Explore topic-wise MCQs in Commerce.

This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.

351.

%_Which of the following describes paid content's relation to free user-generated content?_%

A. Free content jeopardizes paid content
B. Paid content jeopardizes free content
C. Free content and paid content can both work in tandem cooperatively
D. Paid content is viable now but will not be in the future
Answer» D. Paid content is viable now but will not be in the future
352.

%_What looks for people on the network who shouldn't be there or who are acting suspiciously?_%

A. Encryption
B. Public key encryption
C. Intrusion‚Äêdetection software
D. Security‚Äêauditing software
Answer» D. Security‚Äö√Ñ√™auditing software
353.

%_What is the most commonly offered interactive feature of newspaper Web sites?_%

A. video
B. comments on blogs
C. RSS feeds
D. podcasts
Answer» D. podcasts
354.

%_Which of the following is the largest online travel service?_%

A. Travelocity
B. Orbitz
C. Priceline
D. Expedia
Answer» E.
355.

%_The redirection of traffic from a legitimate site to an infringing site is called _______._%

A. cyber squatting
B. cyber piracy
C. meta tagging
D. key wording
Answer» C. meta tagging
356.

%_Which process is used to reinstall data from a copy when the original data has been lost?_%

A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» C. benchmarking
357.

%_All of the following are types of intellectual property protection except_______._%

A. patents
B. trademarks
C. governance
D. copyrights
Answer» D. copyrights
358.

%_ERP stands for._%

A. Enterprise resolution planning
B. Enterprise reverse planning
C. Enterprise resource planning
D. None of the above
Answer» D. None of the above
359.

%_What harnesses far‚Äêflung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?_%

A. Computer virus
B. Worm
C. Denial‚Äêof‚Äêservice attack
D. None of the above
Answer» E.
360.

%_Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner?_%

A. impression rate
B. view-through rate
C. click-through rate
D. stickiness ratio
Answer» D. stickiness ratio
361.

%_Which of the following statements about privacy is true?_%

A. It is a moral right to be left alone
B. Only corporations and government need to be concerned about it
C. It has only just recently become a concern
D. It is most easily obtained on the Internet
Answer» B. Only corporations and government need to be concerned about it
362.

%_Which is a function of ERP?_%

A. Warehousing
B. sales
C. scheduling
D. all of the above
Answer» E.
363.

_ The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _________.$?

A. Active Server Pages (ASP)
B. Java Server Pages (JSP)
C. Common Gateway Interface (CGI)
D. VBScript
Answer» D. VBScript
364.

_ Which type of add appears on a web page?$?

A. pop‚Äêunder ad
B. Pop‚Äêup ad
C. Banner ad
D. Discount ad¬¨‚Ä ¬¨‚Ä
Answer» D. Discount ad¬¨‚Ä ¬¨‚Ä
365.

_ Which of the following is not a dimension of e-commerce security provided by encryption?$?

A. availability
B. message integrity
C. nonrepudiation
D. confidentiality
Answer» B. message integrity
366.

_ What is the name for direct computer‚Äêto‚Äêcomputer transfer of transaction information contained in standard business documents?$?

A. internet commerce
B. e‚Äêcommerce
C. transaction information transfer
D. electronic data interchange
Answer» E.
367.

_ In the e-commerce security environment, which of the following constitutes the inner-most layer?$?

A. people
B. data
C. technology solutions
D. organizational policies and procedures
Answer» C. technology solutions
368.

_ Which of the following is a method of transferring money from one person's account to another?$?

A. electronic check
B. credit card
C. e‚Äêtransfer
D. none of the above
Answer» B. credit card
369.

_ The only payment system that is instantly convertible without intermediation is _______.$?

A. Credit card
B. Accumulating balance
C. Stored value
D. Cash
Answer» E.
370.

_ The practice of forging a return address on an e‚Äêmail so that the recipient is fooled into revealing private information is termed?$?

A. hacking
B. cracking
C. dumpster diving
D. spoofing
Answer» E.
371.

_ The set of applications and technologies that allow users to create, edit, and distribute content online is known as______.$?

A. Internet
B. social networking
C. virtual life
D. Web 2.0
Answer» E.
372.

_ The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.$?

A. affiliate marketing
B. viral marketing
C. permission marketing
D. blog marketing
Answer» C. permission marketing
373.

_ Which factor ensures your IT systems are functioning correctly and providing accurate information?$?

A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer» D. Scalability
374.

_ A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______.$?

A. commodity
B. core product
C. actual product
D. augmented product
Answer» B. core product
375.

_ What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?$?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer» D. Disaster recovery cost curve
376.

