E‐Commerce MCQ:- Part Three

  1. When a transaction is processed online, how can the merchant verify the customer’s identity?

a. use secure sockets layers
b. use secure electronic transactions
c. use electronic data interchange
d. use financial electronic data interchange

Answer: (b) use secure electronic transactions

2. The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed?

a. hacking
b. cracking
c. dumpster diving
d. spoofing

Answer: (d) spoofing

3. What is a model of a proposed product, service, or system?

a. Prototyping
b. Prototype
c. Proof‐of‐concept prototype
d. Selling prototype

Answer: (b) Prototype

4. What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?

a. Client/server network
b. Intranet
c. Extranet
d. Thin client

Answer: (b) Intranet

5. What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?

a. Client/server network
b. Intranet
c. Extranet
d. Thin client

Answer: (c) Extranet

6. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve

Answer: (a) Disaster recovery plan

7. What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?

a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve

Answer: (c) Cold site

8. What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?

a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve

Answer: (b) Hot site

9. What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?

a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve

Answer: (d) Disaster recovery cost curve

10. Which factor determines when your IT system will be available for knowledge workers to access?

a. Availability
b. Accessibility
c. Reliability
d. None of the above

Answer: (a) Availability

11. Which factor determines who has the right to access different types of IT systems and information?

a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer: (b) Accessibility

12. Which factor ensures your IT systems are functioning correctly and providing accurate information?

a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer: (c) Reliability

13. Which factor represents how well your system can adapt to increased demands?

a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer: (d) Scalability

14. Which factor represents a system’s ability to change quickly?

a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark

Answer: (a) Flexibility

15. What is a set of conditions used to measure how well a product or system functions?

a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark

Answer: (d) Benchmark

16. What determines the future IT infrastructure requirements for new equipment and additional network capacity?

a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark

Answer: (c) Capacity planning

17. What automates business processes?

a. Workflow
b. ASP
c. Workflow system
d. EIP

Answer: (c) Workflow system

18. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?

a. Workflow
b. EIP
c. Workflow system
d. SLA

Answer: (a) Workflow

19. What sends work assignments through an e‐mail system?

a. Database‐based enterprise information portal
b. Messaging‐based enterprise information portal
c. Database‐based workflow system
d. Messaging‐based workflow system

Answer: (d) Messaging‐based workflow system

20. Which will not harm computer resources

a. firewall
b. Virus
c. Trojan horse
d. None of the above

Answer: (a) firewall

21. Which is not a function of ERP?

a. Warehousing
b. sales
c. scheduling
d. None of the above

Answer: (d) None of the above

22. Which is a function of ERP?

a. Warehousing
b. sales
c. scheduling
d. all of the above

Answer: (d) all of the above

23. Which of the following is the primary characteristic of an intranet?

a. People outside the organization can access it
b. People inside the organization can’t access it
c. People outside the organization can’t access it
d. None of the above

Answer: (c) People outside the organization can’t access it

24. Which concept suggests that different applications and computer systems should be able to communicate with one another?

a. Integration
b. Web services
c. Scalability
d. Interoperability

Answer: (d) Interoperability

25. Which service encompasses all technologies used to transmit and process information on an across a network?

a. Interoperability
b. Scalability
c. Benchmarking
d. Web services

Answer: (d) Web services

26. Which process can prevent data from lose due to computer problems or human errors?

a. backup
b. recovery
c. benchmarking
d. data cleansing

Answer: (a) backup

27. Which process is used to reinstall data from a copy when the original data has been lost?

a. backup
b. recovery
c. benchmarking
d. data cleansing

Answer: (b) recovery

28. What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

a. Performance
b. Capacity planning
c. Benchmarking
d. Data cleansing

Answer: (c) Benchmarking

29. Who protects system from external threats?

a. firewall
b. EDI
c. ERP
d. Script kiddies

Answer: (a) firewall

30. Who breaks into other people’s computer systems and steals and destroys information?

a. Hackers
b. software’s
c. Hacktivists
d. Script kiddies

Answer: (a) Hackers

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *