Explore topic-wise MCQs in Commerce.

This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.

151.

The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed?

A. acking
B. racking
C. umpster diving
D. poofing
Answer» E.
152.

What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?

A. S-CERT
B. ECD
C. C3
D. 3P
Answer» B. ECD
153.

When a transaction is processed online, how can the merchant verify the customer's identity?

A. se secure sockets layers
B. se secure electronic transactions
C. se electronic data interchange
D. se financial electronic data interchange
Answer» C. se electronic data interchange
154.

Malicious hackers who act with the intention of causing harm are __________.

A. hite hats
B. lack hats
C. rey hats
D. rown hats
Answer» C. rey hats
155.

Which of the following is a method of transferring money from one person's account to another?

A. lectronic check
B. redit card
C. ‐transfer
D. one of the above
Answer» B. redit card
156.

A worm is designed to spread _________.

A. rom computer to computer
B. rom file to file on a computer
C. rom Web site to Web site
D. rom Web site to computer
Answer» B. rom file to file on a computer
157.

Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet?

A. lectronic check
B. lectronic bill presentment and payment
C. onversion rates
D. inancial cybermediary
Answer» E.
158.

All of the following are tools for optimizing a Web site's location in search engine listings except ________.

A. eywords and page titles
B. dentifying market niches
C. uying ads
D. enchmarking
Answer» E.
159.

Which type of add appears on a web page?

A. op‐under ad
B. op‐up ad
C. anner ad
D. iscount ad
Answer» D. iscount ad
160.

The ability to change the product to better fit the needs of the customer is called ________.

A. ustomization
B. ersonalization
C. rivacy
D. ccessibility
Answer» B. ersonalization
161.

Which form of e‐marketplace brings together buyers and sellers from the same industry?

A. orizontal
B. ertical
C. ntegrated
D. nclined
Answer» C. ntegrated
162.

Which, if any, of the following types of ads are people most willing to tolerate?

A. op‐under ad
B. op‐up ad
C. anner ad
D. one of the above
Answer» E.
163.

In the e-commerce security environment, which of the following constitutes the inner-most layer?

A. eople
B. ata
C. echnology solutions
D. rganizational policies and procedures
Answer» C. echnology solutions
164.

What type of ad appears under a web page?

A. op‐under ad
B. op‐up ad
C. anner ad
D. iscount ad
Answer» B. op‐up ad
165.

The most common type of Internet crime according to the IC3 is ______.

A. redit card fraud
B. heck fraud
C. on-delivery
D. uction fraud
Answer» E.
166.

Which form of e‐marketplace brings together buyers and sellers from multiple industries, often for MRO materials?

A. orizontal
B. ertical
C. ntegrated
D. nclined
Answer» B. ertical
167.

The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _________.

A. ctive Server Pages (ASP)
B. ava Server Pages (JSP)
C. ommon Gateway Interface (CGI)
D. BScript
Answer» D. BScript
168.

What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities?

A. irect marketplace
B. 2B
C. 2C
D. lectronic marketplace
Answer» E.
169.

Redundant navigation refers to _________.

A. ages that work, load quickly, and point the customer toward your product offerings
B. imple, fool-proof navigation
C. site working with the most popular browsers
D. lternative navigation to the same content
Answer» E.
170.

Amazon.com is well‐known for which e‐commerce marketing technique?

A. anner ads
B. op‐up ads
C. ffiliate programs
D. iral marketing
Answer» D. iral marketing
171.

What is a set of conditions used to measure how well a product or system functions?

A. lexibility
B. erformance
C. apacity planning
D. enchmark
Answer» E.
172.

The set of applications and technologies that allow users to create, edit, and distribute content online is known as______.

A. nternet
B. ocial networking
C. irtual life
D. eb 2.0
Answer» E.
173.

Which factor represents a system's ability to change quickly?

A. lexibility
B. erformance
C. apacity planning
D. enchmark
Answer» B. erformance
174.

E-business can be defined as_______.

