MCQOPTIONS
Saved Bookmarks
This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 601. |
Social networking sites primarily earn their revenue through _________. |
| A. | advertising |
| B. | subscriptions |
| C. | donations |
| D. | service fees |
| Answer» B. subscriptions | |
| 602. |
Which of the following are ways to prove access rights? |
| A. | What you know, like a password |
| B. | What you have, like an ATM card |
| C. | What you look like |
| D. | All of the above |
| Answer» E. | |
| 603. |
A dynamically priced market that features few buyers and many sellers is a market that exhibits ______. |
| A. | market neutrality |
| B. | buyer bias |
| C. | seller bias |
| D. | owner bias |
| Answer» C. seller bias | |
| 604. |
Which of the following is not a dimension of privacy? |
| A. | Need for personal space |
| B. | Need to feel in control of our possessions |
| C. | Need to feel in control of our personal information |
| D. | All of the above are dimensions of privacy |
| Answer» E. | |
| 605. |
Which of the following best describes predicted growth in C2C and B2C auction spending? |
| A. | B2C spending will overtake C2C spending |
| B. | Both types of spending will increase |
| C. | C2C spending will decrease while B2C increases |
| D. | Both types of spending will decline at similar rates |
| Answer» C. C2C spending will decrease while B2C increases | |
| 606. |
What might identity thieves do with your identity? |
| A. | Apply for and use credit cards |
| B. | Apply for a loan |
| C. | Change their identity |
| D. | All of the above |
| Answer» E. | |
| 607. |
A materials requirements planning (MRP) system is an example of ______. |
| A. | spot purchasing |
| B. | a multi-tier supply chain |
| C. | a legacy computer system |
| D. | electronic data interchange |
| Answer» D. electronic data interchange | |
| 608. |
Cookies are used to do which of the following? |
| A. | Store your ID and password for subsequent logons to the site |
| B. | Store contents of electronic shopping carts |
| C. | To track web activity |
| D. | All of the above and more |
| Answer» E. | |
| 609. |
Which one is threat for E‚Äêcommerce?# |
| A. | Trojan horse |
| B. | firewall |
| C. | encryption |
| D. | None |
| Answer» B. firewall | |
| 610. |
Which one is an encryption technique? |
| A. | RSA |
| B. | DES |
| C. | AES |
| D. | All of the above |
| Answer» E. | |
| 611. |
The protocol which allows the file transfer between computers is. |
| A. | TCP/IP |
| B. | FTP |
| C. | HTTP |
| D. | SOA |
| Answer» C. HTTP | |
| 612. |
Which one is not used as a security mechanism? |
| A. | Encryption |
| B. | Cryptography |
| C. | Wallets |
| D. | Digital signature |
| Answer» D. Digital signature | |
| 613. |
What is C stands in CIA of smart card? |
| A. | confidentiality |
| B. | conference |
| C. | congress |
| D. | None of the above |
| Answer» B. conference | |
| 614. |
‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™¬¨‚Ä card is read only.# |
| A. | Contact smart card |
| B. | Contactless smart card |
| C. | Proximity smart card |
| D. | Both B and C |
| Answer» D. Both B and C | |
| 615. |
What is an arrangement made between e‚Äêcommerce sites that direct users from one site to the other?# |
| A. | Spam |
| B. | Viral marketing |
| C. | Affiliate programs |
| D. | None of the above |
| Answer» D. None of the above | |
| 616. |
which one is not an E‚Äêpayment method used in India?# |
| A. | Debit card |
| B. | Credit card |
| C. | e‚Äêcheque |
| D. | none |
| Answer» E. | |
| 617. |
Industry structure is defined as __________. |
| A. | the nature of the players in an industry and their relative bargaining power |
| B. | a set of plans for achieving long term returns on the capital invested in a business firm |
| C. | set of planned activities designed to result in a profit in a marketplace |
| D. | how a company's product or service fulfills the needs of customers |
| Answer» B. a set of plans for achieving long term returns on the capital invested in a business firm | |
| 618. |
All of the following are technologies used to gather information about you online except ______. |
| A. | spy ware |
| B. | cookies |
| C. | Gmail |
| D. | anonymizers |
| Answer» E. | |
| 619. |
Which products are people most likely to be more uncomfortable buying on the Internet? |
| A. | Books |
| B. | Furniture |
| C. | Movies |
| D. | All of the above¬¨‚Ä ¬¨‚Ä |
| Answer» C. Movies | |
| 620. |
All of the following are major B2C business models except ______. |
| A. | content provider |
| B. | industry consortium |
| C. | transaction broker |
| D. | service provider |
| Answer» C. transaction broker | |
| 621. |
What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? |
| A. | B2B marketplace |
| B. | Intranet |
| C. | Reverse auction |
| D. | Internet |
| Answer» D. Internet | |
| 622. |
The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the actual delivery of packets is ________. |
| A. | TCP |
| B. | IP |
| C. | the Network Layer |
| D. | the Application Layer |
| Answer» C. the Network Layer | |
| 623. |
Which of the following is not a horizontal portal? |
| A. | AOL |
| B. | Yahoo |
| C. | Sailnet |
| D. | MSN/Windows Live |
| Answer» D. MSN/Windows Live | |
| 624. |
Which segment do eBay, Amazon.com belong? |
| A. | B2Bs |
| B. | B2Cs |
| C. | C2Bs |
| D. | C2Cs |
| Answer» C. C2Bs | |
| 625. |
If the threat of substitute products or services is low it is a(n): |
| A. | Disadvantage to the supplier |
| B. | Advantage to the buyer |
| C. | Advantage to the supplier |
| D. | None of the above |
| Answer» D. None of the above | |
| 626. |
Which of the following is not a limitation of the current Internet? |
| A. | insufficient capacity throughout the backbone |
| B. | network architecture limitations |
| C. | insufficient reach |
| D. | best-efforts QOS |
| Answer» D. best-efforts QOS | |
| 627. |
Which of the following is a useful security mechanism when considering business strategy and IT? |
| A. | encryption |
| B. | decryption |
| C. | firewall |
| D. | all the above |
| Answer» E. | |
| 628. |
Internet users account for about ________ of the world's population. |
| A. | 0.07 |
| B. | 0.17 |
| C. | 0.27 |
| D. | 0.47 |
| Answer» C. 0.27 | |
| 629. |
How the transactions occur in e‚Äêcommerce?# |
| A. | Using e‚Äêmedias |
| B. | Using computers only |
| C. | Using mobile phones only |
| D. | None of the above |
| Answer» B. Using computers only | |