E-BUSINESS MCQ

Multiple choice questions.

1. The dimension of e-commerce that enables commerce across national boundaries is called

A: interactivity                B. global reach              C. richness             D. ubiquity

Ans:B              

2. E-commerce technologies have improved upon traditional commerce technologies in _______

A. richness                B. reach                C. both richness and reach               D. neither richness nor reach

Ans: C

3. Which one of the following is not one of the major types of e-commerce?

A. C2B                    B.B2C               C. B2B                D. C2C

Ans: A

4. Compared toB2C e-commerce, B2B e-commerce is ________.

A. of equal size             B. slightly smaller             C. slightly larger            D. much larger

Ans: D

5. Which of the following is not considered to be one of the three phases of e-commerce?

A. innovation                 B. consolidation                    C. preservation                     D. reinvention

Ans: C

6. The idealistic market envisioned at the outset of the development of e-commerce is called ___________.

A. Bailey market               B. Baxter market             C. Bergman market             D. Bertrand market

Ans: D

7. The primary source of financing during the early years of e-commerce was _____________.

A. bank loans          B. large retail firms          C. venture capital funds           D. initial public offerings

Ans: C

8. The types of firms that benefited the most during the consolidation period of e-commerce were ______.

A. large, traditional firms              B. first movers               C. pure online companies           D. IPSs

Ans: A

9. All of the following are technologies used to gather information about you online expect ________.

A. spy ware                   B. cookies                       C. Gmail                    D. anonymizer

Ans: D

10. A __________ is the set of planned activities designed to result in a profit in a marketplace.

A. business model           B. profit model             C. business plan              D. revenue model

Ans: A

11. Which of the following is not a key element of a business model?

A. value preposition        B. competitive advantage         C. market strategy         D. universal standards

Ans: D

12. The source of revenue in a subscription revenue model is __________.

A. fees from advertisers in exchange for advertisements

B. fees from business referrals

C. fees from subscribers in exchange for access to content or services

D. fees for enabling or execution a transaction

Ans: C

13. Which of the following is an example of a portal?

A. Amazon             B. eBay           C. Yahoo         D. Facebook

Ans: B

14. All of the following are major B2C business model except __________.

A. content provider         B. industry consortium         C. transaction broker          D. service provider

Ans: B

15. The _________ business model involves an independently owned vertical digital marketplace for direct inputs.

A. e-distributor               B. exchange           C. e-procurement          D. private network individual

Ans: B

16. Compared to internet users, the number of cell phone subscriber is __________.

A. about the same         B. slightly fewer            C. much fewer         D. much larger

Ans: D

17. Industry structure is defined as __________.

A. the nature of the player in an industry and their relative bargaining power

B. a set of plans for achieving long term returns on the capital invested in a business firm

C. set of planned activities designed to result in a profit in a market place

D. how a company’s product or service fulfills the needs of a costumer

Ans: A

18. The area of actual or potential commercial value in which a company intends to operate is a _________.

A. market space             B. marketplace             C. perfect market           D. Bertrand market

Ans: A

19. A perfect market is one in which _________.

A. One firm develops an advantage based on a factor of production that other firs cannot purchase.

B. One participant in the market has more resources than the others.

C. there are no competitive advantages or asymmetries because all firms have equal access to all the factors of production.

D. competition is at minimum, as each niche market within an industry is served by the company with the greatest competitive advantage.

Ans: C

20. Which of the following is not a horizontal portal?

A. AOL              B. Yahoo           C. Salinet          D. MSN/Windows Live

Ans: C              

21. A situation where there are no differences among products or services,and the only basis of choosing

products is price is known as

A. a value web               B. value chain              C. profit                 D. commoditization

Ans: D

22. A strategy designed to compete in all markets around the globe is called a _________ strategy.

A. scope               B. differentiation               C. cost               D. focus 

Ans:A  

23. Which of the following is not one of the stages of the development of the internet?

A. innovation               B. institutionalization               C. Globalization               D. Commercialization

Ans: C

24. In 1ff61, ________ published a “packet switching” networks.

A. Leonard Kleinrock               B. Ray Tomlinson               C. Bob Metcalfe              D. Vint cerf

Ans:A

25. The component of TCP/IP that provides the internet’s addressing scheme and is responsible for the.

actual delivery packet is_______

A. TCP                 B.  IP                C. the network Layer             D.the Application Layer

Ans:B

26. Which protocol permits users to transfer files from the server to client computer, and vice versa?

A. HTTP               B. SMTP               C. IMAP                D. FTP

Ans: D

27. __________ is a program that you can run from the DOS prompt in the windows operating system in

order to check the connection between your client and the server

A. ping               B. Telnet                C. Tracert                   D. SSL

Ans:A

28. Broadband is generally considered to be any communication technology allowing streaming audio and video at or above_______

A. 100 Kbps                  B. 56.6  Kbps                 C. 30 kbps                D. 10 Kbps

Ans: A

29. Which of the following connections allows the fastest download speeds?

A. DSL                B. cable moderm                  C. T1                    D. T3

Ans:D 

30.Which of the following is not a limitation of the current internet?

