Explore topic-wise MCQs in Commerce.

This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.

251.

The online content revenue model in which free content drives offline revenues is called the _________.%!

A. marketing model
B. advertising model
C. pay-per-view model
D. subscription model
Answer» B. advertising model
252.

Which of the following can a virus do?%!

A. Hurt your hardware
B. Hurt any files they weren't designed to attack
C. Infect files on write‚Äêprotected disks
D. None of the above
Answer» E.
253.

Which will notarmomputer resources?%!

A. firewall
B. Virus
C. Trojan horse
D. None of the above
Answer» B. Virus
254.

As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.%!

A. remain constant
B. decrease
C. increase
D. rapidly increase
Answer» C. increase
255.

After sending e-mail, which of the following activities is most common among Internet users?%!

A. sending instant messages
B. reading someone else's blog
C. using a search engine to find information
D. getting news
Answer» D. getting news
256.

Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?%!

A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Answer» D. all of the above
257.

Firewalls perform all of the following functions except _________.%!

A. Forbids communications from untrustworthy sources
B. Allows communications from trustworthy sources
C. Eliminates viruses and other malicious attacks
D. Filters traffic based on packet attributes
Answer» D. Filters traffic based on packet attributes
258.

Secure Sockets Layers does which of the following?%!

A. creates a secure, private connection to a web server
B. encrypts information
C. sends information over the internet
D. all of the above
Answer» E.
259.

Which, if any, of the following types of ads are people most willing to tolerate?%!

A. pop‚Äêunder ad
B. pop‚Äêup ad
C. banner ad
D. none of the above
Answer» E.
260.

Malicious hackers who act with the intention of causing harm are __________.%!

A. White hats
B. Black hats
C. Grey hats
D. Brown hats
Answer» C. Grey hats
261.

Which form of e‚Äêmarketplace brings together buyers and sellers from multiple industries, often for MRO materials?%!

A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer» B. Vertical
262.

All of the following are tools for optimizing a Web site's location in search engine listings except ________.%!

A. keywords and page titles
B. identifying market niches
C. buying ads
D. benchmarking
Answer» E.
263.

All of the following are types of data mining except ______.%!

A. selective data mining
B. query-driven data mining
C. model-driven data mining
D. rule-based data mining
Answer» B. query-driven data mining
264.

Which factor determines when your IT system will be available for knowledge workers to access?%!

A. Availability
B. Accessibility
C. Reliability
D. None of the above
Answer» B. Accessibility
265.

All of the following are examples of intelligent agent technology except ________.%!

A. automated response systems
B. automatic shipping confirmation
C. order status reports
D. online web bugs
Answer» E.
266.

What is a set of conditions used to measure how well a product or system functions?%!

A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer» E.
267.

What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?%!

A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer» D. Thin client
268.

If it is easy for competitors to enter the market, the threat of new entrants is considered:%!

A. High
B. Low
C. More
D. Less
Answer» B. Low
269.

Which of the following is a new and disruptive Web feature or service?%!

A. XML
B. diffserv
C. blogs
D. CDMA
Answer» D. CDMA
270.

A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)?%!

A. Switching costs
B. Loyalty programs
C. Entry barriers
D. Affiliate programs
Answer» D. Affiliate programs
271.

All of the following are steps in the systems development life cycle except ______.%!

A. Systems Design
B. Testing
C. Implementation
D. Debugging
Answer» E.
272.

A business competing in a commodity like environment must focus on which of the following?%!

A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the above
Answer» E.
273.

Which segment is eBay an example?%!

A. B2B
B. C2B
C. C2C
D. None of the above
Answer» E.
274.

Which of the following is not a key element of a business model?%!

A. value proposition
B. competitive advantage
C. market strategy
D. universal standards
Answer» E.
275.

Digital products are best suited for B2C e‚Äêcommerce because they:%!

A. Are commodity like products
B. Can be mass‚Äêcustomized and personalized
C. Can be delivered at the time of purchase
D. All of the above
Answer» E.
276.

Compared to Internet users, the number of cell phone subscribers is _________.%!

