Explore topic-wise MCQs in Commerce.

This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.

51.

Which of the following is not a common approach to phishing?

A. end an official‐looking e‐mail asking for confidential information
B. sk people to fill out and return a fake letter using postal mail
C. sk people to click a link in an e‐mail to open a submission form on a web page
D. ll of the above are uncommon approaches to phishing
Answer» C. sk people to click a link in an e‐mail to open a submission form on a web page
52.

Which of the following examines information passing through switches, hubs, or routers?

A. ey logger
B. acket sniffer
C. og analysis tools
D. creen captures
Answer» C. og analysis tools
53.

The marketplace for auction sites is best described as __________.

A. any sites attaining similar levels of profitability
B. asy to enter due to minimal barriers
C. opulated mostly with small, thriving specialty sites
D. ominated by a handful of sites with established networks
Answer» E.
54.

Which of the following captures screen images?

A. ey logger
B. acket sniffer
C. og analysis tools
D. creen capture software
Answer» E.
55.

Auction sites like eBay tend to use _______ pricing.

A. ynamic
B. ixed
C. rigger
D. tilization
Answer» B. ixed
56.

When you purchase copyrighted software, what actually are you paying for?

A. he cost of the CDs, manuals, and development of the software
B. he cost of the CDs, manuals, and a share of the cost of the software development
C. share of the cost of software development
D. ll of the above
Answer» E.
57.

The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.

A. eneral community
B. ractice network
C. ffinity community
D. nterest-based social network
Answer» E.
58.

Which of the following is not a primary function of a portal?

A. avigation of the Web
B. ocial networking
C. ommerce
D. ontent
Answer» C. ommerce
59.

E‐mail messages may be stored on which of the following computers?

A. ender's computer
B. ender's server
C. ecipient's server
D. ll of the above
Answer» E.
60.

The most popular type of auction on eBay is the _________.

A. utch Internet auction
B. ame Your Own Price auction
C. nglish auction
D. rofessional service auction
Answer» D. rofessional service auction
61.

Which is the most important component of IT?

A. nformation
B. eople
C. nformation technology
D. omputers
Answer» C. nformation technology
62.

All of the following are characteristics of a social network except _______.

A. nvolves a group of people
B. eatures shared social interaction
C. lways feature shared goals and purposes
D. ommon ties among members
Answer» D. ommon ties among members
63.

Which item can a password be used to protect?

A. etwork
B. ile
C. older
D. ll of the above
Answer» E.
64.

Which one is also known as plastic money?

A. redit card
B. ebit card
C. aper cash
D. ll of the above
Answer» B. ebit card
65.

Which of the following can be used to help identify people in a crowd?

A. iochip
B. mplant chip
C. acial recognition software
D. ision chip
Answer» D. ision chip
66.

What are the most commonly used input devices today?

A. eyboard
B. ouse
C. ll of the above
D. one of the above
Answer» D. one of the above
67.

A website offering content created by third party transparently to customers is an example of ________.

A. eintermediation
B. yndication
C. irtual Manufacturing
D. uild-to-order
Answer» C. irtual Manufacturing
68.

The E‐payment mechanism widely used in B2B is.

A. redit card
B. ebit card
C. aster card
D. ‐cheque
Answer» E.
69.

Why would a merchant want to customize products?

A. o charge a higher price
B. o decrease costs
C. t is required in EC
D. ustomers will only accept customized products
Answer» B. o decrease costs
70.

Trust card is introduced by.

A. SNL and itzcash
B. SNL and oxicash
C. SNL only
D. one
Answer» B. SNL and oxicash
71.

The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website.

A. arketing
B. lick-and-mortar
C. ustomer service
D. orporate
Answer» E.
72.

Smart card is better protected than other cards using.

A. ncryption
B. irewall
C. ub
D. ll the above
Answer» B. irewall
73.

The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as ________.

A. usiness to Business (B2B)
B. onsumer to Consumer (C2C)
C. onsumer to Business (C2B)
D. usiness to Consumer (B2C)
Answer» D. usiness to Consumer (B2C)
74.

What is a technology‐enabled microchip implanted into the human body?

A. earable computer
B. PS
C. mplant chip
D. one of the above
Answer» D. one of the above
75.

Which of the following is not one of the benefits of e-commerce to sellers?

