MCQOPTIONS
 Saved Bookmarks
				This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 201. | 
                                    A strategy designed to compete in all markets around the globe is called a _________ strategy. | 
                            
| A. | cope | 
| B. | ifferentiation | 
| C. | ost | 
| D. | ocus | 
| Answer» B. ifferentiation | |
| 202. | 
                                    What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities? | 
                            
| A. | irect materials | 
| B. | ndirect materials | 
| C. | DI | 
| D. | one of the above | 
| Answer» C. DI | |
| 203. | 
                                    A situation where there are no differences among products or services, and the only basis of choosing products is price is known as _________. | 
                            
| A. | value web | 
| B. | alue chain | 
| C. | rofit | 
| D. | ommoditization | 
| Answer» E. | |
| 204. | 
                                    What is the percentage of customers who visit a Web site and actually buy something called? | 
                            
| A. | ffiliate programs | 
| B. | lick‐through | 
| C. | pam | 
| D. | onversion rate | 
| Answer» E. | |
| 205. | 
                                    A perfect market is one in which __________. | 
                            
| A. | ne firm develops an advantage based on a factor of production that other firms cannot purchase | 
| B. | ne participant in the market has more resources than the others | 
| C. | here are no competitive advantages or asymmetries because all firms have equal access to all the factors to production | 
| D. | ompetition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage | 
| Answer» D. ompetition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage | |
| 206. | 
                                    Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? | 
                            
| A. | ffiliate programs | 
| B. | lick‐through | 
| C. | pam | 
| D. | ll of the above | 
| Answer» C. pam | |
| 207. | 
                                    Compared to Internet users, the number of cell phone subscribers is _________. | 
                            
| A. | bout the same | 
| B. | lightly fewer | 
| C. | uch fewer | 
| D. | uch larger | 
| Answer» E. | |
| 208. | 
                                    All of the following are techniques B2C e‐commerce companies use to attract customers, except: | 
                            
| A. | egistering with search engines | 
| B. | iral marketing | 
| C. | nline ads | 
| D. | irtual marketing | 
| Answer» E. | |
| 209. | 
                                    The _________ business model involves an independently owned vertical digital marketplace for direct inputs. | 
                            
| A. | -distributor | 
| B. | xchange | 
| C. | -procurement | 
| D. | rivate industrial network | 
| Answer» C. -procurement | |
| 210. | 
                                    Which of the following is not a key element of a business model? | 
                            
| A. | alue proposition | 
| B. | ompetitive advantage | 
| C. | arket strategy | 
| D. | niversal standards | 
| Answer» E. | |
| 211. | 
                                    The best products to sell in B2C e‐commerce are: | 
                            
| A. | mall products | 
| B. | igital products | 
| C. | pecialty products | 
| D. | resh products | 
| Answer» C. pecialty products | |
| 212. | 
                                    A _________ is the set of planned activities designed to result in a profit in a marketplace. | 
                            
| A. | usiness model | 
| B. | rofit model | 
| C. | usiness plan | 
| D. | evenue model | 
| Answer» B. rofit model | |
| 213. | 
                                    Which segment is eBay an example? | 
                            
| A. | 2B | 
| B. | 2B | 
| C. | 2C | 
| D. | one of the above | 
| Answer» E. | |
| 214. | 
                                    The primary source of financing during the early years of e-commerce was _______. | 
                            
| A. | ank loans | 
| B. | arge retail firms | 
| C. | enture capital funds | 
| D. | nitial public offerings | 
| Answer» D. nitial public offerings | |
| 215. | 
                                    Which type of e‐commerce focuses on consumers dealing with each other? | 
                            
| A. | 2B | 
| B. | 2C | 
| C. | 2B | 
| D. | 2C | 
| Answer» E. | |
| 216. | 
                                    A business competing in a commodity like environment must focus on which of the following? | 
                            
| A. | rice | 
| B. | ase / speed of delivery | 
| C. | ase of ordering | 
| D. | ll of the above | 
| Answer» E. | |
| 217. | 
                                    All of the following are factors in optimizing Web site performance except _________. | 
                            
