MCQOPTIONS
 Saved Bookmarks
				This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 151. | 
                                    The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? | 
                            
| A. | acking | 
| B. | racking | 
| C. | umpster diving | 
| D. | poofing | 
| Answer» E. | |
| 152. | 
                                    What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors? | 
                            
| A. | S-CERT | 
| B. | ECD | 
| C. | C3 | 
| D. | 3P | 
| Answer» B. ECD | |
| 153. | 
                                    When a transaction is processed online, how can the merchant verify the customer's identity? | 
                            
| A. | se secure sockets layers | 
| B. | se secure electronic transactions | 
| C. | se electronic data interchange | 
| D. | se financial electronic data interchange | 
| Answer» C. se electronic data interchange | |
| 154. | 
                                    Malicious hackers who act with the intention of causing harm are __________. | 
                            
| A. | hite hats | 
| B. | lack hats | 
| C. | rey hats | 
| D. | rown hats | 
| Answer» C. rey hats | |
| 155. | 
                                    Which of the following is a method of transferring money from one person's account to another? | 
                            
| A. | lectronic check | 
| B. | redit card | 
| C. | ‐transfer | 
| D. | one of the above | 
| Answer» B. redit card | |
| 156. | 
                                    A worm is designed to spread _________. | 
                            
| A. | rom computer to computer | 
| B. | rom file to file on a computer | 
| C. | rom Web site to Web site | 
| D. | rom Web site to computer | 
| Answer» B. rom file to file on a computer | |
| 157. | 
                                    Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? | 
                            
| A. | lectronic check | 
| B. | lectronic bill presentment and payment | 
| C. | onversion rates | 
| D. | inancial cybermediary | 
| Answer» E. | |
| 158. | 
                                    All of the following are tools for optimizing a Web site's location in search engine listings except ________. | 
                            
| A. | eywords and page titles | 
| B. | dentifying market niches | 
| C. | uying ads | 
| D. | enchmarking | 
| Answer» E. | |
| 159. | 
                                    Which type of add appears on a web page? | 
                            
| A. | op‐under ad | 
| B. | op‐up ad | 
| C. | anner ad | 
| D. | iscount ad | 
| Answer» D. iscount ad | |
| 160. | 
                                    The ability to change the product to better fit the needs of the customer is called ________. | 
                            
| A. | ustomization | 
| B. | ersonalization | 
| C. | rivacy | 
| D. | ccessibility | 
| Answer» B. ersonalization | |
| 161. | 
                                    Which form of e‐marketplace brings together buyers and sellers from the same industry? | 
                            
| A. | orizontal | 
| B. | ertical | 
| C. | ntegrated | 
| D. | nclined | 
| Answer» C. ntegrated | |
| 162. | 
                                    Which, if any, of the following types of ads are people most willing to tolerate? | 
                            
| A. | op‐under ad | 
| B. | op‐up ad | 
| C. | anner ad | 
| D. | one of the above | 
| Answer» E. | |
| 163. | 
                                    In the e-commerce security environment, which of the following constitutes the inner-most layer? | 
                            
| A. | eople | 
| B. | ata | 
| C. | echnology solutions | 
| D. | rganizational policies and procedures | 
| Answer» C. echnology solutions | |
| 164. | 
                                    What type of ad appears under a web page? | 
                            
| A. | op‐under ad | 
| B. | op‐up ad | 
| C. | anner ad | 
| D. | iscount ad | 
| Answer» B. op‐up ad | |
| 165. | 
                                    The most common type of Internet crime according to the IC3 is ______. | 
                            
| A. | redit card fraud | 
| B. | heck fraud | 
| C. | on-delivery | 
| D. | uction fraud | 
| Answer» E. | |
| 166. | 
                                    Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials? | 
                            
| A. | orizontal | 
| B. | ertical | 
| C. | ntegrated | 
| D. | nclined | 
| Answer» B. ertical | |
| 167. | 
                                    The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _________. | 
                            
