Explore topic-wise MCQs in Commerce.

This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.

101.

Which process can preventata from lose due to computer problems or human errors?

A. ackup
B. ecovery
C. enchmarking
D. ata cleansing
Answer» B. ecovery
102.

Which service encompasses all technologies used to transmit and process information on an across a network?

A. nteroperability
B. calability
C. enchmarking
D. eb services
Answer» E.
103.

Which of the following statements about privacy is true?

A. t is a moral right to be left alone
B. nly corporations and government need to be concerned about it
C. t has only just recently become a concern
D. t is most easily obtained on the Internet
Answer» B. nly corporations and government need to be concerned about it
104.

Which concept suggests that different applications and computer systems should be able to communicate with one another?

A. ntegration
B. eb services
C. calability
D. nteroperability
Answer» E.
105.

The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.

A. he Golden Rule
B. lippery Slope
C. o Free Lunch
D. niversalism
Answer» E.
106.

As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.

A. emain constant
B. ecrease
C. ncrease
D. apidly increase
Answer» C. ncrease
107.

Which is a function of ERP?

A. arehousing
B. ales
C. cheduling
D. ll of the above
Answer» E.
108.

All of the following are metrics for e-mail campaigns except _________.

A. pen rate
B. elivery rate
C. ounce-back rate
D. art conversion rate
Answer» E.
109.

Which is not a function of ERP?

A. arehousing
B. ales
C. cheduling
D. one of the above
Answer» E.
110.

Which will not a computer resources?

A. irewall
B. irus
C. rojan horse
D. one of the above
Answer» B. irus
111.

Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner?

A. mpression rate
B. iew-through rate
C. lick-through rate
D. tickiness ratio
Answer» D. tickiness ratio
112.

What sends work assignments through an e‐mail system?

A. atabase‐based enterprise information portal
B. essaging‐based enterprise information portal
C. atabase‐based workflow system
D. essaging‐based workflow system
Answer» E.
113.

All of the following are types of social marketing except ______.

A. ffiliate marketing
B. log advertising
C. ocial network advertising
D. ame advertising
Answer» B. log advertising
114.

Which of the following can a virus do?

A. urt your hardware
B. urt any files they weren't designed to attack
C. nfect files on write‐protected disks
D. one of the above
Answer» E.
115.

What is the most commonly offered interactive feature of newspaper Web sites?

A. ideo
B. omments on blogs
C. SS feeds
D. odcasts
Answer» D. odcasts
116.

Which of the following to viruses harm?

A. our keyboard
B. our monitor
C. our processor
D. iruses do not harm any of the above
Answer» E.
117.

The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________.

A. igital rights management
B. igital protection schemes
C. igital distribution regulation
D. igital rights protection
Answer» B. igital protection schemes
118.

The online content revenue model in which free content drives offline revenues is called the _________.

A. arketing model
B. dvertising model
C. ay-per-view model
D. ubscription model
Answer» B. dvertising model
119.

What looks for people on the network who shouldn't be there or who are acting suspiciously?

A. ncryption
B. ublic key encryption
C. ntrusion‐detection software
D. ecurity‐auditing software
Answer» D. ecurity‐auditing software
120.

Which of the following is not a type of media convergence?

A. echnological convergence
B. ontent convergence
C. ndustry convergence
D. ommunity convergence
Answer» E.
121.

What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?

A. ncryption
B. ublic key encryption
C. ntrusion‐detection software
D. ecurity‐auditing software
Answer» C. ntrusion‐detection software
122.

What scrambles the contents of a file so you can't read it without having the right decryption key?

A. ncryption
B. ntrusion‐detection software
C. ecurity‐auditing software
D. ll of the above
Answer» B. ntrusion‐detection software
123.

Which of the following describes paid content's relation to free user-generated content?

A. ree content jeopardizes paid content
B. aid content jeopardizes free content
C. ree content and paid content can both work in tandem cooperatively
D. aid content is viable now but will not be in the future
Answer» D. aid content is viable now but will not be in the future
124.

All of the following are considered biometrics, except:

A. ingerprint
B. etina
C. assword
D. oice
Answer» D. oice
125.

The most popular type of media in terms of total hours of consumption per year is _____.

