon.com belong?

A. B2Bs
B. B2Cs
C. C2Bs
D. C2Cs
Answer» C. C2Bs
625.

If the threat of substitute products or services is low it is a(n):

A. Disadvantage to the supplier
B. Advantage to the buyer
C. Advantage to the supplier
D. None of the above
Answer» D. None of the above
626.

Which of the following is not a limitation of the current Internet?

A. insufficient capacity throughout the backbone
B. network architecture limitations
C. insufficient reach
D. best-efforts QOS
Answer» D. best-efforts QOS
627.

Which of the following is a useful security mechanism when considering business strategy and IT?

A. encryption
B. decryption
C. firewall
D. all the above
Answer» E.
628.

Internet users account for about ________ of the world's population.

A. 0.07
B. 0.17
C. 0.27
D. 0.47
Answer» C. 0.27
629.

How the transactions occur in e‚Äêcommerce?#

A. Using e‚Äêmedias
B. Using computers only
C. Using mobile phones only
D. None of the above
Answer» B. Using computers only