MCQOPTIONS
Saved Bookmarks
This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Which of the following is not a common approach to phishing? |
| A. | end an official‐looking e‐mail asking for confidential information |
| B. | sk people to fill out and return a fake letter using postal mail |
| C. | sk people to click a link in an e‐mail to open a submission form on a web page |
| D. | ll of the above are uncommon approaches to phishing |
| Answer» C. sk people to click a link in an e‐mail to open a submission form on a web page | |
| 52. |
Which of the following examines information passing through switches, hubs, or routers? |
| A. | ey logger |
| B. | acket sniffer |
| C. | og analysis tools |
| D. | creen captures |
| Answer» C. og analysis tools | |
| 53. |
The marketplace for auction sites is best described as __________. |
| A. | any sites attaining similar levels of profitability |
| B. | asy to enter due to minimal barriers |
| C. | opulated mostly with small, thriving specialty sites |
| D. | ominated by a handful of sites with established networks |
| Answer» E. | |
| 54. |
Which of the following captures screen images? |
| A. | ey logger |
| B. | acket sniffer |
| C. | og analysis tools |
| D. | creen capture software |
| Answer» E. | |
| 55. |
Auction sites like eBay tend to use _______ pricing. |
| A. | ynamic |
| B. | ixed |
| C. | rigger |
| D. | tilization |
| Answer» B. ixed | |
| 56. |
When you purchase copyrighted software, what actually are you paying for? |
| A. | he cost of the CDs, manuals, and development of the software |
| B. | he cost of the CDs, manuals, and a share of the cost of the software development |
| C. | share of the cost of software development |
| D. | ll of the above |
| Answer» E. | |
| 57. |
The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________. |
| A. | eneral community |
| B. | ractice network |
| C. | ffinity community |
| D. | nterest-based social network |
| Answer» E. | |
| 58. |
Which of the following is not a primary function of a portal? |
| A. | avigation of the Web |
| B. | ocial networking |
| C. | ommerce |
| D. | ontent |
| Answer» C. ommerce | |
| 59. |
E‐mail messages may be stored on which of the following computers? |
| A. | ender's computer |
| B. | ender's server |
| C. | ecipient's server |
| D. | ll of the above |
| Answer» E. | |
| 60. |
The most popular type of auction on eBay is the _________. |
| A. | utch Internet auction |
| B. | ame Your Own Price auction |
| C. | nglish auction |
| D. | rofessional service auction |
| Answer» D. rofessional service auction | |
| 61. |
Which is the most important component of IT? |
| A. | nformation |
| B. | eople |
| C. | nformation technology |
| D. | omputers |
| Answer» C. nformation technology | |
| 62. |
All of the following are characteristics of a social network except _______. |
| A. | nvolves a group of people |
| B. | eatures shared social interaction |
| C. | lways feature shared goals and purposes |
| D. | ommon ties among members |
| Answer» D. ommon ties among members | |
| 63. |
Which item can a password be used to protect? |
| A. | etwork |
| B. | ile |
| C. | older |
| D. | ll of the above |
| Answer» E. | |
| 64. |
Which one is also known as plastic money? |
| A. | redit card |
| B. | ebit card |
| C. | aper cash |
| D. | ll of the above |
| Answer» B. ebit card | |
| 65. |
Which of the following can be used to help identify people in a crowd? |
| A. | iochip |
| B. | mplant chip |
| C. | acial recognition software |
| D. | ision chip |
| Answer» D. ision chip | |
| 66. |
What are the most commonly used input devices today? |
| A. | eyboard |
| B. | ouse |
| C. | ll of the above |
| D. | one of the above |
| Answer» D. one of the above | |
| 67. |
A website offering content created by third party transparently to customers is an example of ________. |
| A. | eintermediation |
| B. | yndication |
| C. | irtual Manufacturing |
| D. | uild-to-order |
| Answer» C. irtual Manufacturing | |
| 68. |
The E‐payment mechanism widely used in B2B is. |
| A. | redit card |
| B. | ebit card |
| C. | aster card |
| D. | ‐cheque |
| Answer» E. | |
| 69. |
Why would a merchant want to customize products? |
| A. | o charge a higher price |
| B. | o decrease costs |
| C. | t is required in EC |
| D. | ustomers will only accept customized products |
| Answer» B. o decrease costs | |
| 70. |
Trust card is introduced by. |
| A. | SNL and itzcash |
| B. | SNL and oxicash |
| C. | SNL only |
| D. | one |
| Answer» B. SNL and oxicash | |
| 71. |
The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website. |
| A. | arketing |
| B. | lick-and-mortar |
| C. | ustomer service |
| D. | orporate |
| Answer» E. | |
| 72. |
Smart card is better protected than other cards using. |
| A. | ncryption |
| B. | irewall |
| C. | ub |
| D. | ll the above |
| Answer» B. irewall | |
| 73. |
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as ________. |
| A. | usiness to Business (B2B) |
| B. | onsumer to Consumer (C2C) |
| C. | onsumer to Business (C2B) |
| D. | usiness to Consumer (B2C) |
| Answer» D. usiness to Consumer (B2C) | |
| 74. |
What is a technology‐enabled microchip implanted into the human body? |
| A. | earable computer |
| B. | PS |
| C. | mplant chip |
| D. | one of the above |
| Answer» D. one of the above | |
| 75. |
Which of the following is not one of the benefits of e-commerce to sellers? |
| A. | -commerce offers greater flexibility in meeting customer needs |