A. -commerce offers greater flexibility in meeting customer needs
B. -commerce is a powerful tool for customer relationship building
C. -commerce can help to reduce costs
D. -commerce increases the net cost per contact
Answer» E.
76.

What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt?

A. earable computer
B. PS
C. mplant chip
D. one of the above
Answer» B. PS
77.

What is an electronic representation of cash?

A. igital cash
B. lectronic cash
C. ‐cash
D. ll of the above
Answer» E.
78.

The most common and easily understood type of Net marketplace is ______.

A. -procurement marketplace
B. -distributors
C. ndustry consortia
D. ndependent exchanges
Answer» C. ndustry consortia
79.

What is software you don't want hidden inside a software?

A. dware
B. rojan‐horse software
C. pyware
D. ll of the above
Answer» E.
80.

Which of the following is not an entertainment industry value chain model?

A. ontent owner direct model
B. ser distribution model
C. ggregator model
D. nternet innovator model
Answer» C. ggregator model
81.

Which of the following is a characteristic of a firewall?

A. xamines each message as it seeks entrance to the network
B. locks messages without the correct markings from entering the network
C. etects computers communicating with the Internet without approval
D. ll of the above
Answer» E.
82.

After television, the next largest major player in the commercial entertainment industry is _________.

A. ideo games
B. usic
C. adio
D. ilm
Answer» E.
83.

Products are made to prior to orders received based on estimated demand under a _________.

A. upply-push model
B. emand-push model
C. upply-pull model
D. emand-pull model
Answer» B. emand-push model
84.

What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?

A. omputer virus
B. orm
C. enial‐of‐service attack
D. one of the above
Answer» E.
85.

Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry?

A. arriers to entry
B. ower of suppliers
C. ower of consumers
D. ndustry value chain
Answer» B. ower of suppliers
86.

What floods a Web site with so many requests for service that it slows down or crashes?

A. omputer virus
B. orm
C. enial‐of‐service attack
D. one of the above
Answer» D. one of the above
87.

Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?

A. dt.org
B. rivacyInternational.org
C. pic.org
D. rivacy.org
Answer» B. rivacyInternational.org
88.

ERP stands for.

A. nterprise resolution planning
B. nterprise reverse planning
C. nterprise resource planning
D. one of the above
Answer» D. one of the above
89.

All of the following are acts Congress has passed or attempted to pass to protect children online except __________.

A. ideo Privacy Protection Act
B. hildren's Online Protection Act
C. ommunications Decency Act
D. hildren's Internet Protection Act
Answer» B. hildren's Online Protection Act
90.

What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?

A. eb log
B. lickstream
C. nonymous Web browsing service
D. one of the above
Answer» E.
91.

What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic?

A. omputer virus
B. orm
C. enial‐of‐service attack
D. one of the above
Answer» C. enial‐of‐service attack
92.

All of the following are types of intellectual property protection except_______.

A. atents
B. rademarks
C. overnance
D. opyrights
Answer» D. opyrights
93.

What is the first step in a P3P-enabled transaction?

A. end Web page
B. ttp GET request Web page
C. end P3P policy files
D. ttp GET request P3P policy files
Answer» C. end P3P policy files
94.

Who breaks into other people's computer systems and steals and destroys information?

A. ackers
B. oftwares
C. acktivists
D. cript kiddies
Answer» B. oftwares
95.

The redirection of traffic from a legitimate site to an infringing site is called _______.

A. yber squatting
B. yber piracy
C. eta tagging
D. ey wording
Answer» C. eta tagging
96.

Who protects system from external threats?

A. irewall
B. DI
C. RP
D. cript kiddies
Answer» B. DI
97.

The number of business methods patents granted is ___________ compared to the number of patents applied for.

A. ubstantially smaller
B. lightly smaller
C. lose to equal
D. qual
Answer» B. lightly smaller
98.

A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.

A. 0
B. 0
C. 0
D. 0
Answer» C. 0
99.

Which process is used to reinstall data from a copy when the original data has been lost?

A. ackup
B. ecovery
C. enchmarking
D. ata cleansing
Answer» C. enchmarking
100.

The __________ is the first major effort to adjust the copyright laws to the Internet age.

A. latform for Privacy Preferences (P3P)
B. enter for Democracy and Technology
C. igital Millennium Copyright Act (DMCA)
D. -Government Act of 2002
Answer» D. -Government Act of 2002