0

500 ECommerce MCQs and answers

111 8 0
  • 500 ECommerce MCQs and answers

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Tài liệu liên quan

Thông tin tài liệu

Ngày đăng: 25/11/2021, 13:32

E-Commerce Multiple Choice Questions Among the alternate models of B2B e-commerce,……is the best means to obtain a competitive advantage in the Market place A Process based B strategic relationship based C transaction based D any of these …………… focus on producing a highly integrated value proposition through a managed process A hubs B community C contents D none of these …………………is basically a concept of online marketing and distributing of products and services over the internet A B2G B B2E C B2C D B2B …………………… e-commerce consists of the sale of products or services from a business to the general public A B2G B B2E C B2B D B2C Which of the following is not suitable for a B2C transaction ? A clothes B flowers C airline reservation D none …………… e-commerce transaction has the advantage of eliminating middlemen A B2G B B2C C B2B D B2E 7………………….e-commerce involves customers gathering information, purchasing and receiving products over an electronic network A B2G B B2E C B2B D B2C Which among the following is not an user of B2C e-commerce ? A manufacturers B distributors C Publishers D none ………………….e-commerce involves the electronic facilitation of transaction between customers through some third party A C2C B B2E C B2B D B2G 10 Which among the following is an example of C2C ? A e-Bay B Amazon.com C Rentalic.com D all of these 11 World Wide Web (WWW) was introduced in the year …………………… A 1994 B 1996 C 1992 D 1990 12 ……………….is an early form of E-commerce A SCM B EDI C Both of these D None of these 13 ……………… is concerned with the buying and selling information, products and services over computer communication networks A Commerce B E-Commerce C E-Business D None of these 14 ……………… is a set of standards developed in the 1960s to exchange business information and to electronic transactions A EDI B Protocols C TCP/IP D None of these 15 Which among the following product is suitable for E-Commerce ? A Books B Vegetables C All of these D None of these 16 ……………allows a business application on the computer of one organization to communicate directly with the business application on the computer of another company A EDI B Protocols C Standards D Business applications 17) Electronic Exchange of business documents in a standard format is known as ……………… A E-commerce B E-Business C EDI D None of these 18) ……………… is essentially a business process that connects manufacturers, retailers, customers and suppliers in the form of a chain to develop and deliver products A E-commerce B EDI C Networking D SCM 19) Which of the following is not a party of SCM ? A Suppliers B Manufacturers C Distributors D Customers 20 ………………is a commercial process that includes production, distribution, sales or delivery of goods and services through electronic means A E-commerce B SCM C EDI D None of these 21 …………………is a class of advertising methods which are considered unethical and may even be illegal A Advertorials B pop-up ads C Spam e-mail D malware Answer: D 22 ……………….is the most common way for purchasing an online advertising A CPM B CPC C Any of these D none of these Answer: C 23 ………………are animated full screen ads placed at the entry of a site before a user reaches the intended content A pop-up ads B Intromercials C Spam e-mail D malware Answer: B 24 ………………….are interactive online ads that require the user to respond intermittently in order to wade through the message before reaching the intended content A Ultramercials B pop-up ads C Spam e-mail D malware Answer: A 25 ……………facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, without being involved in the actual exchange of goods and services between the parties A Metamediary B Intermediary C middlemen D all of these Answer: A 26 ………………is any transaction, involving the transfer or rights to use goods and services, which is initiated and or completed by using mobile access to computer mediated networks with the help of an electronic device A Mobile Commerce B e-commerce C both of these D none of these Answer: A 27 …………….provide security and privacy for the use of the web page content A HTTP B html C FTP D none of these Answer: A 28 …………………….website is one that changes or customizes itself frequently and automatically based on certain criteria A Dynamic website B Static Website C phish site D none of these Answer: A 29 ………………site is created to fraudulently acquire sensitive information such as pass words and credit card details, by masquerading as a trustworthy person or business A Dynamic website B Static Website C phish site D none of these Answer: C 30 ……………….in the e-commerce may be a holder of a payment card such as credit card or debit card from an issuer A customer B issuer C Merchant D Acquirer Answer: A 31 The purpose of ………………page is to provide links to other