E Commerce Set 8
On This Page
This set of E-Commerce Multiple Choice Questions & Answers (MCQs) focuses on E Commerce Set 8
Q1 | he dimension of e-commerce that enables commerce across national boundaries is called______________.
- interactivity
- global reach
- richness
- ubiquity
Q2 | The primary source of financing during the early years of e-commerce was______________.
- bank loans
- large retail firms
- venture capital funds
- initial public offerings
Q3 | The source of revenue in a subscription revenue model is ______________.
- fees from advertisers in exchange for advertisements
- fees for business referrals
- fees from subscribers in exchange for access to content or services
- fees for enabling or execution a transaction
Q4 | Industry structure is defined as ______________.
- the nature of the players in an industry and their relative bargaining power
- a set of plans for achieving long term returns on the capital invested in a business firm
- set of planned activities designed to result in a profit in a marketplace
- how a company\s product or service fulfills the needs of customers
Q5 | The component of TCP/IP that provides the Internet's addressing scheme and isresponsible for the actual delivery of packets is ______________.
- tcp
- ip
- the network layer
- the application layer
Q6 | Which of the following is not a limitation of the current Internet?
- insufficient capacity throughout the backbone
- network architecture limitations
- insufficient reach
- best-efforts qos
Q7 | Internet users account for about ______________ of the world's population.
- 7%
- 17%
- 27%
- 47%
Q8 | The most common type of Internet crime according to the IC3 is ______________.
- credit card fraud
- check fraud
- non-delivery
- auction fraud
Q9 | When hackers flood a Web site with useless traffic to overwhelm the network, it iscalled ______________.
- phishing
- pharming
- a denial of service (dos) attack
- spoofing
Q10 | ______________ influence the behavior of others through their personality, skills, or otherfactors.
- opinion leaders
- direct reference groups
- indirect reference groups
- lifestyle groups
Q11 | A(n) ______________ represents data as two-dimensional tables with recordsorganized in rows and attributes in columns.
- database management system
- data warehouse
- sql query
- relational database
Q12 | Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.
- versioning
- bundling.
- transactive content
- price discrimination
Q13 | Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?
- loyalty
- reach
- recency
- unique visitors
Q14 | Which of the following statements about privacy is true?
- it is a moral right to be left alone
- only corporations and government need to be concerned about it
- it has only just recently become a concern
- it is most easily obtained on the internet
Q15 | The redirection of traffic from a legitimate site to an infringing site is called______________.
- cybersquatting
- cyber piracy
- met tagging
- key wording
Q16 | A security plan begins with a(n) is ______________.
- security policy
- risk assessment
- implementation plan
- security organization
Q17 | ______________ influence the behavior of others through their personality, skills, orother factors.
- opinion leaders
- direct reference groups
- indirect reference groups
- lifestyle groups
Q18 | Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.
- versioning
- bundling.
- transitive content
- price discrimination
Q19 | Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?
- loyalty
- reach
- regency
- unique visitors
Q20 | ______________ are networks that connect people within a company to each other andto the company network.
- bitstreams
- extranets
- internets
- intranets
Q21 | A website offering content created by third party transparently to customers is anexample of ______________.
- reinter mediation
- syndication
- virtual manufacturing
- build-to-order
Q22 | E-commerce technologies have improved upon traditional commerce technologies in______________.
- richness
- reach
- both richness and reach
- neither richness nor reach
Q23 | All of the following are technologies used to gather information about you onlineexcept ______________.
- spy ware
- cookies
- gmail
- anonymizers
Q24 | ______________ is a program that you can run from the DOS prompt in the Windowsoperating system in order to check the connection between your client and the server.
- ping
- telnet
- tracert
- ssl
Q25 | Which of the following is a new and disruptive Web feature or service?
- xml
- diffserv
- blogs
- cdma