| B. | -commerce is a powerful tool for customer relationship building |
| C. | -commerce can help to reduce costs |
| D. | -commerce increases the net cost per contact |
| Answer» E. | |
| 76. |
What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt? |
| A. | earable computer |
| B. | PS |
| C. | mplant chip |
| D. | one of the above |
| Answer» B. PS | |
| 77. |
What is an electronic representation of cash? |
| A. | igital cash |
| B. | lectronic cash |
| C. | ‐cash |
| D. | ll of the above |
| Answer» E. | |
| 78. |
The most common and easily understood type of Net marketplace is ______. |
| A. | -procurement marketplace |
| B. | -distributors |
| C. | ndustry consortia |
| D. | ndependent exchanges |
| Answer» C. ndustry consortia | |
| 79. |
What is software you don't want hidden inside a software? |
| A. | dware |
| B. | rojan‐horse software |
| C. | pyware |
| D. | ll of the above |
| Answer» E. | |
| 80. |
Which of the following is not an entertainment industry value chain model? |
| A. | ontent owner direct model |
| B. | ser distribution model |
| C. | ggregator model |
| D. | nternet innovator model |
| Answer» C. ggregator model | |
| 81. |
Which of the following is a characteristic of a firewall? |
| A. | xamines each message as it seeks entrance to the network |
| B. | locks messages without the correct markings from entering the network |
| C. | etects computers communicating with the Internet without approval |
| D. | ll of the above |
| Answer» E. | |
| 82. |
After television, the next largest major player in the commercial entertainment industry is _________. |
| A. | ideo games |
| B. | usic |
| C. | adio |
| D. | ilm |
| Answer» E. | |
| 83. |
Products are made to prior to orders received based on estimated demand under a _________. |
| A. | upply-push model |
| B. | emand-push model |
| C. | upply-pull model |
| D. | emand-pull model |
| Answer» B. emand-push model | |
| 84. |
What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? |
| A. | omputer virus |
| B. | orm |
| C. | enial‐of‐service attack |
| D. | one of the above |
| Answer» E. | |
| 85. |
Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry? |
| A. | arriers to entry |
| B. | ower of suppliers |
| C. | ower of consumers |
| D. | ndustry value chain |
| Answer» B. ower of suppliers | |
| 86. |
What floods a Web site with so many requests for service that it slows down or crashes? |
| A. | omputer virus |
| B. | orm |
| C. | enial‐of‐service attack |
| D. | one of the above |
| Answer» D. one of the above | |
| 87. |
Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus? |
| A. | dt.org |
| B. | rivacyInternational.org |
| C. | pic.org |
| D. | rivacy.org |
| Answer» B. rivacyInternational.org | |
| 88. |
ERP stands for. |
| A. | nterprise resolution planning |
| B. | nterprise reverse planning |
| C. | nterprise resource planning |
| D. | one of the above |
| Answer» D. one of the above | |
| 89. |
All of the following are acts Congress has passed or attempted to pass to protect children online except __________. |
| A. | ideo Privacy Protection Act |
| B. | hildren's Online Protection Act |
| C. | ommunications Decency Act |
| D. | hildren's Internet Protection Act |
| Answer» B. hildren's Online Protection Act | |
| 90. |
What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about? |
| A. | eb log |
| B. | lickstream |
| C. | nonymous Web browsing service |
| D. | one of the above |
| Answer» E. | |
| 91. |
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? |
| A. | omputer virus |
| B. | orm |
| C. | enial‐of‐service attack |
| D. | one of the above |
| Answer» C. enial‐of‐service attack | |
| 92. |
All of the following are types of intellectual property protection except_______. |
| A. | atents |
| B. | rademarks |
| C. | overnance |
| D. | opyrights |
| Answer» D. opyrights | |
| 93. |
What is the first step in a P3P-enabled transaction? |
| A. | end Web page |
| B. | ttp GET request Web page |
| C. | end P3P policy files |
| D. | ttp GET request P3P policy files |
| Answer» C. end P3P policy files | |
| 94. |
Who breaks into other people's computer systems and steals and destroys information? |
| A. | ackers |
| B. | oftwares |
| C. | acktivists |
| D. | cript kiddies |
| Answer» B. oftwares | |
| 95. |
The redirection of traffic from a legitimate site to an infringing site is called _______. |
| A. | yber squatting |
| B. | yber piracy |
| C. | eta tagging |
| D. | ey wording |
| Answer» C. eta tagging | |
| 96. |
Who protects system from external threats? |
| A. | irewall |
| B. | DI |
| C. | RP |
| D. | cript kiddies |
| Answer» B. DI | |
| 97. |
The number of business methods patents granted is ___________ compared to the number of patents applied for. |
| A. | ubstantially smaller |
| B. | lightly smaller |
| C. | lose to equal |
| D. | qual |
| Answer» B. lightly smaller | |
| 98. |
A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years. |
| A. | 0 |
| B. | 0 |
| C. | 0 |
| D. | 0 |
| Answer» C. 0 | |
| 99. |
Which process is used to reinstall data from a copy when the original data has been lost? |
| A. | ackup |
| B. | ecovery |
| C. | enchmarking |
| D. | ata cleansing |
| Answer» C. enchmarking | |
| 100. |
The __________ is the first major effort to adjust the copyright laws to the Internet age. |
| A. | latform for Privacy Preferences (P3P) |
| B. | enter for Democracy and Technology |
| C. | igital Millennium Copyright Act (DMCA) |
| D. | -Government Act of 2002 |
| Answer» D. -Government Act of 2002 | |