MCQOPTIONS
Saved Bookmarks
This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
Which process can preventata from lose due to computer problems or human errors? |
| A. | ackup |
| B. | ecovery |
| C. | enchmarking |
| D. | ata cleansing |
| Answer» B. ecovery | |
| 102. |
Which service encompasses all technologies used to transmit and process information on an across a network? |
| A. | nteroperability |
| B. | calability |
| C. | enchmarking |
| D. | eb services |
| Answer» E. | |
| 103. |
Which of the following statements about privacy is true? |
| A. | t is a moral right to be left alone |
| B. | nly corporations and government need to be concerned about it |
| C. | t has only just recently become a concern |
| D. | t is most easily obtained on the Internet |
| Answer» B. nly corporations and government need to be concerned about it | |
| 104. |
Which concept suggests that different applications and computer systems should be able to communicate with one another? |
| A. | ntegration |
| B. | eb services |
| C. | calability |
| D. | nteroperability |
| Answer» E. | |
| 105. |
The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________. |
| A. | he Golden Rule |
| B. | lippery Slope |
| C. | o Free Lunch |
| D. | niversalism |
| Answer» E. | |
| 106. |
As consumers become more accustomed to new online advertising formats, click-through rates tend to _______. |
| A. | emain constant |
| B. | ecrease |
| C. | ncrease |
| D. | apidly increase |
| Answer» C. ncrease | |
| 107. |
Which is a function of ERP? |
| A. | arehousing |
| B. | ales |
| C. | cheduling |
| D. | ll of the above |
| Answer» E. | |
| 108. |
All of the following are metrics for e-mail campaigns except _________. |
| A. | pen rate |
| B. | elivery rate |
| C. | ounce-back rate |
| D. | art conversion rate |
| Answer» E. | |
| 109. |
Which is not a function of ERP? |
| A. | arehousing |
| B. | ales |
| C. | cheduling |
| D. | one of the above |
| Answer» E. | |
| 110. |
Which will not a computer resources? |
| A. | irewall |
| B. | irus |
| C. | rojan horse |
| D. | one of the above |
| Answer» B. irus | |
| 111. |
Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner? |
| A. | mpression rate |
| B. | iew-through rate |
| C. | lick-through rate |
| D. | tickiness ratio |
| Answer» D. tickiness ratio | |
| 112. |
What sends work assignments through an e‐mail system? |
| A. | atabase‐based enterprise information portal |
| B. | essaging‐based enterprise information portal |
| C. | atabase‐based workflow system |
| D. | essaging‐based workflow system |
| Answer» E. | |
| 113. |
All of the following are types of social marketing except ______. |
| A. | ffiliate marketing |
| B. | log advertising |
| C. | ocial network advertising |
| D. | ame advertising |
| Answer» B. log advertising | |
| 114. |
Which of the following can a virus do? |
| A. | urt your hardware |
| B. | urt any files they weren't designed to attack |
| C. | nfect files on write‐protected disks |
| D. | one of the above |
| Answer» E. | |
| 115. |
What is the most commonly offered interactive feature of newspaper Web sites? |
| A. | ideo |
| B. | omments on blogs |
| C. | SS feeds |
| D. | odcasts |
| Answer» D. odcasts | |
| 116. |
Which of the following to viruses harm? |
| A. | our keyboard |
| B. | our monitor |
| C. | our processor |
| D. | iruses do not harm any of the above |
| Answer» E. | |
| 117. |
The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________. |
| A. | igital rights management |
| B. | igital protection schemes |
| C. | igital distribution regulation |
| D. | igital rights protection |
| Answer» B. igital protection schemes | |
| 118. |
The online content revenue model in which free content drives offline revenues is called the _________. |
| A. | arketing model |
| B. | dvertising model |
| C. | ay-per-view model |
| D. | ubscription model |
| Answer» B. dvertising model | |
| 119. |
What looks for people on the network who shouldn't be there or who are acting suspiciously? |
| A. | ncryption |
| B. | ublic key encryption |
| C. | ntrusion‐detection software |
| D. | ecurity‐auditing software |
| Answer» D. ecurity‐auditing software | |
| 120. |
Which of the following is not a type of media convergence? |
| A. | echnological convergence |
| B. | ontent convergence |
| C. | ndustry convergence |
| D. | ommunity convergence |
| Answer» E. | |
| 121. |
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? |
| A. | ncryption |
| B. | ublic key encryption |
| C. | ntrusion‐detection software |
| D. | ecurity‐auditing software |
| Answer» C. ntrusion‐detection software | |
| 122. |
What scrambles the contents of a file so you can't read it without having the right decryption key? |
| A. | ncryption |
| B. | ntrusion‐detection software |
| C. | ecurity‐auditing software |
| D. | ll of the above |
| Answer» B. ntrusion‐detection software | |
| 123. |
Which of the following describes paid content's relation to free user-generated content? |
| A. | ree content jeopardizes paid content |
| B. | aid content jeopardizes free content |
| C. | ree content and paid content can both work in tandem cooperatively |
| D. | aid content is viable now but will not be in the future |
| Answer» D. aid content is viable now but will not be in the future | |
| 124. |
All of the following are considered biometrics, except: |
| A. | ingerprint |
| B. | etina |
| C. | assword |
| D. | oice |
| Answer» D. oice | |
| 125. |
The most popular type of media in terms of total hours of consumption per year is _____. |
| A. | elevision |
| B. | adio |
| C. | nternet |
| D. | ewspaper |
| Answer» B. adio | |
| 126. |
What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? |
| A. | ackup |
| B. | nti‐virus |
| C. | irewall |
| D. | iometrics |
| Answer» E. | |
| 127. |
What is the process of making a copy of the information stored on a computer? |
| A. | ackup |
| B. | nti‐virus |
| C. | irewall |
| D. | iometrics |
| Answer» B. nti‐virus | |
| 128. |
Which of the following is the largest online travel service? |
| A. | ravelocity |
| B. | rbitz |
| C. | riceline |
| D. | xpedia |
| Answer» E. | |
| 129. |
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? |
| A. | isk management |
| B. | isk assessment |
| C. | ecurity |
| D. | one of the above |
| Answer» C. ecurity | |
| 130. |
The major impact of Internet real estate sites is in ______. |
| A. | ompleting property transactions online |
| B. | nfluencing offline decisions |
| C. | educing commissions |
| D. | -mail marketing to consumers |
| Answer» C. educing commissions | |
| 131. |
The majority of job seekers rely on which of the following? |
| A. | ord-of-mouth leads |
| B. | mployment agencies |
| C. | nternet and newspapers equally |
| D. | nternet only |
| Answer» D. nternet only | |
| 132. |
What is hardware and/or software that protects computers from intruders? |
| A. | ackup |
| B. | nti‐virus |
| C. | irewall |
| D. | iometrics |
| Answer» D. iometrics | |
| 133. |
The largest segment in the recruitment business is________. |
| A. | eneral job recruitment |
| B. | xecutive search |
| C. | pecialized job placement services |
| D. | anagerial recruitment |
| Answer» B. xecutive search | |
| 134. |
What software detects and removes or quarantines computer viruses? |
| A. | ackup |
| B. | nti‐virus |
| C. | irewall |
| D. | iometrics |
| Answer» C. irewall | |
| 135. |
All of the following are among the most common categories of spam except ______. |
| A. | raud |
| B. | ommercial products |
| C. | inance |
| D. | ealth (drugs) |
| Answer» B. ommercial products | |
| 136. |
What automates business processes? |
| A. | orkflow |
| B. | SP |
| C. | orkflow system |
| D. | IP |
| Answer» D. IP | |
| 137. |
The fastest growing form of online advertising is _________. |
| A. | anner ads |
| B. | op-up ads |
| C. | ich media/video ads |
| D. | op-under ads |
| Answer» D. op-under ads | |
| 138. |
Secure Sockets Layers does which of the following? |
| A. | reates a secure, private connection to a web server |
| B. | ncrypts information |
| C. | ends information over the internet |
| D. | ll of the above |
| Answer» E. | |
| 139. |
The only payment system that is instantly convertible without intermediation is _______. |
| A. | redit card |
| B. | ccumulating balance |
| C. | tored value |
| D. | ash |
| Answer» E. | |
| 140. |
Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key. |
| A. | ncryption, decryption |
| B. | rivate, public |
| C. | ncryption, public |
| D. | ublic, private |
| Answer» E. | |
| 141. |
A security plan begins with a(n) is ______. |
| A. | ecurity policy |
| B. | isk assessment |
| C. | mplementation plan |
| D. | ecurity organization |
| Answer» C. mplementation plan | |
| 142. |
Firewalls perform all of the following functions except _________. |
| A. | orbids communications from untrustworthy sources |
| B. | llows communications from trustworthy sources |
| C. | liminates viruses and other malicious attacks |
| D. | ilters traffic based on packet attributes |
| Answer» D. ilters traffic based on packet attributes | |
| 143. |
What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? |
| A. | nternet commerce |
| B. | ‐commerce |
| C. | ransaction information transfer |
| D. | lectronic data interchange |
| Answer» E. | |
| 144. |
The most common form of securing channels is through ________. |
| A. | -HTTP |
| B. | PNs |
| C. | SL |
| D. | PTP |
| Answer» D. PTP | |
| 145. |
A combination of software and information designed to provide security and information for payment is called a what? |
| A. | igital wallet |
| B. | op up ad |
| C. | hopping cart |
| D. | ncryption |
| Answer» B. op up ad | |
| 146. |
Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? |
| A. | inancial cybermediary |
| B. | lectronic check |
| C. | lectronic bill presentment and payment |
| D. | ll of the above |
| Answer» D. ll of the above | |
| 147. |
Which of the following is not a dimension of e-commerce security provided by encryption? |
| A. | vailability |
| B. | essage integrity |
| C. | onrepudiation |
| D. | onfidentiality |
| Answer» B. essage integrity | |
| 148. |
If you need to transfer money to another person via the internet, which of the following methods could you use? |
| A. | inancial cybermediary |
| B. | lectronic check |
| C. | lectronic bill presentment and payment |
| D. | ll of the above |
| Answer» E. | |
| 149. |
When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______. |
| A. | hishing |
| B. | harming |
| C. | Denial of Service (DoS) attack |
| D. | poofing |
| Answer» D. poofing | |
| 150. |
After sending e-mail, which of the following activities is most common among Internet users? |
| A. | ending instant messages |
| B. | eading someone else's blog |
| C. | sing a search engine to find information |
| D. | etting news |
| Answer» D. etting news | |