MCQOPTIONS
 Saved Bookmarks
				This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 401. | 
                                    _ Private Key cryptography is also known as¬¨‚Ä __________ cryptography.$? | 
                            
| A. | Public key | 
| B. | Symmetric | 
| C. | Asymmetric | 
| D. | None | 
| Answer» C. Asymmetric | |
| 402. | 
                                    _ A perfect market is one in which __________.$? | 
                            
| A. | One firm develops an advantage based on a factor of production that other firms cannot purchase | 
| B. | One participant in the market has more resources than the others | 
| C. | there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production | 
| D. | competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage | 
| Answer» D. competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage | |
| 403. | 
                                    _ The best products to sell in B2C e‚Äêcommerce are:$? | 
                            
| A. | Small products | 
| B. | Digital products | 
| C. | Specialty products | 
| D. | Fresh products | 
| Answer» C. Specialty products | |
| 404. | 
                                    _ Which of the following is an example of a portal?$? | 
                            
| A. | Amazon | 
| B. | eBay | 
| C. | Yahoo | 
| D. | Face book | 
| Answer» D. Face book | |
| 405. | 
                                    _ All of the following are techniques B2C e‚Äêcommerce companies use to attract customers, except:$? | 
                            
| A. | Registering with search engines | 
| B. | Viral marketing | 
| C. | Online ads | 
| D. | Virtual marketing | 
| Answer» E. | |
| 406. | 
                                    _ In 1961, __________ published a paper on "packet switching" networks.$? | 
                            
| A. | Leonard Kleinrock | 
| B. | Ray Tomlinson | 
| C. | Bob Metcalfe | 
| D. | Vint Cerf | 
| Answer» B. Ray Tomlinson | |
| 407. | 
                                    _ Which of the following are advantages normally associated with B2B e‚Äêcommerce?$? | 
                            
| A. | Shorter cycle times | 
| B. | Reduction in costs | 
| C. | Reaches wider audiences | 
| D. | all of the above | 
| Answer» E. | |
| 408. | 
                                    _ What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?$? | 
                            
| A. | Direct materials | 
| B. | Indirect materials | 
| C. | EDI | 
| D. | None of the above | 
| Answer» C. EDI | |
| 409. | 
                                    _ The primary source of financing during the early years of e-commerce was _______.$? | 
                            
| A. | bank loans | 
| B. | large retail firms | 
| C. | venture capital funds | 
| D. | initial public offerings | 
| Answer» D. initial public offerings | |
| 410. | 
                                    _ Which of the following connections allows the fastest download speeds?$? | 
                            
| A. | DSL | 
| B. | cable modem | 
| C. | T1 | 
| D. | T3 | 
| Answer» E. | |
| 411. | 
                                    _ Paisapay is facilitated in.$? | 
                            
| A. | eBay.co.in | 
| B. | amazon.com | 
| C. | flipkart.com | 
| D. | none of the above | 
| Answer» B. amazon.com | |
| 412. | 
                                    _ All of the following are wireless Internet access network technologies except ________.$? | 
                            
| A. | Wi-Fi | 
| B. | Bluetooth | 
| C. | Zigbee | 
| D. | GigaPoP | 
| Answer» E. | |
| 413. | 
                                    _ A business cannot be all things to all people. Instead, a business must:$? | 
                            
| A. | Identify target customers | 
| B. | Identify the value of products/services as perceived by customers | 
| C. | all of the above | 
| D. | None of the above | 
| Answer» D. None of the above | |
| 414. | 
                                    _ All of the following are factors in optimizing Web site performance except _________.$? | 
                            
| A. | page retrieval | 
| B. | page generation | 
| C. | page delivery | 
| D. | page content | 
| Answer» B. page generation | |
| 415. | 
                                    __The largest segment in the recruitment business is________.__ | 
                            
| A. | General job recruitment | 
| B. | Executive search | 
| C. | Specialized job placement services | 
| D. | Managerial recruitment | 
| Answer» B. Executive search | |
| 416. | 
                                    __All of the following are considered biometrics, except:__ | 
                            
| A. | Fingerprint | 
| B. | Retina | 
| C. | Password | 
| D. | Voice | 
| Answer» D. Voice | |
| 417. | 
                                    __Which of the following is not a type of media convergence?__ | 
                            
