MCQOPTIONS
Saved Bookmarks
This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
The online content revenue model in which free content drives offline revenues is called the _________.%! |
| A. | marketing model |
| B. | advertising model |
| C. | pay-per-view model |
| D. | subscription model |
| Answer» B. advertising model | |
| 252. |
Which of the following can a virus do?%! |
| A. | Hurt your hardware |
| B. | Hurt any files they weren't designed to attack |
| C. | Infect files on write‚Äêprotected disks |
| D. | None of the above |
| Answer» E. | |
| 253. |
Which will notarmomputer resources?%! |
| A. | firewall |
| B. | Virus |
| C. | Trojan horse |
| D. | None of the above |
| Answer» B. Virus | |
| 254. |
As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.%! |
| A. | remain constant |
| B. | decrease |
| C. | increase |
| D. | rapidly increase |
| Answer» C. increase | |
| 255. |
After sending e-mail, which of the following activities is most common among Internet users?%! |
| A. | sending instant messages |
| B. | reading someone else's blog |
| C. | using a search engine to find information |
| D. | getting news |
| Answer» D. getting news | |
| 256. |
Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?%! |
| A. | financial cybermediary |
| B. | electronic check |
| C. | electronic bill presentment and payment |
| D. | all of the above |
| Answer» D. all of the above | |
| 257. |
Firewalls perform all of the following functions except _________.%! |
| A. | Forbids communications from untrustworthy sources |
| B. | Allows communications from trustworthy sources |
| C. | Eliminates viruses and other malicious attacks |
| D. | Filters traffic based on packet attributes |
| Answer» D. Filters traffic based on packet attributes | |
| 258. |
Secure Sockets Layers does which of the following?%! |
| A. | creates a secure, private connection to a web server |
| B. | encrypts information |
| C. | sends information over the internet |
| D. | all of the above |
| Answer» E. | |
| 259. |
Which, if any, of the following types of ads are people most willing to tolerate?%! |
| A. | pop‚Äêunder ad |
| B. | pop‚Äêup ad |
| C. | banner ad |
| D. | none of the above |
| Answer» E. | |
| 260. |
Malicious hackers who act with the intention of causing harm are __________.%! |
| A. | White hats |
| B. | Black hats |
| C. | Grey hats |
| D. | Brown hats |
| Answer» C. Grey hats | |
| 261. |
Which form of e‚Äêmarketplace brings together buyers and sellers from multiple industries, often for MRO materials?%! |
| A. | horizontal |
| B. | Vertical |
| C. | Integrated |
| D. | Inclined |
| Answer» B. Vertical | |
| 262. |
All of the following are tools for optimizing a Web site's location in search engine listings except ________.%! |
| A. | keywords and page titles |
| B. | identifying market niches |
| C. | buying ads |
| D. | benchmarking |
| Answer» E. | |
| 263. |
All of the following are types of data mining except ______.%! |
| A. | selective data mining |
| B. | query-driven data mining |
| C. | model-driven data mining |
| D. | rule-based data mining |
| Answer» B. query-driven data mining | |
| 264. |
Which factor determines when your IT system will be available for knowledge workers to access?%! |
| A. | Availability |
| B. | Accessibility |
| C. | Reliability |
| D. | None of the above |
| Answer» B. Accessibility | |
| 265. |
All of the following are examples of intelligent agent technology except ________.%! |
| A. | automated response systems |
| B. | automatic shipping confirmation |
| C. | order status reports |
| D. | online web bugs |
| Answer» E. | |
| 266. |
What is a set of conditions used to measure how well a product or system functions?%! |
| A. | Flexibility |
| B. | Performance |
| C. | Capacity planning |
| D. | Benchmark |
| Answer» E. | |
| 267. |
What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?%! |
| A. | Client/server network |
| B. | Intranet |
| C. | Extranet |
| D. | Thin client |
| Answer» D. Thin client | |
| 268. |
If it is easy for competitors to enter the market, the threat of new entrants is considered:%! |
| A. | High |
| B. | Low |
| C. | More |
| D. | Less |
| Answer» B. Low | |
| 269. |
Which of the following is a new and disruptive Web feature or service?%! |
| A. | XML |
| B. | diffserv |
| C. | blogs |
| D. | CDMA |
| Answer» D. CDMA | |
| 270. |
A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)?%! |
| A. | Switching costs |
| B. | Loyalty programs |
| C. | Entry barriers |
| D. | Affiliate programs |
| Answer» D. Affiliate programs | |
| 271. |
All of the following are steps in the systems development life cycle except ______.%! |
| A. | Systems Design |
| B. | Testing |
| C. | Implementation |
| D. | Debugging |
| Answer» E. | |
| 272. |
A business competing in a commodity like environment must focus on which of the following?%! |
| A. | Price |
| B. | Ease / speed of delivery |
| C. | Ease of ordering |
| D. | all of the above |
| Answer» E. | |
| 273. |
Which segment is eBay an example?%! |
| A. | B2B |
| B. | C2B |
| C. | C2C |
| D. | None of the above |
| Answer» E. | |
| 274. |
Which of the following is not a key element of a business model?%! |
| A. | value proposition |
| B. | competitive advantage |
| C. | market strategy |
| D. | universal standards |
| Answer» E. | |
| 275. |
Digital products are best suited for B2C e‚Äêcommerce because they:%! |
| A. | Are commodity like products |
| B. | Can be mass‚Äêcustomized and personalized |
| C. | Can be delivered at the time of purchase |
| D. | All of the above |
| Answer» E. | |
| 276. |
Compared to Internet users, the number of cell phone subscribers is _________.%! |
| A. | about the same |
| B. | slightly fewer |
| C. | much fewer |
| D. | much larger |
| Answer» E. | |
| 277. |
What is the percentage of customers who visit a Web site and actually buy something called?%! |
| A. | Affiliate programs |
| B. | Click‚Äêthrough |
| C. | Spam |
| D. | Conversion rate |
| Answer» E. | |
| 278. |
A strategy designed to compete in all markets around the globe is called a _________ strategy.%! |
| A. | scope |
| B. | differentiation |
| C. | cost |
| D. | focus |
| Answer» B. differentiation | |
| 279. |
Most individuals are familiar with which form of e‚Äêcommerce?%! |
| A. | B2B |
| B. | B2C |
| C. | C2B |
| D. | C2C |
| Answer» C. C2B | |
| 280. |
__________ is a program that you can run from the DOS prompt in the Windows operating system in order to check the connection between your client and the server.%! |
| A. | Ping |
| B. | Telnet |
| C. | Tracert |
| D. | SSL |
| Answer» B. Telnet | |
| 281. |
*$_The majority of job seekers rely on which of the following?? |
| A. | Word-of-mouth leads |
| B. | Employment agencies |
| C. | Internet and newspapers equally |
| D. | Internet only |
| Answer» D. Internet only | |
| 282. |
*$_What scrambles the contents of a file so you can't read it without having the right decryption key?? |
| A. | Encryption |
| B. | Intrusion‚Äêdetection software |
| C. | Security‚Äêauditing software |
| D. | All of the above |
| Answer» B. Intrusion‚Äö√Ñ√™detection software | |
| 283. |
*$_The online content revenue model in which free content drives offline revenues is called the _________.? |
| A. | marketing model |
| B. | advertising model |
| C. | pay-per-view model |
| D. | subscription model |
| Answer» B. advertising model | |
| 284. |
*$_Which of the following can a virus do?? |
| A. | Hurt your hardware |
| B. | Hurt any files they weren't designed to attack |
| C. | Infect files on write‚Äêprotected disks |
| D. | None of the above |
| Answer» E. | |
| 285. |
*$_What is the process of making a copy of the information stored on a computer?? |
| A. | Backup |
| B. | Anti‚Äêvirus |
| C. | Firewall |
| D. | Biometrics |
| Answer» B. Anti‚Äö√Ñ√™virus | |
| 286. |
*$_Who breaks into other people's computer systems and steals and destroys information?? |
| A. | Hackers |
| B. | softwares |
| C. | Hacktivists |
| D. | Script kiddies |
| Answer» B. softwares | |
| 287. |
*$_A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.? |
| A. | 10 |
| B. | 20 |
| C. | 30 |
| D. | 40 |
| Answer» C. 30 | |
| 288. |
*$_What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‚Äêmail and other Internet traffic?? |
| A. | Computer virus |
| B. | Worm |
| C. | Denial‚Äêof‚Äêservice attack |
| D. | None of the above |
| Answer» C. Denial‚Äö√Ñ√™of‚Äö√Ñ√™service attack | |
| 289. |
*$_Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?? |
| A. | Cdt.org |
| B. | PrivacyInternational.org |
| C. | Epic.org |
| D. | Privacy.org |
| Answer» B. PrivacyInternational.org | |
| 290. |
*$_Products are made to prior to orders received based on estimated demand under a _________.? |
| A. | supply-push model |
| B. | demand-push model |
| C. | supply-pull model |
| D. | demand-pull model |
| Answer» B. demand-push model | |
| 291. |
*$_Which will notarmomputer resources?? |
| A. | firewall |
| B. | Virus |
| C. | Trojan horse |
| D. | None of the above |
| Answer» B. Virus | |
| 292. |
*$_Which service encompasses all technologies used to transmit and process information on an across a network?? |
| A. | Interoperability |
| B. | Scalability |
| C. | Benchmarking |
| D. | Web services |
| Answer» E. | |
| 293. |
*$_As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.? |
| A. | remain constant |
| B. | decrease |
| C. | increase |
| D. | rapidly increase |
| Answer» C. increase | |
| 294. |
*$_Which form of e‚Äêmarketplace brings together buyers and sellers from multiple industries, often for MRO materials?? |
| A. | horizontal |
| B. | Vertical |
| C. | Integrated |
| D. | Inclined |
| Answer» B. Vertical | |
| 295. |
*$_All of the following are tools for optimizing a Web site's location in search engine listings except ________.? |
| A. | keywords and page titles |
| B. | identifying market niches |
| C. | buying ads |
| D. | benchmarking |
| Answer» E. | |
| 296. |
*$_Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?? |
| A. | financial cybermediary |
| B. | electronic check |
| C. | electronic bill presentment and payment |
| D. | all of the above |
| Answer» D. all of the above | |
| 297. |
*$_Firewalls perform all of the following functions except _________.? |
| A. | Forbids communications from untrustworthy sources |
| B. | Allows communications from trustworthy sources |
| C. | Eliminates viruses and other malicious attacks |
| D. | Filters traffic based on packet attributes |
| Answer» D. Filters traffic based on packet attributes | |
| 298. |
*$_Which, if any, of the following types of ads are people most willing to tolerate?? |
| A. | pop‚Äêunder ad |
| B. | pop‚Äêup ad |
| C. | banner ad |
| D. | none of the above |
| Answer» E. | |
| 299. |
*$_Malicious hackers who act with the intention of causing harm are __________.? |
| A. | White hats |
| B. | Black hats |
| C. | Grey hats |
| D. | Brown hats |
| Answer» C. Grey hats | |
| 300. |
*$_Secure Sockets Layers does which of the following?? |
| A. | creates a secure, private connection to a web server |
| B. | encrypts information |
| C. | sends information over the internet |
| D. | all of the above |
| Answer» E. | |