MCQOPTIONS
Saved Bookmarks
This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 351. |
%_Which of the following describes paid content's relation to free user-generated content?_% |
| A. | Free content jeopardizes paid content |
| B. | Paid content jeopardizes free content |
| C. | Free content and paid content can both work in tandem cooperatively |
| D. | Paid content is viable now but will not be in the future |
| Answer» D. Paid content is viable now but will not be in the future | |
| 352. |
%_What looks for people on the network who shouldn't be there or who are acting suspiciously?_% |
| A. | Encryption |
| B. | Public key encryption |
| C. | Intrusion‚Äêdetection software |
| D. | Security‚Äêauditing software |
| Answer» D. Security‚Äö√Ñ√™auditing software | |
| 353. |
%_What is the most commonly offered interactive feature of newspaper Web sites?_% |
| A. | video |
| B. | comments on blogs |
| C. | RSS feeds |
| D. | podcasts |
| Answer» D. podcasts | |
| 354. |
%_Which of the following is the largest online travel service?_% |
| A. | Travelocity |
| B. | Orbitz |
| C. | Priceline |
| D. | Expedia |
| Answer» E. | |
| 355. |
%_The redirection of traffic from a legitimate site to an infringing site is called _______._% |
| A. | cyber squatting |
| B. | cyber piracy |
| C. | meta tagging |
| D. | key wording |
| Answer» C. meta tagging | |
| 356. |
%_Which process is used to reinstall data from a copy when the original data has been lost?_% |
| A. | backup |
| B. | recovery |
| C. | benchmarking |
| D. | data cleansing |
| Answer» C. benchmarking | |
| 357. |
%_All of the following are types of intellectual property protection except_______._% |
| A. | patents |
| B. | trademarks |
| C. | governance |
| D. | copyrights |
| Answer» D. copyrights | |
| 358. |
%_ERP stands for._% |
| A. | Enterprise resolution planning |
| B. | Enterprise reverse planning |
| C. | Enterprise resource planning |
| D. | None of the above |
| Answer» D. None of the above | |
| 359. |
%_What harnesses far‚Äêflung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?_% |
| A. | Computer virus |
| B. | Worm |
| C. | Denial‚Äêof‚Äêservice attack |
| D. | None of the above |
| Answer» E. | |
| 360. |
%_Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner?_% |
| A. | impression rate |
| B. | view-through rate |
| C. | click-through rate |
| D. | stickiness ratio |
| Answer» D. stickiness ratio | |
| 361. |
%_Which of the following statements about privacy is true?_% |
| A. | It is a moral right to be left alone |
| B. | Only corporations and government need to be concerned about it |
| C. | It has only just recently become a concern |
| D. | It is most easily obtained on the Internet |
| Answer» B. Only corporations and government need to be concerned about it | |
| 362. |
%_Which is a function of ERP?_% |
| A. | Warehousing |
| B. | sales |
| C. | scheduling |
| D. | all of the above |
| Answer» E. | |
| 363. |
_ The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _________.$? |
| A. | Active Server Pages (ASP) |
| B. | Java Server Pages (JSP) |
| C. | Common Gateway Interface (CGI) |
| D. | VBScript |
| Answer» D. VBScript | |
| 364. |
_ Which type of add appears on a web page?$? |
| A. | pop‚Äêunder ad |
| B. | Pop‚Äêup ad |
| C. | Banner ad |
| D. | Discount ad¬¨‚Ä ¬¨‚Ä |
| Answer» D. Discount ad¬¨‚Ä ¬¨‚Ä | |
| 365. |
_ Which of the following is not a dimension of e-commerce security provided by encryption?$? |
| A. | availability |
| B. | message integrity |
| C. | nonrepudiation |
| D. | confidentiality |
| Answer» B. message integrity | |
| 366. |
_ What is the name for direct computer‚Äêto‚Äêcomputer transfer of transaction information contained in standard business documents?$? |
| A. | internet commerce |
| B. | e‚Äêcommerce |