A. elevision
B. adio
C. nternet
D. ewspaper
Answer» B. adio
126.

What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?

A. ackup
B. nti‐virus
C. irewall
D. iometrics
Answer» E.
127.

What is the process of making a copy of the information stored on a computer?

A. ackup
B. nti‐virus
C. irewall
D. iometrics
Answer» B. nti‐virus
128.

Which of the following is the largest online travel service?

A. ravelocity
B. rbitz
C. riceline
D. xpedia
Answer» E.
129.

What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

A. isk management
B. isk assessment
C. ecurity
D. one of the above
Answer» C. ecurity
130.

The major impact of Internet real estate sites is in ______.

A. ompleting property transactions online
B. nfluencing offline decisions
C. educing commissions
D. -mail marketing to consumers
Answer» C. educing commissions
131.

The majority of job seekers rely on which of the following?

A. ord-of-mouth leads
B. mployment agencies
C. nternet and newspapers equally
D. nternet only
Answer» D. nternet only
132.

What is hardware and/or software that protects computers from intruders?

A. ackup
B. nti‐virus
C. irewall
D. iometrics
Answer» D. iometrics
133.

The largest segment in the recruitment business is________.

A. eneral job recruitment
B. xecutive search
C. pecialized job placement services
D. anagerial recruitment
Answer» B. xecutive search
134.

What software detects and removes or quarantines computer viruses?

A. ackup
B. nti‐virus
C. irewall
D. iometrics
Answer» C. irewall
135.

All of the following are among the most common categories of spam except ______.

A. raud
B. ommercial products
C. inance
D. ealth (drugs)
Answer» B. ommercial products
136.

What automates business processes?

A. orkflow
B. SP
C. orkflow system
D. IP
Answer» D. IP
137.

The fastest growing form of online advertising is _________.

A. anner ads
B. op-up ads
C. ich media/video ads
D. op-under ads
Answer» D. op-under ads
138.

Secure Sockets Layers does which of the following?

A. reates a secure, private connection to a web server
B. ncrypts information
C. ends information over the internet
D. ll of the above
Answer» E.
139.

The only payment system that is instantly convertible without intermediation is _______.

A. redit card
B. ccumulating balance
C. tored value
D. ash
Answer» E.
140.

Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.

A. ncryption, decryption
B. rivate, public
C. ncryption, public
D. ublic, private
Answer» E.
141.

A security plan begins with a(n) is ______.

A. ecurity policy
B. isk assessment
C. mplementation plan
D. ecurity organization
Answer» C. mplementation plan
142.

Firewalls perform all of the following functions except _________.

A. orbids communications from untrustworthy sources
B. llows communications from trustworthy sources
C. liminates viruses and other malicious attacks
D. ilters traffic based on packet attributes
Answer» D. ilters traffic based on packet attributes
143.

What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents?

A. nternet commerce
B. ‐commerce
C. ransaction information transfer
D. lectronic data interchange
Answer» E.
144.

The most common form of securing channels is through ________.

A. -HTTP
B. PNs
C. SL
D. PTP
Answer» D. PTP
145.

A combination of software and information designed to provide security and information for payment is called a what?

A. igital wallet
B. op up ad
C. hopping cart
D. ncryption
Answer» B. op up ad
146.

Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?

A. inancial cybermediary
B. lectronic check
C. lectronic bill presentment and payment
D. ll of the above
Answer» D. ll of the above
147.

Which of the following is not a dimension of e-commerce security provided by encryption?

A. vailability
B. essage integrity
C. onrepudiation
D. onfidentiality
Answer» B. essage integrity
148.

If you need to transfer money to another person via the internet, which of the following methods could you use?

A. inancial cybermediary
B. lectronic check
C. lectronic bill presentment and payment
D. ll of the above
Answer» E.
149.

When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.

A. hishing
B. harming
C. Denial of Service (DoS) attack
D. poofing
Answer» D. poofing
150.

After sending e-mail, which of the following activities is most common among Internet users?

A. ending instant messages
B. eading someone else's blog
C. sing a search engine to find information
D. etting news
Answer» D. etting news