A. insufficient capacity throughout the backbone                    B. network architecture limitations

C. insufficient reach                                        D. best- effort QOS

Ans:C

31. All of the following are goals of internet2 except_________

A. Creating a leading –edge very high –speed network capability for the national research community

B. Eliminating censorship from the internet

C. Enabling revolutionary internet applications

D. Ensuring the rapid transfer of new network services and applications to the broader internet community

Ans:B

32. Which of the following is a new and disruptive web features or service?

A. XML                    B. diffserv                        C. blogs               D. CDMA

Ans:C

33. All of the following are examples of 2G wireless phone technologies except______

A. CDMA                B. W-CDMA                     C. TDMA                   D. GSM

ANS: B

34. All of the following are wireless internet access network technologies except________

A. WI-FI                B. Bluetooth                C. Zigbee                    D. GigaPOP

Ans: D

35. Internet users account for about _______ of the world’s populations.

A. 7%                B. 17%               C. 27%                D. 47%

Ans:B

36. Which of the following was the first commercials web browser?

A. Mosaic                 B. Mozilla                  C. Netscape Navigator                   D. Internet explorer

Ans : C

37. All of the following are steps in the systems development life cycle except_______

A. Systems Design               B. Testing                 C. Implementations                  D. Debugging

Ans: D

38. A _______describe the flow of information at your e-commerce sit and the infrastructure that will

that will be used in the system

A. System design               B. Logical design                C. tactical design                   D. Physical design

Ans:B

39. All of the following are factors in optimizing web site performance except________

A. Page retrieval                    B. Page generation                   c. page delivery                     D. Page content

Ans: A

40. The largest component of a web site budget is ______

A. System maintenance                                                                B. system development                                      c.  content design and development                                            D. Telecommunications

Ans: A

41. The dominant web server software is_______

A. Zeus                 B. Apache                c. Microsoft IIS                d. Google

Ans:  B

42 . What web server functionally allows it verify usernames and process certificates and encryption information?

A. Processing of HTTP requests                             B. File transfer protocol

C. Data capture                                                           D. Security Services

Ans:D   

43. The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a________

A. Hardware platform                 B. Content platform                     C. transaction platform

D. Scalability platform

Ans:A

44. Redundant navigation refers to________

A.Pages that work ,load quickly, and point the customer toward your product offering

B. Simple, fool-proof navigation

C. a site working with the most popular browsers

D. alternative navigation to the same content

Ans:D  

45. The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as _______

A. Active server (ASP)

B. Java server page (JSP)

B. Common gateway interface (CGI)

D. VBScript

Ans:c

46. E-commerce merchant server software includes all of the following except________

A. Online e-mail                B. Online catalog                   C. Online shopping cart                        D.  Online credit card processing

Ans: A

47. Which of the following is not a widely used midrange or high -end e- commerce suite?

A. Microsoft commerce server                     B. Web Trends Marketing Lab2                       C. IBM Web SPHERE Commerce                          D. Broadvision Commerce

Ans:A  

48. The ability to change the product to better fit the needs of the customer is called_______

A. Customization                B. personalization                   C. privacy                D. accessibility

Ans:A

49. All of the following are tools for optimizing a web site’s location in search engine listing except_______

A. Keywords and page titles                 B. identifying market niches                     c. buying ads                    

D. benchmarking

Ans:D

50. The most common type of internet crime according to the IC3 is_______

A. Credit card fraud             B. Check fraud               C. Non- delivery               C. Auction fraud

Ans:D

51. In the e-commerce security environment, which of the following constitutes the inner-most layer?

A. people              B. data                 C. technology solutions               D. organizational policies and procedures

Ans:B

52. All of the following are major categories of computer viruses except_______

A. Macro viruses             B. File- infecting viruses                C. Script viruses               D. Trojan viruses

Ans:D

53. A worm is designed to spread_______.

A. from computer to computer                  B. from file to file on a computer               C. from web site to web site                D. from web site to computer