pages A Home page B Web page C Summary page D None of these Answer: A 32 ……………is an example for a software that visits suggested pages and return the appropriate information to be indexed by the search Engine A Robot B Spiders C Ants D All Answer: D 33 …………………… ads appears as rectangular graphics near the top of the page A Banner ads B floating ads C interstitials D Unicast ads Answer: A 34 ………………….ads take up the entire screen and are more powerful than banner ads A Banner ads B floating ads C interstitials D Unicast ads Answer: B 35 ………………………….is a form of advertisement on the web that appears between web pages that the user requests A Banner ads B floating ads C interstitials D Unicast ads Answer: C 36 ……………………is basically a TV commercial that runs in the browser window A Banner ads B floating ads C interstitials D Unicast ads Answer: D 37 Advertisements take the form of a website copy are called………………… A Advertorials B pop-up ads C Spam e-mail D none of these Answer: A 38 ……………… is the most unwanted of online advertising methods A Advertorials B pop-up ads C Spam e-mail D none of these Answer: B 39 ………………… is an unsolicited e-mail sent to every e-mail address that a business can find A Advertorials B pop-up ads C Spam e-mail D none of these Answer: C 40 ………………… is the buying and selling of goods and services through wireless handled devices such as cellular phone and Personal Digital Assistants A Mobile Commerce B e-commerce C both of these D none of these Answer: A 41 Peer to Peer [P2P] is also used to describe ……………………… A C2C B B2E C B2B D B2C Answer: A 42 …………………….is an online auctioning site that facilitates the trade of privately owned items between individuals A e-Bay B Amazon.com C Rentalic.com D all of these Answer: A 43 Monster.com is an example of …………………… website A C2C B B2E C B2B D B2C Answer: A 44 ………………….is an internet network that allows users with the same network in software to connect to each other’s hard disks and exchange files A B2C B B2E C B2B D P2P Answer: D 45 This is a protocol which allows files to be transferred from one computer to another computer A TCP/IP B FTP C HTTP D none of these Answer: B 46 A ……………….is a document, typically written in plain text interspersed with formatting instructions of html A Web page B home page C domain D none of these Answer: A 47 ………………….is the first page of a web site A Web page B home page C domain D none of these Answer: B 48 …………… allows the person to type ion just the main word or words and the site will come in A Web page B home page C domain D none of these Answer: C 49 ”Google” is one of the most popular……………… A Portal B Browser C Search Engine D none of these Answer: C 50 A ………………… presents information from diverse sources in a unified way in a web site A Web portal B Link page 411 E-commerce involves A marketing B advertising C warehousing D all of the above Answer: D.all of the above 412 Which term represents a count of the number of people who visit onesite, click on an ad, and are taken to the site of the advertiser? A Affiliate programs B Click-through C Spam D All of the above Answer: B.Click-through 413 What is the percentage of customers who visit a Web site and actuallybuy something called? A Affiliate programs B Click-through C Spam D Conversion rate Answer: D.Conversion rate 414 What are materials used in production in a manufacturing company orare placed on the shelf for sale in a retail environment? A Direct materials B Indirect materials C EDI D None of the above Answer: A.Direct materials 415 What are materials that are necessary for running a modern corporation,but not relate to the company’s primary business activities? A Direct materials B Indirect materials C EDI D None of the above Answer: B.Indirect materials 416 What is another name for materials which cannot be linked to a specificproduct or process? A Direct materials B Indirect materials C EDI D None of the above Answer: B.Indirect materials 417 What are plastic cards the size of a credit card that contains anembedded chip on which digital information can be stored? A Customer relationship management systems cards B E-government identity cards C FEDI cards D Smart cards Answer: D.Smart cards 418 Which form of e-commerce currently accounts for about 97% of all ecommerce revenues? A B2B B B2C C C2B D C2C Answer: A.B2B 419 Which of the following are advantages normally associated with B2B ecommerce? A Shorter cycle times B Reduction in costs C Reaches wider audiences D all of the above Answer: D.all of the above 420 If it is easy for competitors to enter the market, the threat of new entrantsis considered: A High B Low C More D Less Answer: A.High 421 An industry is less attractive for suppliers when the rivalry among existingcompetitors is: A High B Low C More D Less Answer: A.High 422 Unique value auction mainly applies to? A New products B Second hand products C Engineering products D None of the above Answer: B.Second hand products 423 Which of the following is a useful security mechanism when consideringbusiness strategy and IT? A encryption B decryption C firewall D all the above Answer: D.all the above 424 Which of the following statements accurately reflect the impact oftechnology? A Technology has caused buyer power to increase B Technology has lessened the entry barriers for many industries C Technology has increased the threat of substitute products and services D all of the above Answer: D.all of the above 425 Which type of products is lesser purchased using e-commerce? A automobiles B books C softwares D none Answer: A.automobiles 426 A business competing in a commodity like environment must focus onwhich of the following? A Price B Ease / speed of delivery C Ease of ordering D all of the above Answer: A.Price 427 Which of the following refers to creating products tailored to individualcustomers? A customisation B aggregation C Direct materials D Reverse auction Answer: A.customisation 428 Materials used in the normal operation of a business but not related toprimary business operations are called what? A Supplies B Direct materials C Indirect materials D Daily stuff Answer: C.Indirect materials 429 What is the name given to an interactive business providing a centralisedmarket where many buyers and suppliers can come together for ecommerce or commerce-related activities? A Direct marketplace B B2B C B2C D Electronic marketplace Answer: D.Electronic marketplace 430 Which form of e-marketplace brings together buyers and sellers frommultiple industries, often for MRO materials? A horizontal B Vertical C Integrated D Inclined Answer: A.horizontal 431 Which form of e-marketplace brings together buyers and sellers from thesame industry? A horizontal B Vertical C Integrated D Inclined Answer: B.Vertical 432 Which, if any, of the following types of ads are people most willing totolerate? A pop-under ad B pop-up ad C banner ad D none of the above Answer: D.none of the above 433 Which of the following is an Internet-based company that makes it easyfor one person to pay another over the Internet? A electronic check B electronic bill presentment and payment C conversion rates D financial cybermediary Answer: D.financial cybermediary 434 Which of the following is a method of transferring money from onepersons account to another? A electronic check B credit card C e-transfer D none of the above Answer: A.electronic check 435 An electronic check is one form of what? A e-commerce B online banking C e-cash D check Answer: C.e-cash 436 If you need to transfer money to another person via the internet, which ofthe following methods could you use? A financial cybermediary B electronic check C electronic bill presentment and payment D all of the above Answer: D.all of the above 437 Which of the following permits the transmission of a bill, along withpayment of that bill, to be conducted over the Internet? A financial cybermediary B electronic check C electronic bill presentment and payment D all of the above Answer: C.electronic bill presentment and payment 438 A combination of software and information designed to provide securityand information for payment is called a? A digital wallet B pop up ad C shopping cart D encryption Answer: A.digital wallet 439 What is the name for direct computer-to-computer transfer of transactioninformation contained in standard business documents? A internet commerce B e-commerce C transaction information transfer D electronic data interchange Answer: D.electronic data interchange 440 Public key encryption uses multiple keys One key is used to encrypt data, while another is used to decrypt data The key used to encrypt data is called the _ key, while the key used to decrypt data is called the _n key A encryption, decryption B private, public C encryption, public D public, private Answer: D.public, private 441 When a transaction is processed online, how can the merchant verify thecustomers identity? A use secure sockets layers B use secure electronic transactions C use electronic data interchange D use financial electronic data interchange Answer: B.use secure electronic transactions 442 The practice of forging a return address on an e-mail so that the recipientis fooled into revealing private information is termed? A hacking B cracking C dumpster diving D spoofing Answer: D.spoofing 443 What is an internal organisational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? A Client/server network B Intranet C Extranet D Thin client Answer: B.Intranet 444 What is an intranet that is restricted to an organisation and certainoutsiders, such as customers and suppliers? A Client/server network B Intranet C Extranet D Thin client Answer: C.Extranet 445 What is a detailed process for recovering information or an IT system inthe event of a catastrophic disaster such as a fire or flood? A Disaster recovery plan B Hot site C Cold site D Disaster recovery cost curve Answer: A.Disaster recovery plan 