| A. | technological convergence | 
| B. | content convergence | 
| C. | industry convergence | 
| D. | community convergence | 
| Answer» E. | |
| 418. | 
                                    __Which of the following to viruses harm?__ | 
                            
| A. | Your keyboard | 
| B. | Your monitor | 
| C. | Your processor | 
| D. | Viruses do not harm any of the above | 
| Answer» E. | |
| 419. | 
                                    __What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?__ | 
                            
| A. | Risk management | 
| B. | Risk assessment | 
| C. | Security | 
| D. | None of the above | 
| Answer» C. Security | |
| 420. | 
                                    __Who protects system from external threats?__ | 
                            
| A. | firewall | 
| B. | EDI | 
| C. | ERP | 
| D. | Script kiddies | 
| Answer» B. EDI | |
| 421. | 
                                    __The __________ is the first major effort to adjust the copyright laws to the Internet age.__ | 
                            
| A. | Platform for Privacy Preferences (P3P) | 
| B. | Center for Democracy and Technology | 
| C. | Digital Millennium Copyright Act (DMCA) | 
| D. | E-Government Act of 2002 | 
| Answer» D. E-Government Act of 2002 | |
| 422. | 
                                    __All of the following are acts Congress has passed or attempted to pass to protect children online except __________.__ | 
                            
| A. | Video Privacy Protection Act | 
| B. | Children's Online Protection Act | 
| C. | Communications Decency Act | 
| D. | Children's Internet Protection Act | 
| Answer» B. Children's Online Protection Act | |
| 423. | 
                                    __Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry?__ | 
                            
| A. | barriers to entry | 
| B. | power of suppliers | 
| C. | power of consumers | 
| D. | industry value chain | 
| Answer» B. power of suppliers | |
| 424. | 
                                    __What sends work assignments through an e‚Äêmail system?__ | 
                            
| A. | Database‚Äêbased enterprise information portal | 
| B. | Messaging‚Äêbased enterprise information portal | 
| C. | Database‚Äêbased workflow system | 
| D. | Messaging‚Äêbased workflow system | 
| Answer» E. | |
| 425. | 
                                    __Which concept suggests that different applications and computer systems should be able to communicate with one another?__ | 
                            
| A. | Integration | 
| B. | Web services | 
| C. | Scalability | 
| D. | Interoperability | 
| Answer» E. | |
| 426. | 
                                    __All of the following are metrics for e-mail campaigns except _________.__ | 
                            
| A. | open rate | 
| B. | delivery rate | 
| C. | bounce-back rate | 
| D. | cart conversion rate | 
| Answer» E. | |
| 427. | 
                                    _What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‚Äêcommerce or commerce‚Äêrelated activities?$? | 
                            
| A. | Direct marketplace | 
| B. | B2B | 
| C. | B2C | 
| D. | Electronic marketplace | 
| Answer» E. | |
| 428. | 
                                    _The ability to change the product to better fit the needs of the customer is called ________.$? | 
                            
| A. | customization | 
| B. | personalization | 
| C. | privacy | 
| D. | accessibility | 
| Answer» B. personalization | |
| 429. | 
                                    _If you need to transfer money to another person via the internet, which of the following methods could you use?$? | 
                            
| A. | financial cybermediary | 
| B. | electronic check | 
| C. | electronic bill presentment and payment | 
| D. | all of the above | 
| Answer» E. | |
| 430. | 
                                    _The most common form of securing channels is through ________.$? | 
                            
| A. | S-HTTP | 
| B. | VPNs | 
| C. | SSL | 
| D. | PPTP | 
| Answer» D. PPTP | |
| 431. | 
                                    _What type of ad appears under a web page?$? | 
                            
| A. | pop‚Äêunder ad | 
| B. | pop‚Äêup ad | 
| C. | banner ad | 
| D. | discount ad | 
| Answer» B. pop‚Äö√Ñ√™up ad | |
| 432. | 
                                    _A worm is designed to spread _________.$? | 
                            
| A. | from computer to computer | 
| B. | from file to file on a computer | 
| C. | from Web site to Web site | 
| D. | from Web site to computer | 
| Answer» B. from file to file on a computer | |
| 433. | 
                                    _Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.$? | 
                            
| A. | encryption, decryption | 
| B. | private, public | 
| C. | encryption, public | 
| D. | public, private | 
| Answer» E. | |
| 434. | 
                                    _What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?$? | 
                            
| A. | US-CERT | 
| B. | OECD | 
| C. | IC3 | 
| D. | P3P | 
| Answer» B. OECD | |
| 435. | 
                                    _Which factor represents a system's ability to change quickly?$? | 
                            
| A. | Flexibility | 
| B. | Performance | 
| C. | Capacity planning | 
| D. | Benchmark | 
| Answer» B. Performance | |
| 436. | 
                                    _What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?$? | 
                            
| A. | Disaster recovery plan | 
| B. | Hot site | 
| C. | Cold site | 
| D. | Disaster recovery cost curve | 
| Answer» E. | |
| 437. | 
                                    _Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________.$? | 
                            
| A. | versioning | 
| B. | bundling | 
| C. | transactive content | 
| D. | price discrimination | 
| Answer» B. bundling | |
| 438. | 
                                    _What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?$? | 
                            
| A. | Client/server network | 
| B. | Intranet | 
| C. | Extranet | 
| D. | Thin client | 
| Answer» C. Extranet | |
| 439. | 
                                    _A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.$? | 
                            
| A. | database management system | 
| B. | data warehouse | 
| C. | SQL query | 
| D. | relational database | 
| Answer» E. | |
| 440. | 
                                    _Which one is the component of cybercash payment system?$? | 
                            
| A. | CC user software | 
| B. | CC merachant software | 
| C. | CC Server Software | 
| D. | All of the above | 
| Answer» E. | |
| 441. | 
                                    _Which one of the following is not one of the major types of e-commerce?$? | 
                            
| A. | C2B | 
| B. | B2C | 
| C. | B2B | 
| D. | C2C | 
| Answer» B. B2C | |
| 442. | 
                                    _What Web server functionality allows it verify usernames and passwords and process certificates and encryption information?$? | 
                            
| A. | Processing of HTTP requests | 
| B. | File Transfer Protocol | 
| C. | Data capture | 
| D. | Security services | 
| Answer» E. | |
| 443. | 
                                    _The fastest growing form of online advertising is _________.$? | 
                            
| A. | banner ads | 
| B. | pop-up ads | 
| C. | rich media/video ads | 
| D. | pop-under ads | 
| Answer» D. pop-under ads | |
| 444. | 
                                    _After television, the next largest major player in the commercial entertainment industry is _________.$? | 
                            
| A. | video games | 
| B. | music | 
| C. | radio | 
| D. | film | 
| Answer» E. | |
| 445. | 
                                    What are the most commonly used input devices today?$? | 
                            
| A. | Keyboard | 
| B. | Mouse | 
| C. | All of the above | 
| D. | None of the above | 
| Answer» D. None of the above | |
| 446. | 
                                    Why would a merchant want to customize products?$? | 
                            
| A. | To charge a higher price | 
| B. | To decrease costs | 
| C. | It is required in EC | 
| D. | Customers will only accept customized products | 
| Answer» B. To decrease costs | |
| 447. | 
                                    Smart card is better protected than other cards using.$? | 
                            
| A. | Encryption | 
| B. | Firewall | 
| C. | Hub | 
| D. | All the above | 
| Answer» B. Firewall | |
| 448. | 
                                    Which of the following is not one of the benefits of e-commerce to sellers?$? | 
                            
| A. | E-commerce offers greater flexibility in meeting customer needs | 
| B. | E-commerce is a powerful tool for customer relationship building | 
| C. | E-commerce can help to reduce costs | 
| D. | E-commerce increases the net cost per contact | 
| Answer» E. | |
| 449. | 
                                    What is software you don't want hidden inside software you do want?$? | 
                            
| A. | Adware | 
| B. | Trojan‚Äêhorse software | 
| C. | Spyware | 
| D. | All of the above | 
| Answer» E. | |
| 450. | 
                                    The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.$? | 
                            
| A. | general community | 
| B. | practice network | 
| C. | affinity community | 
| D. | interest-based social network | 
| Answer» E. | |