Ans: A

54. Malicious hackers who act with the intention of causing harm are______

A. White hats                B. Black hats                C. Gray hats                D. Brown hats

Ans:B

55. When hackers flood a web site with useless traffic to overwhelm the network, it is called______

A. phishing                 B. Pharming                C. a Denial of  service (DOS) attack                 D. spoofing

Ans:C

56. Which of the following is not a dimension of e-commerce security provided by encryption?

A. availability                  B. message integrity                 C. nonrepudiation               D. confidentiality

Ans:A

57. The most widely used encryption standard is________

A. Advanced Encryption Standard (AES)                               B. Data Encryption Standard (DES)                     C. Universal Encryption Standard (UES)                               D. Optimal Encryption Standard(OES)

Ans:A 

58. The most common form of securing channels is through_______

A. S-HTTP                 B. VPNs                    C. PPTP                 D. SSL

Ans:D

59. Firewalls perform all of the following functions except________

A. Forbids communications from untrustworthy sources                   B. Allows communications from trustworthy sources               C. Elimination viruses and other malicious attacks                 D. Filters traffic based on packet attributes

Ans:C

60. A security plan begins with a(n)is_______

A. Security policy                 B. risk assessment                   C. implementation             D. Security organization

Ans: B

61.The only payment system that is instantly convertible without intermediation is_______

A. Credit card    B. Accumulating balance    C. Stored value

Ans: D

62.The most prevalent online payment method is_______

A. Pay pal        B. Checks          C.  Credit cards       D.  debit

Ans C

63. What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses government and private sectors?

A. US-CERT                   B. OECD                     C. IC3                     D. P3P

Ans:A

64. After sending e-mail, which of the following activities is most common among internet users?

A. Sending instant messages                      B. reading someone else’s blog                     C. Using a search engine to find information                       D. getting news

Ans.C

65. ________ influence the behaviors of others through their personality, skills, or other factors.

A. Opinion leaders                   B. Direct reference groups             C. Indirect reference groups           D. Lifestyle groups

Ans:A

66. All of the following are reasons more people don’t shop online except___________

A. lack of trust in online merchants          B. lack of convenience          C. inability to touch and feel the product                   D. fear of misuse of personal information

Ans:B

67. A goods or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _________

A. commodity                 B. core product            C. actual product            D. augmented product

Ans:A

68. Complete price transparency in a perfect information marketplace is necessary for _______to take effect.

A. Bertrand’s Law              B. the Laws of universal prices               C. the Law of one price                 D. the Law of perfect commerce

Ans:C

69. A (n)___________ represents data as two – dimensions tables with records organized in rows and attributes in columns.

A. database management system                  B. date warehouse              C. SQL query                D. relational database

Ans: D

70. All of the following are types of data mining except__________.

A. selective data mining               B. query- driven data mining            C. model- driven data mining              D. rule- based data mining

Ans:A 

Which of the following market entry strategies are the most common for existing firms?

A. first mover               B. fast follower              C. brand extender               D. alliances

Ans:C

72. The process of getting customers to pass along a company’s marketing message to friends, family, and colleagues is known as _________.

A. affiliate marketing               B. viral marketing             C. permission marketing              D. blog marketing

Ans:B

73. The per- product price consumers are willing to pay for a bundle_________ as the number of goods in the bundle increases.

A. decreases            B. Increase          C. varies from product to product          D. stays the same

Ans:B

74. Creating multiple versions of information goods and selling essentially the same product to different market segment at different prices is called ________.

A. versioning           B. bundling          C. transactive  content              D. price discrimination

Ans:A        

75. All of the following are example of intelligent agent technology except_______.

A. automated responses systems               B. automatic shipping confirmation             C. order status reports                      D. online web bugs

Ans:D

76. E-business can be defined as____________.

A. the uninhibited flow of information and goods on web.

B. the use of the internet and the web to transact business

C. digitally enabled transactions and processes within an organization

D. commercial transactions involving electronic goods

Ans:C

77. The set of applications and technologies that allow users to create, edit, and distribute content online is known as___________.

A. Internet           B. Social networking               C. virtual life               D. web 2.0

Ans:D

78. Which of the following represents a limiting factor for the growth of e- commerce?

A. Persistent cultural attraction of physical markets and traditional shopping experiences.

B. Inadequate selection of goods compared to physical marketplaces.

C. E-commerce lacks the convenience of other methods of transacting business.

D. The potential audience for e-commerce is too low to support it as a widespread method of commerce.

Ans:A  

79. The fastest growing form of online advertising is _________.

A. banner ads.             B. pop-up ads.        C. rich media/video ads.             D. pop- under ads.

Ans:C

80. All the following are among the most common categories of spam except _________.

A. fraud            B. Commercial products                  C. finance                    D. health(drugs)

Ans:A

   

 


 

            

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *