Explore topic-wise MCQs in Commerce.

This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.

401.

_ Private Key cryptography is also known as¬¨‚Ä __________ cryptography.$?

A. Public key
B. Symmetric
C. Asymmetric
D. None
Answer» C. Asymmetric
402.

_ A perfect market is one in which __________.$?

A. One firm develops an advantage based on a factor of production that other firms cannot purchase
B. One participant in the market has more resources than the others
C. there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production
D. competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage
Answer» D. competition is at a minimum, as each niche market within an industry is served by the company with the greatest competitive advantage
403.

_ The best products to sell in B2C e‚Äêcommerce are:$?

A. Small products
B. Digital products
C. Specialty products
D. Fresh products
Answer» C. Specialty products
404.

_ Which of the following is an example of a portal?$?

A. Amazon
B. eBay
C. Yahoo
D. Face book
Answer» D. Face book
405.

_ All of the following are techniques B2C e‚Äêcommerce companies use to attract customers, except:$?

A. Registering with search engines
B. Viral marketing
C. Online ads
D. Virtual marketing
Answer» E.
406.

_ In 1961, __________ published a paper on "packet switching" networks.$?

A. Leonard Kleinrock
B. Ray Tomlinson
C. Bob Metcalfe
D. Vint Cerf
Answer» B. Ray Tomlinson
407.

_ Which of the following are advantages normally associated with B2B e‚Äêcommerce?$?

A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above
Answer» E.
408.

_ What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities?$?

A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Answer» C. EDI
409.

_ The primary source of financing during the early years of e-commerce was _______.$?

A. bank loans
B. large retail firms
C. venture capital funds
D. initial public offerings
Answer» D. initial public offerings
410.

_ Which of the following connections allows the fastest download speeds?$?

A. DSL
B. cable modem
C. T1
D. T3
Answer» E.
411.

_ Paisapay is facilitated in.$?

A. eBay.co.in
B. amazon.com
C. flipkart.com
D. none of the above
Answer» B. amazon.com
412.

_ All of the following are wireless Internet access network technologies except ________.$?

A. Wi-Fi
B. Bluetooth
C. Zigbee
D. GigaPoP
Answer» E.
413.

_ A business cannot be all things to all people. Instead, a business must:$?

A. Identify target customers
B. Identify the value of products/services as perceived by customers
C. all of the above
D. None of the above
Answer» D. None of the above
414.

_ All of the following are factors in optimizing Web site performance except _________.$?

A. page retrieval
B. page generation
C. page delivery
D. page content
Answer» B. page generation
415.

__The largest segment in the recruitment business is________.__

A. General job recruitment
B. Executive search
C. Specialized job placement services
D. Managerial recruitment
Answer» B. Executive search
416.

__All of the following are considered biometrics, except:__

A. Fingerprint
B. Retina
C. Password
D. Voice
Answer» D. Voice
417.

__Which of the following is not a type of media convergence?__

A. technological convergence
B. content convergence
C. industry convergence
D. community convergence
Answer» E.
418.

__Which of the following to viruses harm?__

A. Your keyboard
B. Your monitor
C. Your processor
D. Viruses do not harm any of the above
Answer» E.
419.

__What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?__

A. Risk management
B. Risk assessment
C. Security
D. None of the above
Answer» C. Security
420.

__Who protects system from external threats?__

A. firewall
B. EDI
C. ERP
D. Script kiddies
Answer» B. EDI
421.

__The __________ is the first major effort to adjust the copyright laws to the Internet age.__

A. Platform for Privacy Preferences (P3P)
B. Center for Democracy and Technology
C. Digital Millennium Copyright Act (DMCA)
D. E-Government Act of 2002
Answer» D. E-Government Act of 2002
422.

__All of the following are acts Congress has passed or attempted to pass to protect children online except __________.__

A. Video Privacy Protection Act
B. Children's Online Protection Act
C. Communications Decency Act
D. Children's Internet Protection Act
Answer» B. Children's Online Protection Act
423.

__Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry?__

A. barriers to entry
B. power of suppliers
C. power of consumers
D. industry value chain
Answer» B. power of suppliers
424.

__What sends work assignments through an e‚Äêmail system?__

A. Database‚Äêbased enterprise information portal
B. Messaging‚Äêbased enterprise information portal
C. Database‚Äêbased workflow system
D. Messaging‚Äêbased workflow system
Answer» E.
425.

__Which concept suggests that different applications and computer systems should be able to communicate with one another?__

A. Integration
B. Web services
C. Scalability
D. Interoperability
Answer» E.
426.

__All of the following are metrics for e-mail campaigns except _________.__

A. open rate
B. delivery rate
C. bounce-back rate
D. cart conversion rate
Answer» E.
427.

_What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‚Äêcommerce or commerce‚Äêrelated activities?$?

A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
Answer» E.
428.

_The ability to change the product to better fit the needs of the customer is called ________.$?

A. customization
B. personalization
C. privacy
D. accessibility
Answer» B. personalization
429.

_If you need to transfer money to another person via the internet, which of the following methods could you use?$?

A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Answer» E.
430.

_The most common form of securing channels is through ________.$?

A. S-HTTP
B. VPNs
C. SSL
D. PPTP
Answer» D. PPTP
431.

_What type of ad appears under a web page?$?

A. pop‚Äêunder ad
B. pop‚Äêup ad
C. banner ad
D. discount ad
Answer» B. pop‚Äö√Ñ√™up ad
432.

_A worm is designed to spread _________.$?

A. from computer to computer
B. from file to file on a computer
C. from Web site to Web site
D. from Web site to computer
Answer» B. from file to file on a computer
433.

_Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.$?

A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Answer» E.
434.

_What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?$?

A. US-CERT
B. OECD
C. IC3
D. P3P
Answer» B. OECD
435.

_Which factor represents a system's ability to change quickly?$?

A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer» B. Performance
436.

_What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?$?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer» E.
437.

_Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________.$?

A. versioning
B. bundling
C. transactive content
D. price discrimination
Answer» B. bundling
438.

_What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?$?

A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer» C. Extranet
439.

_A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.$?

A. database management system
B. data warehouse
C. SQL query
D. relational database
Answer» E.
440.

_Which one is the component of cybercash payment system?$?

A. CC user software
B. CC merachant software
C. CC Server Software
D. All of the above
Answer» E.
441.

_Which one of the following is not one of the major types of e-commerce?$?

A. C2B
B. B2C
C. B2B
D. C2C
Answer» B. B2C
442.

_What Web server functionality allows it verify usernames and passwords and process certificates and encryption information?$?

A. Processing of HTTP requests
B. File Transfer Protocol
C. Data capture
D. Security services
Answer» E.
443.

_The fastest growing form of online advertising is _________.$?

A. banner ads
B. pop-up ads
C. rich media/video ads
D. pop-under ads
Answer» D. pop-under ads
444.

_After television, the next largest major player in the commercial entertainment industry is _________.$?

A. video games
B. music
C. radio
D. film
Answer» E.
445.

What are the most commonly used input devices today?$?

A. Keyboard
B. Mouse
C. All of the above
D. None of the above
Answer» D. None of the above
446.

Why would a merchant want to customize products?$?

A. To charge a higher price
B. To decrease costs
C. It is required in EC
D. Customers will only accept customized products
Answer» B. To decrease costs
447.

Smart card is better protected than other cards using.$?

A. Encryption
B. Firewall
C. Hub
D. All the above
Answer» B. Firewall
448.

Which of the following is not one of the benefits of e-commerce to sellers?$?

A. E-commerce offers greater flexibility in meeting customer needs
B. E-commerce is a powerful tool for customer relationship building
C. E-commerce can help to reduce costs
D. E-commerce increases the net cost per contact
Answer» E.
449.

What is software you don't want hidden inside software you do want?$?

A. Adware
B. Trojan‚Äêhorse software
C. Spyware
D. All of the above
Answer» E.
450.

The type of social network described as a community built around a common interest such as games, sports, music, and so on is called _________.$?

A. general community
B. practice network
C. affinity community
D. interest-based social network
Answer» E.