| A. | ctive Server Pages (ASP) | 
| B. | ava Server Pages (JSP) | 
| C. | ommon Gateway Interface (CGI) | 
| D. | BScript | 
| Answer» D. BScript | |
| 168. | 
                                    What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? | 
                            
| A. | irect marketplace | 
| B. | 2B | 
| C. | 2C | 
| D. | lectronic marketplace | 
| Answer» E. | |
| 169. | 
                                    Redundant navigation refers to _________. | 
                            
| A. | ages that work, load quickly, and point the customer toward your product offerings | 
| B. | imple, fool-proof navigation | 
| C. | site working with the most popular browsers | 
| D. | lternative navigation to the same content | 
| Answer» E. | |
| 170. | 
                                    Amazon.com is well‐known for which e‐commerce marketing technique? | 
                            
| A. | anner ads | 
| B. | op‐up ads | 
| C. | ffiliate programs | 
| D. | iral marketing | 
| Answer» D. iral marketing | |
| 171. | 
                                    What is a set of conditions used to measure how well a product or system functions? | 
                            
| A. | lexibility | 
| B. | erformance | 
| C. | apacity planning | 
| D. | enchmark | 
| Answer» E. | |
| 172. | 
                                    The set of applications and technologies that allow users to create, edit, and distribute content online is known as______. | 
                            
| A. | nternet | 
| B. | ocial networking | 
| C. | irtual life | 
| D. | eb 2.0 | 
| Answer» E. | |
| 173. | 
                                    Which factor represents a system's ability to change quickly? | 
                            
| A. | lexibility | 
| B. | erformance | 
| C. | apacity planning | 
| D. | enchmark | 
| Answer» B. erformance | |
| 174. | 
                                    E-business can be defined as_______. | 
                            
| A. | he uninhibited flow of information and goods on the Web | 
| B. | he use of the Internet and the Web to transact business | 
| C. | igitally enabled transactions and processes within an organization | 
| D. | ommercial transactions involving electronic goods | 
| Answer» D. ommercial transactions involving electronic goods | |
| 175. | 
                                    All of the following are examples of intelligent agent technology except ________. | 
                            
| A. | utomated response systems | 
| B. | utomatic shipping confirmation | 
| C. | rder status reports | 
| D. | nline web bugs | 
| Answer» E. | |
| 176. | 
                                    Which factor ensures your IT systems are functioning correctly and providing accurate information? | 
                            
| A. | vailability | 
| B. | ccessibility | 
| C. | eliability | 
| D. | calability | 
| Answer» D. calability | |
| 177. | 
                                    Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________. | 
                            
| A. | ersioning | 
| B. | undling | 
| C. | ransactive content | 
| D. | rice discrimination | 
| Answer» B. undling | |
| 178. | 
                                    Which factor determines who has the right to access different types of IT systems and information? | 
                            
| A. | vailability | 
| B. | ccessibility | 
| C. | eliability | 
| D. | calability | 
| Answer» C. eliability | |
| 179. | 
                                    Which factor determines when your IT system will be available for knowledge workers to access? | 
                            
| A. | vailability | 
| B. | ccessibility | 
| C. | eliability | 
| D. | one of the above | 
| Answer» B. ccessibility | |
| 180. | 
                                    The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______. | 
                            
| A. | ffiliate marketing | 
| B. | iral marketing | 
| C. | ermission marketing | 
| D. | log marketing | 
| Answer» C. ermission marketing | |
| 181. | 
                                    What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? | 
                            
| A. | isaster recovery plan | 
| B. | ot site | 
| C. | old site | 
| D. | isaster recovery cost curve | 
| Answer» E. | |
| 182. | 
                                    Which of the following market entry strategies are the most common for existing firms? | 
                            
| A. | irst mover | 
| B. | ast follower | 
| C. | rand extender | 
| D. | lliances | 
| Answer» D. lliances | |
| 183. | 
                                    What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? | 
                            