A. about the same
B. slightly fewer
C. much fewer
D. much larger
Answer» E.
277.

What is the percentage of customers who visit a Web site and actually buy something called?%!

A. Affiliate programs
B. Click‚Äêthrough
C. Spam
D. Conversion rate
Answer» E.
278.

A strategy designed to compete in all markets around the globe is called a _________ strategy.%!

A. scope
B. differentiation
C. cost
D. focus
Answer» B. differentiation
279.

Most individuals are familiar with which form of e‚Äêcommerce?%!

A. B2B
B. B2C
C. C2B
D. C2C
Answer» C. C2B
280.

__________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server.%!

A. Ping
B. Telnet
C. Tracert
D. SSL
Answer» B. Telnet
281.

*$_The majority of job seekers rely on which of the following??

A. Word-of-mouth leads
B. Employment agencies
C. Internet and newspapers equally
D. Internet only
Answer» D. Internet only
282.

*$_What scrambles the contents of a file so you can't read it without having the right decryption key??

A. Encryption
B. Intrusion‚Äêdetection software
C. Security‚Äêauditing software
D. All of the above
Answer» B. Intrusion‚Äö√Ñ√™detection software
283.

*$_The online content revenue model in which free content drives offline revenues is called the _________.?

A. marketing model
B. advertising model
C. pay-per-view model
D. subscription model
Answer» B. advertising model
284.

*$_Which of the following can a virus do??

A. Hurt your hardware
B. Hurt any files they weren't designed to attack
C. Infect files on write‚Äêprotected disks
D. None of the above
Answer» E.
285.

*$_What is the process of making a copy of the information stored on a computer??

A. Backup
B. Anti‚Äêvirus
C. Firewall
D. Biometrics
Answer» B. Anti‚Äö√Ñ√™virus
286.

*$_Who breaks into other people's computer systems and steals and destroys information??

A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
Answer» B. softwares
287.

*$_A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.?

A. 10
B. 20
C. 30
D. 40
Answer» C. 30
288.

*$_What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‚Äêmail and other Internet traffic??

A. Computer virus
B. Worm
C. Denial‚Äêof‚Äêservice attack
D. None of the above
Answer» C. Denial‚Äö√Ñ√™of‚Äö√Ñ√™service attack
289.

*$_Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus??

A. Cdt.org
B. PrivacyInternational.org
C. Epic.org
D. Privacy.org
Answer» B. PrivacyInternational.org
290.

*$_Products are made to prior to orders received based on estimated demand under a _________.?

A. supply-push model
B. demand-push model
C. supply-pull model
D. demand-pull model
Answer» B. demand-push model
291.

*$_Which will notarmomputer resources??

A. firewall
B. Virus
C. Trojan horse
D. None of the above
Answer» B. Virus
292.

*$_Which service encompasses all technologies used to transmit and process information on an across a network??

A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Answer» E.
293.

*$_As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.?

A. remain constant
B. decrease
C. increase
D. rapidly increase
Answer» C. increase
294.

*$_Which form of e‚Äêmarketplace brings together buyers and sellers from multiple industries, often for MRO materials??

A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer» B. Vertical
295.

*$_All of the following are tools for optimizing a Web site's location in search engine listings except ________.?

A. keywords and page titles
B. identifying market niches
C. buying ads
D. benchmarking
Answer» E.
296.

*$_Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet??

A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Answer» D. all of the above
297.

*$_Firewalls perform all of the following functions except _________.?

A. Forbids communications from untrustworthy sources
B. Allows communications from trustworthy sources
C. Eliminates viruses and other malicious attacks
D. Filters traffic based on packet attributes
Answer» D. Filters traffic based on packet attributes
298.

*$_Which, if any, of the following types of ads are people most willing to tolerate??

A. pop‚Äêunder ad
B. pop‚Äêup ad
C. banner ad
D. none of the above
Answer» E.
299.

*$_Malicious hackers who act with the intention of causing harm are __________.?

A. White hats
B. Black hats
C. Grey hats
D. Brown hats
Answer» C. Grey hats
300.

*$_Secure Sockets Layers does which of the following??

A. creates a secure, private connection to a web server
B. encrypts information
C. sends information over the internet
D. all of the above
Answer» E.