A. he uninhibited flow of information and goods on the Web
B. he use of the Internet and the Web to transact business
C. igitally enabled transactions and processes within an organization
D. ommercial transactions involving electronic goods
Answer» D. ommercial transactions involving electronic goods
175.

All of the following are examples of intelligent agent technology except ________.

A. utomated response systems
B. utomatic shipping confirmation
C. rder status reports
D. nline web bugs
Answer» E.
176.

Which factor ensures your IT systems are functioning correctly and providing accurate information?

A. vailability
B. ccessibility
C. eliability
D. calability
Answer» D. calability
177.

Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________.

A. ersioning
B. undling
C. ransactive content
D. rice discrimination
Answer» B. undling
178.

Which factor determines who has the right to access different types of IT systems and information?

A. vailability
B. ccessibility
C. eliability
D. calability
Answer» C. eliability
179.

Which factor determines when your IT system will be available for knowledge workers to access?

A. vailability
B. ccessibility
C. eliability
D. one of the above
Answer» B. ccessibility
180.

The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.

A. ffiliate marketing
B. iral marketing
C. ermission marketing
D. log marketing
Answer» C. ermission marketing
181.

What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?

A. isaster recovery plan
B. ot site
C. old site
D. isaster recovery cost curve
Answer» E.
182.

Which of the following market entry strategies are the most common for existing firms?

A. irst mover
B. ast follower
C. rand extender
D. lliances
Answer» D. lliances
183.

What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?

A. lient/server network
B. ntranet
C. xtranet
D. hin client
Answer» D. hin client
184.

A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______.

A. ommodity
B. ore product
C. ctual product
D. ugmented product
Answer» B. ore product
185.

What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?

A. lient/server network
B. ntranet
C. xtranet
D. hin client
Answer» C. xtranet
186.

__________ influence the behavior of others through their personality, skills, or other factors.

A. pinion leaders
B. irect reference groups
C. ndirect reference groups
D. ifestyle groups
Answer» B. irect reference groups
187.

The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a ________.

A. ardware platform
B. ontent platform
C. ransaction platform
D. calability platform
Answer» B. ontent platform
188.

Materials used in the normal operation of a business but not related to primary business operations are called what?

A. upplies
B. irect materials
C. ndirect materials
D. aily stuff
Answer» D. aily stuff
189.

What Web server functionality allows it verify usernames and passwords and process certificates and encryption information?

A. rocessing of HTTP requests
B. ile Transfer Protocol
C. ata capture
D. ecurity services
Answer» E.
190.

All of the following are types of data mining except ______.

A. elective data mining
B. uery-driven data mining
C. odel-driven data mining
D. ule-based data mining
Answer» B. uery-driven data mining
191.

What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?

A. isaster recovery plan
B. ot site
C. old site
D. isaster recovery cost curve
Answer» D. isaster recovery cost curve
192.

A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.

A. atabase management system
B. ata warehouse
C. QL query
D. elational database
Answer» E.
193.

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

A. isaster recovery plan
B. ot site
C. old site
D. isaster recovery cost curve
Answer» B. ot site
194.

__________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server.

A. ing
B. elnet
C. racert
D. SL
Answer» B. elnet
195.

Which of the following are advantages normally associated with B2B e‐commerce?

A. horter cycle times
B. eduction in costs
C. eaches wider audiences
D. ll of the above
Answer» E.
196.

Which protocol permits users to transfer files from the server to their client computer, and vice versa?

A. TTP
B. MTP
C. MAP
D. TP
Answer» E.
197.

Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues?

A. 2B
B. 2C
C. 2B
D. 2C
Answer» B. 2C
198.

Most individuals are familiar with which form of e‐commerce?

A. 2B
B. 2C
C. 2B
D. 2C
Answer» C. 2B
199.

In 1961, __________ published a paper on "packet switching" networks.

A. eonard Kleinrock
B. ay Tomlinson
C. ob Metcalfe
D. int Cerf
Answer» B. ay Tomlinson
200.

What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?

A. ustomer relationship management systems cards
B. ‐government identity cards
C. EDI cards
D. mart cards
Answer» E.