_ The presence of¬¨‚Ä ‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™¬¨‚Ä make the smart card smart.$?

A. Memory
B. Microchip
C. E‚Äêcash
D. None of the above
Answer» C. E‚Äö√Ñ√™cash
377.

_ Which of the following is part of the four main types for e‚Äêcommerce?$?

A. B2B
B. B2C
C. C2B
D. All of the above
Answer» E.
378.

_ Materials used in the normal operation of a business but not related to primary business operations are called what?$?

A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
Answer» D. Daily stuff
379.

_ What automates business processes?$?

A. Workflow
B. ASP
C. Workflow system
D. EIP
Answer» D. EIP
380.

_ Which of the following is a characteristic of a firewall?$?

A. Examines each message as it seeks entrance to the network
B. Blocks messages without the correct markings from entering the network
C. Detects computers communicating with the Internet without approval
D. All of the above
Answer» E.
381.

_ Which of the following can be used to help identify people in a crowd?$?

A. Biochip
B. Implant chip
C. Facial recognition software
D. Vision chip
Answer» D. Vision chip
382.

_ The E‚Äêpayment mechanism widely used in B2B is.$?

A. Credit card
B. Debit card
C. Master card
D. E‚Äêcheque
Answer» E.
383.

_ The type of website that is designed to build customer goodwill and to supplement other sales channels rather then sell the company's products directly is known as a ______________ website.$?

A. marketing
B. click-and-mortar
C. customer service
D. corporate
Answer» E.
384.

_ What is a technology‚Äêenabled microchip implanted into the human body?$?

A. Wearable computer
B. GPS
C. Implant chip
D. None of the above
Answer» D. None of the above
385.

_ The most common and easily understood type of Net marketplace is ______.$?

A. e-procurement marketplace
B. e-distributors
C. industry consortia
D. independent exchanges
Answer» C. industry consortia
386.

_ When you purchase copyrighted software, what actually are you paying for?$?

A. The cost of the CDs, manuals, and development of the software
B. The cost of the CDs, manuals, and a share of the cost of the software development
C. A share of the cost of software development
D. All of the above
Answer» E.
387.

_ All of the following are characteristics of a social network except _______.$?

A. involves a group of people
B. features shared social interaction
C. always feature shared goals and purposes
D. common ties among members
Answer» D. common ties among members
388.

_ E‚Äêmail messages may be stored on which of the following computers?$?

A. Sender's computer
B. Sender's server
C. Recipient's server
D. All of the above
Answer» E.
389.

_ The marketplace for auction sites is best described as __________.$?

A. many sites attaining similar levels of profitability
B. easy to enter due to minimal barriers
C. populated mostly with small, thriving specialty sites
D. dominated by a handful of sites with established networks
Answer» E.
390.

_ Cyber slacking consists of what activities?$?

A. Visiting “inappropriate” web sites
B. Visiting news sites
C. Chatting online with others about non‚Äêwork topics
D. All of the above
Answer» E.
391.

_ Which of the following portal revenue models involves charging for premium content?$?

A. ISP services
B. General advertising
C. Subscription fees
D. Tenancy deals
Answer» D. Tenancy deals
392.

_ What is the unauthorized use, duplication, distribution or sale of copyrighted software?$?

A. Fair Use Doctrine
B. Pirated software
C. Counterfeit software
D. Privacy
Answer» C. Counterfeit software
393.

_ Goods directly involved in the production process are known as _________.$?

A. MRO goods
B. procured goods
C. indirect goods
D. direct goods
Answer» E.
394.

_ Which one is an offline payment mode?$?

A. Cash on delivery
B. Cash before delivery
C. Credit card
D. Both a and b
Answer» E.
395.

_ Which one is a physical threat?$?

A. Phishing
B. Storm
C. Earthquake
D. All the above
Answer» E.
396.

_ Which one is a client level threat?$?

A. Malicious code
B. Viruses
C. Active contents
D. All the above¬¨‚Ä ¬¨‚Ä
Answer» E.
397.

_ Which one is communication channel threat?$?

A. Sniffer programs
B. Cyber vandalism
C. Integrity threats
D. All of the above
Answer» E.
398.

_ ‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™‚Äö√Ñ√™¬¨‚Ä is an act that poses danger to computer assets.$?

A. Threat
B. Danger
C. Error
D. None of the above
Answer» B. Danger
399.

_ What is I stands in CIA of smart card?$?

A. International
B. Integrity
C. Identity
D. None of the above
Answer» C. Identity
400.

_ The study of encryption is called ___________.$?

A. Decryption
B. Cryptography
C. Firewall
D. All the above
Answer» C. Firewall