| A. | lient/server network | 
| B. | ntranet | 
| C. | xtranet | 
| D. | hin client | 
| Answer» D. hin client | |
| 184. | 
                                    A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______. | 
                            
| A. | ommodity | 
| B. | ore product | 
| C. | ctual product | 
| D. | ugmented product | 
| Answer» B. ore product | |
| 185. | 
                                    What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? | 
                            
| A. | lient/server network | 
| B. | ntranet | 
| C. | xtranet | 
| D. | hin client | 
| Answer» C. xtranet | |
| 186. | 
                                    __________ influence the behavior of others through their personality, skills, or other factors. | 
                            
| A. | pinion leaders | 
| B. | irect reference groups | 
| C. | ndirect reference groups | 
| D. | ifestyle groups | 
| Answer» B. irect reference groups | |
| 187. | 
                                    The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a ________. | 
                            
| A. | ardware platform | 
| B. | ontent platform | 
| C. | ransaction platform | 
| D. | calability platform | 
| Answer» B. ontent platform | |
| 188. | 
                                    Materials used in the normal operation of a business but not related to primary business operations are called what? | 
                            
| A. | upplies | 
| B. | irect materials | 
| C. | ndirect materials | 
| D. | aily stuff | 
| Answer» D. aily stuff | |
| 189. | 
                                    What Web server functionality allows it verify usernames and passwords and process certificates and encryption information? | 
                            
| A. | rocessing of HTTP requests | 
| B. | ile Transfer Protocol | 
| C. | ata capture | 
| D. | ecurity services | 
| Answer» E. | |
| 190. | 
                                    All of the following are types of data mining except ______. | 
                            
| A. | elective data mining | 
| B. | uery-driven data mining | 
| C. | odel-driven data mining | 
| D. | ule-based data mining | 
| Answer» B. uery-driven data mining | |
| 191. | 
                                    What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? | 
                            
| A. | isaster recovery plan | 
| B. | ot site | 
| C. | old site | 
| D. | isaster recovery cost curve | 
| Answer» D. isaster recovery cost curve | |
| 192. | 
                                    A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns. | 
                            
| A. | atabase management system | 
| B. | ata warehouse | 
| C. | QL query | 
| D. | elational database | 
| Answer» E. | |
| 193. | 
                                    What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? | 
                            
| A. | isaster recovery plan | 
| B. | ot site | 
| C. | old site | 
| D. | isaster recovery cost curve | 
| Answer» B. ot site | |
| 194. | 
                                    __________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server. | 
                            
| A. | ing | 
| B. | elnet | 
| C. | racert | 
| D. | SL | 
| Answer» B. elnet | |
| 195. | 
                                    Which of the following are advantages normally associated with B2B e‐commerce? | 
                            
| A. | horter cycle times | 
| B. | eduction in costs | 
| C. | eaches wider audiences | 
| D. | ll of the above | 
| Answer» E. | |
| 196. | 
                                    Which protocol permits users to transfer files from the server to their client computer, and vice versa? | 
                            
| A. | TTP | 
| B. | MTP | 
| C. | MAP | 
| D. | TP | 
| Answer» E. | |
| 197. | 
                                    Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues? | 
                            
| A. | 2B | 
| B. | 2C | 
| C. | 2B | 
| D. | 2C | 
| Answer» B. 2C | |
| 198. | 
                                    Most individuals are familiar with which form of e‐commerce? | 
                            
| A. | 2B | 
| B. | 2C | 
| C. | 2B | 
| D. | 2C | 
| Answer» C. 2B | |
| 199. | 
                                    In 1961, __________ published a paper on "packet switching" networks. | 
                            
| A. | eonard Kleinrock | 
| B. | ay Tomlinson | 
| C. | ob Metcalfe | 
| D. | int Cerf | 
| Answer» B. ay Tomlinson | |
| 200. | 
                                    What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? | 
                            
| A. | ustomer relationship management systems cards | 
| B. | ‐government identity cards | 
| C. | EDI cards | 
| D. | mart cards | 
| Answer» E. | |