On This Page

This set of E-Commerce Multiple Choice Questions & Answers (MCQs) focuses on E Commerce Set 8

Q1 | he dimension of e-commerce that enables commerce across national boundaries is called______________.
  • interactivity
  • global reach
  • richness
  • ubiquity
Q2 | The primary source of financing during the early years of e-commerce was______________.
  • bank loans
  • large retail firms
  • venture capital funds
  • initial public offerings
Q3 | The source of revenue in a subscription revenue model is ______________.
  • fees from advertisers in exchange for advertisements
  • fees for business referrals
  • fees from subscribers in exchange for access to content or services
  • fees for enabling or execution a transaction
Q4 | Industry structure is defined as ______________.
  • the nature of the players in an industry and their relative bargaining power
  • a set of plans for achieving long term returns on the capital invested in a business firm
  • set of planned activities designed to result in a profit in a marketplace
  • how a company\s product or service fulfills the needs of customers
Q5 | The component of TCP/IP that provides the Internet's addressing scheme and isresponsible for the actual delivery of packets is ______________.
  • tcp
  • ip
  • the network layer
  • the application layer
Q6 | Which of the following is not a limitation of the current Internet?
  • insufficient capacity throughout the backbone
  • network architecture limitations
  • insufficient reach
  • best-efforts qos
Q7 | Internet users account for about ______________ of the world's population.
  • 7%
  • 17%
  • 27%
  • 47%
Q8 | The most common type of Internet crime according to the IC3 is ______________.
  • credit card fraud
  • check fraud
  • non-delivery
  • auction fraud
Q9 | When hackers flood a Web site with useless traffic to overwhelm the network, it iscalled ______________.
  • phishing
  • pharming
  • a denial of service (dos) attack
  • spoofing
Q10 | ______________ influence the behavior of others through their personality, skills, or otherfactors.
  • opinion leaders
  • direct reference groups
  • indirect reference groups
  • lifestyle groups
Q11 | A(n) ______________ represents data as two-dimensional tables with recordsorganized in rows and attributes in columns.
  • database management system
  • data warehouse
  • sql query
  • relational database
Q12 | Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.
  • versioning
  • bundling.
  • transactive content
  • price discrimination
Q13 | Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?
  • loyalty
  • reach
  • recency
  • unique visitors
Q14 | Which of the following statements about privacy is true?
  • it is a moral right to be left alone
  • only corporations and government need to be concerned about it
  • it has only just recently become a concern
  • it is most easily obtained on the internet
Q15 | The redirection of traffic from a legitimate site to an infringing site is called______________.
  • cybersquatting
  • cyber piracy
  • met tagging
  • key wording
Q16 | A security plan begins with a(n) is ______________.
  • security policy
  • risk assessment
  • implementation plan
  • security organization
Q17 | ______________ influence the behavior of others through their personality, skills, orother factors.
  • opinion leaders
  • direct reference groups
  • indirect reference groups
  • lifestyle groups
Q18 | Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.
  • versioning
  • bundling.
  • transitive content
  • price discrimination
Q19 | Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?
  • loyalty
  • reach
  • regency
  • unique visitors
Q20 | ______________ are networks that connect people within a company to each other andto the company network.
  • bitstreams
  • extranets
  • internets
  • intranets
Q21 | A website offering content created by third party transparently to customers is anexample of ______________.
  • reinter mediation
  • syndication
  • virtual manufacturing
  • build-to-order
Q22 | E-commerce technologies have improved upon traditional commerce technologies in______________.
  • richness
  • reach
  • both richness and reach
  • neither richness nor reach
Q23 | All of the following are technologies used to gather information about you onlineexcept ______________.
  • spy ware
  • cookies
  • gmail
  • anonymizers
Q24 | ______________ is a program that you can run from the DOS prompt in the Windowsoperating system in order to check the connection between your client and the server.
  • ping
  • telnet
  • tracert
  • ssl
Q25 | Which of the following is a new and disruptive Web feature or service?
  • xml
  • diffserv
  • blogs
  • cdma