Quiznetik

E-Commerce | Set 5

1. Reverse logistics is required because

Correct : D. All of the above

2. The purpose of supply chain management is

Correct : C. integrating supply and demand

3. Barriers to entry into an industry are likely to be high if:

Correct : C. Requirement for economies of

4. A digital signature is required ….. i) to tie an electronic message to the sender’s identity ii) for non repudiation of communication by a sender

Correct : B. i, ii and iii

5. Which of the following examines information passing through switches, hubs, or routers?

Correct : B. Packet sniffer

6. Which type of e-commerce focuses on consumers dealing with each other?

Correct : D. C2C

7. Which products are people most likely to be more uncomfortable buying on the Internet?

Correct : B. Furniture

8. Which products are people most likely to be comfortable buying on the Internet?

Correct : D. All of the above

9. Digital products are best suited for B2C e-commerce because they:

Correct : D. All of the above

10. All of the following are techniques B2C e-commerce companies use to attract customers, except

Correct : D. Virtual marketing

11. E-commerce involves

Correct : D. all of the above

12. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?

Correct : B. Click-through

13. What is the percentage of customers who visit a Web site and actually buy something called?

Correct : D. Conversion rate

14. What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment?

Correct : A. Direct materials

15. What are materials that are necessary for running a modern corporation, but do not relate to the company’s primary business activities?

Correct : B. Indirect materials

16. What is another name for materials which cannot be linked to a specific product or process?

Correct : B. Indirect materials

17. What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?

Correct : D. Smart cards

18. Which form of e-commerce currently accounts for about 97% of all ecommerce revenues?

Correct : A. B2B

19. Which of the following are advantages normally associated with B2B ecommerce?

Correct : D. all of the above

20. If it is easy for competitors to enter the market, the threat of new entrants is considered:

Correct : A. High

21. An industry is less attractive for suppliers when the rivalry among existing competitors is:

Correct : A. High

22. Unique value auction mainly applies to?

Correct : B. Second hand products

23. Which of the following is a useful security mechanism when considering business strategy and IT?

Correct : D. all the above

24. Which of the following statements accurately reflect the impact of technology?

Correct : D. all of the above

25. Which type of products is lesser purchased using e-commerce?

Correct : A. automobiles

26. A business competing in a commodity like environment must focus on which of the following?

Correct : A. Price

27. Which of the following refers to creating products tailored to individual customers?

Correct : A. customisation

28. Materials used in the normal operation of a business but not related to primary business operations are called what?

Correct : C. Indirect materials

29. What is the name given to an interactive business providing a centralised market where many buyers and suppliers can come together for ecommerce or commerce-related activities?

Correct : D. Electronic marketplace

30. Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO materials?

Correct : A. horizontal

31. Which form of e-marketplace brings together buyers and sellers from the same industry?

Correct : B. Vertical

32. Which, if any, of the following types of ads are people most willing to tolerate?

Correct : D. none of the above

33. Which of the following is an Internet-based company that makes it easy for one person to pay another over the Internet?

Correct : D. financial cybermediary

34. Which of the following is a method of transferring money from one persons account to another?

Correct : A. electronic check

35. An electronic check is one form of what?

Correct : C. e-cash

36. If you need to transfer money to another person via the internet, which of the following methods could you use?

Correct : D. all of the above

37. Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?

Correct : C. electronic bill presentment and payment

38. A combination of software and information designed to provide security and information for payment is called a?

Correct : A. digital wallet

39. What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents?

Correct : D. electronic data interchange

40. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____n key.

Correct : D. public, private

41. When a transaction is processed online, how can the merchant verify the customers identity?

Correct : B. use secure electronic transactions

42. The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?

Correct : D. spoofing

43. What is an internal organisational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?

Correct : B. Intranet

44. What is an intranet that is restricted to an organisation and certain outsiders, such as customers and suppliers?

Correct : C. Extranet

45. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

Correct : A. Disaster recovery plan

46. What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?

Correct : C. Cold site

47. What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?

Correct : B. Hot site

48. What charts (1) the cost to your organisation of the unavailability of information and technology and (2) the cost to your organisation of recovering from a disaster over time?