446 What is a separate facility that does not have any computer equipmentbut is a place where the knowledge workers can move after the disaster? A Disaster recovery plan B Hot site C Cold site D Disaster recovery cost curve Answer: C.Cold site 447 What is a separate and fully equipped facility where the company canmove immediately after the disaster and resume business? A Disaster recovery plan B Hot site C Cold site D Disaster recovery cost curve Answer: B.Hot site 448 What charts (1) the cost to your organisation of the unavailability ofinformation and technology and (2) the cost to your organisation of recovering from a disaster over time? A Disaster recovery plan B Hot site C Cold site D Disaster recovery cost curve Answer: D.Disaster recovery cost curve 449 Which factor determines when the IT system will be available forknowledge workers to access? A Availability B Accessibility C Reliability D None of the above Answer: A.Availability 450 Which factor determines who has the right to access different types of ITsystems and information? A Availability B Accessibility C Reliability D Scalability Answer: B.Accessibility 451 Which factor ensures the IT systems are functioning correctly andproviding accurate information? A Availability B Accessibility C Reliability D Scalability Answer: C.Reliability 452 Which factor represents how well your system can adapt to increaseddemands? A Availability B Accessibility C Reliability D Scalability Answer: D.Scalability 453 Which factor represents a systems ability to change quickly? A Flexibility B Performance C Capacity planning D Benchmark Answer: A.Flexibility 454 What is a set of conditions used to measure how well a product orsystem functions? A Flexibility B Performance C Capacity planning D Benchmark Answer: D.Benchmark 455 What determines the future IT infrastructure requirements for newequipment and additional network capacity? A Flexibility B Performance C Capacity planning D Benchmark Answer: C.Capacity planning 456 What defines all of the steps or business rules, from beginning to end,required for a process to run correctly? A Workflow B EIP C Workflow system D SLA Answer: A.Workflow 457 Which will not harm computer resources? A firewall B Virus C Trojan horse D None of the above Answer: A.firewall 458 Which of the following is the primary characteristic of an intranet? A People outside the organisation can access it B People inside the organisation cant access it C People outside the organisation cant access it D None of the above Answer: C.People outside the organisation cant access it 459 Which concept suggests that different applications and computersystems should be able to communicate with one another? A Integration B Web services C Scalability D Interoperability Answer: D.Interoperability 460 Which service encompasses all technologies used to transmit andprocess information on an across a network? A Interoperability B Scalability C Benchmarking D Web services Answer: D.Web services 461 Which process can prevent data from losing due to computer problemsor human errors? A backup B recovery C benchmarking D data cleansing Answer: A.backup 462 Which process is used to reinstall data from a copy when the originaldata has been lost? A backup B recovery C benchmarking D data cleansing Answer: B.recovery 463 Who breaks into other peoples computer systems and steals anddestroys information? A Hackers B softwares C Hacktivists D Script kiddies Answer: A.Hackers 464 What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about? A Web log B Clickstream C Anonymous Web browsing service D None of the above Answer: D.None of the above 465 What is a type of virus that spreads itself, not just from file to file, butfrom computer to computer via e-mail and other Internet traffic? A Computer virus B Worm C Denial-of-service attack D None of the above Answer: B.Worm 466 What floods a Web site with so many requests for service that it slowsdown or crashes? A Computer virus B Worm C Denial-of-service attack D None of the above Answer: C.Denial-of-service attack 467 What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to threats, to measure the risk exposure of these assets? A Risk management B Risk assessment C Security D None of the above Answer: A.Risk management ... 40 ………………… is the buying and selling of goods and services through wireless handled devices such as cellular phone and Personal Digital Assistants A Mobile Commerce B e-commerce C both of these... E-commerce A SET and SCL B SCM and ERP C EDI and EFT D None of these Answer: C 76 ………………were the first to establish prominent E-commerce Brands A Baazar.com B E-bay and Amazon C E-trade.com D none... example for E-commerce A Amazon.com B Baazar.com C E-trade.com D None of these Answer: C 75 ……………… .and ………………… were the enabling technologies that laid the ground work for E-commerce A SET and SCL
- Xem thêm -

Xem thêm: 500 ECommerce MCQs and answers, 500 ECommerce MCQs and answers