| A. | age retrieval | 
| B. | age generation | 
| C. | age delivery | 
| D. | age content | 
| Answer» B. age generation | |
| 218. | 
                                    Which type of products is lesser purchased using eCommerce? | 
                            
| A. | utomobiles | 
| B. | ooks | 
| C. | oftwares | 
| D. | one | 
| Answer» B. ooks | |
| 219. | 
                                    How the transactions occur in e‐commerce? | 
                            
| A. | sing e‐medias | 
| B. | sing computers only | 
| C. | sing mobile phones only | 
| D. | one of the above | 
| Answer» B. sing computers only | |
| 220. | 
                                    Digital products are best suited for B2C e‐commerce because they: | 
                            
| A. | re commodity like products | 
| B. | an be mass‐customized and personalized | 
| C. | an be delivered at the time of purchase | 
| D. | ll of the above | 
| Answer» E. | |
| 221. | 
                                    Which of the following is an example of a portal? | 
                            
| A. | mazon | 
| B. | Bay | 
| C. | ahoo | 
| D. | ace book | 
| Answer» D. ace book | |
| 222. | 
                                    Which products are people most likely to be comfortable buying on the Internet? | 
                            
| A. | ooks | 
| B. | Cs | 
| C. | Ds | 
| D. | ll of the above | 
| Answer» E. | |
| 223. | 
                                    All of the following are steps in the systems development life cycle except ______. | 
                            
| A. | ystems Design | 
| B. | esting | 
| C. | mplementation | 
| D. | ebugging | 
| Answer» E. | |
| 224. | 
                                    A business cannot be all things to all people. Instead, a business must: | 
                            
| A. | dentify target customers | 
| B. | dentify the value of products/services as perceived by customers | 
| C. | ll of the above | 
| D. | one of the above | 
| Answer» D. one of the above | |
| 225. | 
                                    Which of the following was the first commercial Web browser? | 
                            
| A. | osaic | 
| B. | ozilla | 
| C. | etscape Navigator | 
| D. | nternet Explorer | 
| Answer» D. nternet Explorer | |
| 226. | 
                                    A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? | 
                            
| A. | witching costs | 
| B. | oyalty programs | 
| C. | ntry barriers | 
| D. | ffiliate programs | 
| Answer» D. ffiliate programs | |
| 227. | 
                                    All of the following are wireless Internet access network technologies except ________. | 
                            
| A. | i-Fi | 
| B. | luetooth | 
| C. | igbee | 
| D. | igaPoP | 
| Answer» E. | |
| 228. | 
                                    Which of the following is not related to security mechanism? | 
                            
| A. | ncryption | 
| B. | ecryption | 
| C. | ‐cash | 
| D. | ll the above | 
| Answer» D. ll the above | |
| 229. | 
                                    If it is easy for competitors to enter the market, the threat of new entrants is considered: | 
                            
| A. | igh | 
| B. | ow | 
| C. | ore | 
| D. | ess | 
| Answer» B. ow | |
| 230. | 
                                    Which of the following connections allows the fastest download speeds? | 
                            
| A. | SL | 
| B. | able modem | 
| C. | 1 | 
| D. | 3 | 
| Answer» E. | |
| 231. | 
                                    The threat of new entrants is high when it is: | 
                            
| A. | ard for customers to enter the market | 
| B. | ard for competitors to enter the market | 
| C. | asy for competitors to enter the market | 
| D. | asy for customers to enter the market | 
| Answer» D. asy for customers to enter the market | |
| 232. | 
                                    Which of the following is not considered to be one of the three phases of e-commerce? | 
                            
| A. | nnovation | 
| B. | onsolidation | 
| C. | reservation | 
| D. | einvention | 
| Answer» D. einvention | |
| 233. | 
                                    Which of the following is part of the four main types for e‐commerce? | 
                            
| A. | 2B | 
| B. | 2C | 
| C. | 2B | 
| D. | ll of the above | 
| Answer» E. | |
| 234. | 
                                    Which one of the following is not one of the major types of e-commerce? | 
                            
| A. | 2B | 
| B. | 2C | 
| C. | 2B | 
| D. | 2C | 
| Answer» B. 2C | |
| 235. | 
                                    Which of the following describes e‐commerce? | 
                            
| A. | oing business electronically | 
| B. | oing business | 
| C. | ale of goods | 
| D. | ll of the above | 
| Answer» B. oing business | |
| 236. | 
                                    Which of the following is a new and disruptive Web feature or service? | 
                            
| A. | ML | 
| B. | iffserv | 
| C. | logs | 
| D. | DMA | 
| Answer» D. DMA | |
| 237. | 
                                    Paisapay is facilitated in. | 
                            
| A. | Bay.co.in | 
| B. | mazon.com | 
| C. | lipkart.com | 
| D. | one of the above | 
| Answer» B. mazon.com | |
| 238. | 
                                    All of the following are goals of Internet 2 except ______. | 
                            
| A. | reating a leading-edge very high-speed network capability for the national research community | 
| B. | liminating censorship from the Internet | 
| C. | nabling revolutionary Internet applications | 
| D. | nsuring the rapid transfer of new network services and applications to the broader Internet community | 
| Answer» C. nabling revolutionary Internet applications | |
| 239. | 
                                    The viruses spreads through __________.%! | 
                            
| A. | Mails | 
| B. | Pen drives and cds | 
| C. | Websites | 
| D. | All the above | 
| Answer» E. | |
| 240. | 
                                    The virus that are attached with vb and java files are called.%! | 
                            
| A. | Macro | 
| B. | Trojan horse | 
| C. | Script virus | 
| D. | None of the above | 
| Answer» D. None of the above | |
| 241. | 
                                    The virus that are commonly found in word documents are called __________.%! | 
                            
| A. | Macro | 
| B. | Trojan horse | 
| C. | Script virus | 
| D. | None of the above | 
| Answer» B. Trojan horse | |
| 242. | 
                                    What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‚Äêmail and other Internet traffic?%! | 
                            
| A. | Computer virus | 
| B. | Worm | 
| C. | Denial‚Äêof‚Äêservice attack | 
| D. | None of the above | 
| Answer» C. Denial‚Äö√Ñ√™of‚Äö√Ñ√™service attack | |
| 243. | 
                                    Products are made to prior to orders received based on estimated demand under a _________.%! | 
                            
| A. | supply-push model | 
| B. | demand-push model | 
| C. | supply-pull model | 
| D. | demand-pull model | 
| Answer» B. demand-push model | |
| 244. | 
                                    Which service encompasses all technologies used to transmit and process information on an across a network?%! | 
                            
| A. | Interoperability | 
| B. | Scalability | 
| C. | Benchmarking | 
| D. | Web services | 
| Answer» E. | |
| 245. | 
                                    A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.%! | 
                            
| A. | 10 | 
| B. | 20 | 
| C. | 30 | 
| D. | 40 | 
| Answer» C. 30 | |
| 246. | 
                                    Who breaks into other people's computer systems and steals and destroys information?%! | 
                            
| A. | Hackers | 
| B. | softwares | 
| C. | Hacktivists | 
| D. | Script kiddies | 
| Answer» B. softwares | |
| 247. | 
                                    Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?%! | 
                            
| A. | Cdt.org | 
| B. | PrivacyInternational.org | 
| C. | Epic.org | 
| D. | Privacy.org | 
| Answer» B. PrivacyInternational.org | |
| 248. | 
                                    What is the process of making a copy of the information stored on a computer?%! | 
                            
| A. | Backup | 
| B. | Anti‚Äêvirus | 
| C. | Firewall | 
| D. | Biometrics | 
| Answer» B. Anti‚Äö√Ñ√™virus | |
| 249. | 
                                    The majority of job seekers rely on which of the following?%! | 
                            
| A. | Word-of-mouth leads | 
| B. | Employment agencies | 
| C. | Internet and newspapers equally | 
| D. | Internet only | 
| Answer» D. Internet only | |
| 250. | 
                                    What scrambles the contents of a file so you can't read it without having the right decryption key?%! | 
                            
| A. | Encryption | 
| B. | Intrusion‚Äêdetection software | 
| C. | Security‚Äêauditing software | 
| D. | All of the above | 
| Answer» B. Intrusion‚Äö√Ñ√™detection software | |