Correct : D. Disaster recovery cost curve

49. Which factor determines when the IT system will be available for knowledge workers to access?

Correct : A. Availability

50. Which factor determines who has the right to access different types of IT systems and information?

Correct : B. Accessibility

51. Which factor ensures the IT systems are functioning correctly and providing accurate information?

Correct : C. Reliability

52. Which factor represents how well your system can adapt to increased demands?

Correct : D. Scalability

53. Which factor represents a systems ability to change quickly?

Correct : A. Flexibility

54. What is a set of conditions used to measure how well a product or system functions?

Correct : D. Benchmark

55. What determines the future IT infrastructure requirements for new equipment and additional network capacity?

Correct : C. Capacity planning

56. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?

Correct : A. Workflow

57. Which will not harm computer resources?

Correct : A. firewall

58. Which of the following is the primary characteristic of an intranet?

Correct : C. People outside the organisation cant access it

59. Which concept suggests that different applications and computer systems should be able to communicate with one another?

Correct : D. Interoperability

60. Which service encompasses all technologies used to transmit and process information on an across a network?

Correct : D. Web services

61. Which process can prevent data from losing due to computer problems or human errors?

Correct : A. backup

62. Which process is used to reinstall data from a copy when the original data has been lost?

Correct : B. recovery

63. Who breaks into other peoples computer systems and steals and destroys information?

Correct : A. Hackers

64. What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about?

Correct : D. None of the above

65. What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic?

Correct : B. Worm

66. What floods a Web site with so many requests for service that it slows down or crashes?

Correct : C. Denial-of-service attack

67. What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to threats, to measure the risk exposure of these assets?

Correct : A. Risk management

68. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as:

Correct : B. Consumer to Business (C2B).

69. By electronic commerce we mean:

Correct : D. None of the above

70. E-commerce is

Correct : A. B2C

71. Advantages of e-commerce are

Correct : B. Economical

72. B2B2C is a model of

Correct : C. Data mining

73. Mobile commerce is same as

Correct : B. E-business

74. The types of Business to Business e-commerce are ................

Correct : D. All the above

75. Which of the following is not the example of business to consumer (B to C) e-commerce?

Correct : B. e-bay.com

76. Which driver promote E-commerce

Correct : A. Digital Convergence

77. Advantage of e-com is

Correct : A. Lower cost

78. Which model of e commerce deals with virtual auction?

Correct : D. Brokerage Model

79. When you look at e-commerce and e-business, which is the most realistic relationship between these two concepts?

Correct : C. E-commerce is a subset of e-business

80. Social network sites such as Facebook and Twitter have become increasingly popular for sell-side e-commerce and would normally be considered to be in which category?

Correct : A. Portal, publisher or media sites

81. A summary of how a company will generate a profit identifying its core product, target customers, position in the online marketplace, and projections for revenue and costs is known as:

Correct : C. Online business model

82. While search engines index registered sites which users search by inputting key words, which type of intermediary updates its content typically through text but can include video or audio delivered through RSS feeds?

Correct : C. Blog

83. What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and Google Chrome examples of?

Correct : B. Web browsers

84. A hardened firewall host on an Intranet is

Correct : B. a software which runs on a special reserved computer on the intranet

85. Advantages of B2C commerce are (i) Business gets a wide reach to customers (ii) Payment for services easy (iii) Shop can be open 24 hours a day seven days a week (iv) Privacy of transaction always maintained

Correct : C. i and iii

86. Disadvantages of e-Commerce in India are (i) internet access is not universally available (ii) credit card payment security is not yet guaranteed (iii) transactions are de-personalized and human contact is missing (iv) cyberlaws are not in place

Correct : C. i, ii, iii

87. Most common uses of the Internet and the Web include communicating, shopping,

Correct : A. searching, entertainment, and education

88. The __________ is the multimedia interface to resources available on the Internet.

Correct : A. Web

89. The multimedia interface to the resources available on the Net is called the

Correct : A. World Wide Web

90. Rules for exchanging data between computers are called

Correct : C. protocols

91. Moving from one Web site to another is called

Correct : C. surfing

92. ____________ are networks that connect people within a company to each other and to the company network.

Correct : B. Intranets

93. E-money is a ……………. medium for making payments

Correct : A. Digital

94. Acid testis a set of properties of money transfer that include

Correct : C. Both (a) and (b)

95. In…………………., each transaction must be independent

Correct : B. Isolation

96. In ICES test, C means

Correct : A. Consistency

97. Electronic payment is a financial transaction made …………. the use of paper documents

Correct : B. Without

98. Electronic payment media can be grouped into

Correct : D. All the above

99. ………………is a type of EPS

Correct : D. All the above

100. Smart card is same as…….

Correct : C. Both (a) and (b)