On This Page

This set of E-Commerce Multiple Choice Questions & Answers (MCQs) focuses on E Commerce Set 9

Q1 | What Web server functionality allows it verify usernames and passwords and processcertificates and encryption information?
Q2 | The ability to change the product to better fit the needs of the customer is called______________.
Q3 | All of the following are major categories of computer viruses except ______________.
Q4 | The most prevalent online payment method is ______________.
Q5 | Complete price transparency in a perfect information marketplace is necessary for______________ to take effect.
Q6 | The process of getting customers to pass along a company's marketing message tofriends, family, and colleagues is known as ______________.
Q7 | All of the following are types of social marketing except ______________.
Q8 | The ethical principle which states that if an action is not right for all situations, then itis not right for any situation is known as ______________.
Q9 | What is the first step in a P3P-enabled transaction?
Q10 | The majority of job seekers rely on which of the following?
Q11 | Which of the following best describes predicted growth in C2C and B2C auctionspending?
Q12 | A materials requirements planning (MRP) system is an example of ______________.
Q13 | The E-commerce domain that involves business activity initiated by the consumer andtargeted to businesses is known as ______________.
Q14 | Why would a merchant want to customize products?
Q15 | A ______________ is the set of planned activities designed to result in a profit in amarketplace.
Q16 | Affiliate revenue is also called as _______.
Q17 | Standards of EDI are decided by ______
Q18 | ______ means converting readable text to unreadable text.
Q19 | ______ means converting unreadable text to readable text.
Q20 | _____ changes URL from http to https.
Q21 | In ____ server-side authentication is compulsory.
Q22 | An online retail store is called as _____.
Q23 | In _______, one consumer deals with another consumer.
Q24 | amazon.com is an example of ______
Q25 | In SSL encryption is done using ____ key.