| C. | transaction information transfer |
| D. | electronic data interchange |
| Answer» E. | |
| 367. |
_ In the e-commerce security environment, which of the following constitutes the inner-most layer?$? |
| A. | people |
| B. | data |
| C. | technology solutions |
| D. | organizational policies and procedures |
| Answer» C. technology solutions | |
| 368. |
_ Which of the following is a method of transferring money from one person's account to another?$? |
| A. | electronic check |
| B. | credit card |
| C. | e‚Äêtransfer |
| D. | none of the above |
| Answer» B. credit card | |
| 369. |
_ The only payment system that is instantly convertible without intermediation is _______.$? |
| A. | Credit card |
| B. | Accumulating balance |
| C. | Stored value |
| D. | Cash |
| Answer» E. | |
| 370. |
_ The practice of forging a return address on an e‚Äêmail so that the recipient is fooled into revealing private information is termed?$? |
| A. | hacking |
| B. | cracking |
| C. | dumpster diving |
| D. | spoofing |
| Answer» E. | |
| 371. |
_ The set of applications and technologies that allow users to create, edit, and distribute content online is known as______.$? |
| A. | Internet |
| B. | social networking |
| C. | virtual life |
| D. | Web 2.0 |
| Answer» E. | |
| 372. |
_ The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.$? |
| A. | affiliate marketing |
| B. | viral marketing |
| C. | permission marketing |
| D. | blog marketing |
| Answer» C. permission marketing | |
| 373. |
_ Which factor ensures your IT systems are functioning correctly and providing accurate information?$? |
| A. | Availability |
| B. | Accessibility |
| C. | Reliability |
| D. | Scalability |
| Answer» D. Scalability | |
| 374. |
_ A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______.$? |
| A. | commodity |
| B. | core product |
| C. | actual product |
| D. | augmented product |
| Answer» B. core product | |
| 375. |
_ What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?$? |
| A. | Disaster recovery plan |
| B. | Hot site |
| C. | Cold site |
| D. | Disaster recovery cost curve |
| Answer» D. Disaster recovery cost curve | |
| 376. |
_ The presence of¬¨‚Ä ‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™¬¨‚Ä make the smart card smart.$? |
| A. | Memory |
| B. | Microchip |
| C. | E‚Äêcash |
| D. | None of the above |
| Answer» C. E‚Äö√Ñ√™cash | |
| 377. |
_ Which of the following is part of the four main types for e‚Äêcommerce?$? |
| A. | B2B |
| B. | B2C |
| C. | C2B |
| D. | All of the above |
| Answer» E. | |
| 378. |
_ Materials used in the normal operation of a business but not related to primary business operations are called what?$? |
| A. | Supplies |
| B. | Direct materials |
| C. | Indirect materials |
| D. | Daily stuff |
| Answer» D. Daily stuff | |
| 379. |
_ What automates business processes?$? |
| A. | Workflow |
| B. | ASP |
| C. | Workflow system |
| D. | EIP |
| Answer» D. EIP | |
| 380. |
_ Which of the following is a characteristic of a firewall?$? |
| A. | Examines each message as it seeks entrance to the network |
| B. | Blocks messages without the correct markings from entering the network |
| C. | Detects computers communicating with the Internet without approval |
| D. | All of the above |
| Answer» E. | |
| 381. |
_ Which of the following can be used to help identify people in a crowd?$? |
| A. | Biochip |
| B. | Implant chip |
| C. | Facial recognition software |
| D. | Vision chip |
| Answer» D. Vision chip | |
| 382. |
_ The E‚Äêpayment mechanism widely used in B2B is.$? |
| A. | Credit card |
| B. | Debit card |
| C. | Master card |
| D. | E‚Äêcheque |
| Answer» E. | |
| 383. |
_ The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website.$? |
| A. | marketing |
| B. | click-and-mortar |
| C. | customer service |
| D. | corporate |
| Answer» E. | |
| 384. |
_ What is a technology‚Äêenabled microchip implanted into the human body?$? |
| A. | Wearable computer |
| B. | GPS |
| C. | Implant chip |
| D. | None of the above |
| Answer» D. None of the above | |
| 385. |
_ The most common and easily understood type of Net marketplace is ______.$? |
| A. | e-procurement marketplace |
| B. | e-distributors |
| C. | industry consortia |
| D. | independent exchanges |
| Answer» C. industry consortia | |
| 386. |
_ When you purchase copyrighted software, what actually are you paying for?$? |
| A. | The cost of the CDs, manuals, and development of the software |
| B. | The cost of the CDs, manuals, and a share of the cost of the software development |
| C. | A share of the cost of software development |
| D. | All of the above |
| Answer» E. | |
| 387. |
_ All of the following are characteristics of a social network except _______.$? |
| A. | involves a group of people |
| B. | features shared social interaction |
| C. | always feature shared goals and purposes |
| D. | common ties among members |
| Answer» D. common ties among members | |
| 388. |
_ E‚Äêmail messages may be stored on which of the following computers?$? |
| A. | Sender's computer |
| B. | Sender's server |
| C. | Recipient's server |
| D. | All of the above |
| Answer» E. | |
| 389. |
_ The marketplace for auction sites is best described as __________.$? |
| A. | many sites attaining similar levels of profitability |
| B. | easy to enter due to minimal barriers |
| C. | populated mostly with small, thriving specialty sites |
| D. | dominated by a handful of sites with established networks |
| Answer» E. | |
| 390. |
_ Cyber slacking consists of what activities?$? |
| A. | Visiting “inappropriate” web sites |
| B. | Visiting news sites |
| C. | Chatting online with others about non‚Äêwork topics |
| D. | All of the above |
| Answer» E. | |
| 391. |
_ Which of the following portal revenue models involves charging for premium content?$? |
| A. | ISP services |
| B. | General advertising |
| C. | Subscription fees |
| D. | Tenancy deals |
| Answer» D. Tenancy deals | |
| 392. |
_ What is the unauthorized use, duplication, distribution or sale of copyrighted software?$? |
| A. | Fair Use Doctrine |
| B. | Pirated software |
| C. | Counterfeit software |
| D. | Privacy |
| Answer» C. Counterfeit software | |
| 393. |
_ Goods directly involved in the production process are known as _________.$? |
| A. | MRO goods |
| B. | procured goods |
| C. | indirect goods |
| D. | direct goods |
| Answer» E. | |
| 394. |
_ Which one is an offline payment mode?$? |
| A. | Cash on delivery |
| B. | Cash before delivery |
| C. | Credit card |
| D. | Both a and b |
| Answer» E. | |
| 395. |
_ Which one is a physical threat?$? |
| A. | Phishing |
| B. | Storm |
| C. | Earthquake |
| D. | All the above |
| Answer» E. | |
| 396. |
_ Which one is a client level threat?$? |
| A. | Malicious code |
| B. | Viruses |
| C. | Active contents |
| D. | All the above¬¨‚Ä ¬¨‚Ä |
| Answer» E. | |
| 397. |
_ Which one is communication channel threat?$? |
| A. | Sniffer programs |
| B. | Cyber vandalism |
| C. | Integrity threats |
| D. | All of the above |
| Answer» E. | |
| 398. |
_ ‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™¬¨‚Ä is an act that poses danger to computer assets.$? |
| A. | Threat |
| B. | Danger |
| C. | Error |
| D. | None of the above |
| Answer» B. Danger | |
| 399. |
_ What is I stands in CIA of smart card?$? |
| A. | International |
| B. | Integrity |
| C. | Identity |
| D. | None of the above |
| Answer» C. Identity | |
| 400. |
_ The study of encryption is called ___________.$? |
| A. | Decryption |
| B. | Cryptography |
| C. | Firewall |
| D. | All the above |
| Answer» C. Firewall | |