3. Barriers to entry into an industry are likely to be high if:
Correct : C. Requirement for economies of
4. A digital signature is required …..
i) to tie an electronic message to the sender’s identity
ii) for non repudiation of communication by a sender
Correct : B. i, ii and iii
5. Which of the following examines information passing through switches,
hubs, or routers?
Correct : B. Packet sniffer
6. Which type of e-commerce focuses on consumers dealing with each
other?
Correct : D. C2C
7. Which products are people most likely to be more uncomfortable buying
on the Internet?
Correct : B. Furniture
8. Which products are people most likely to be comfortable buying on the
Internet?
Correct : D. All of the above
9. Digital products are best suited for B2C e-commerce because they:
Correct : D. All of the above
10. All of the following are techniques B2C e-commerce companies use to
attract customers, except
Correct : D. Virtual marketing
11. E-commerce involves
Correct : D. all of the above
12. Which term represents a count of the number of people who visit one
site, click on an ad, and are taken to the site of the advertiser?
Correct : B. Click-through
13. What is the percentage of customers who visit a Web site and actually
buy something called?
Correct : D. Conversion rate
14. What are materials used in production in a manufacturing company or
are placed on the shelf for sale in a retail environment?
Correct : A. Direct materials
15. What are materials that are necessary for running a modern corporation,
but do not relate to the company’s primary business activities?
Correct : B. Indirect materials
16. What is another name for materials which cannot be linked to a specific
product or process?
Correct : B. Indirect materials
17. What are plastic cards the size of a credit card that contains an
embedded chip on which digital information can be stored?
Correct : D. Smart cards
18. Which form of e-commerce currently accounts for about 97% of all ecommerce revenues?
Correct : A. B2B
19. Which of the following are advantages normally associated with B2B ecommerce?
Correct : D. all of the above
20. If it is easy for competitors to enter the market, the threat of new entrants
is considered:
Correct : A. High
21. An industry is less attractive for suppliers when the rivalry among existing
competitors is:
Correct : A. High
22. Unique value auction mainly applies to?
Correct : B. Second hand products
23. Which of the following is a useful security mechanism when considering
business strategy and IT?
Correct : D. all the above
24. Which of the following statements accurately reflect the impact of
technology?
Correct : D. all of the above
25. Which type of products is lesser purchased using e-commerce?
Correct : A. automobiles
26. A business competing in a commodity like environment must focus on
which of the following?
Correct : A. Price
27. Which of the following refers to creating products tailored to individual
customers?
Correct : A. customisation
28. Materials used in the normal operation of a business but not related to
primary business operations are called what?
Correct : C. Indirect materials
29. What is the name given to an interactive business providing a centralised
market where many buyers and suppliers can come together for ecommerce or commerce-related activities?
Correct : D. Electronic marketplace
30. Which form of e-marketplace brings together buyers and sellers from
multiple industries, often for MRO materials?
Correct : A. horizontal
31. Which form of e-marketplace brings together buyers and sellers from the
same industry?
Correct : B. Vertical
32. Which, if any, of the following types of ads are people most willing to
tolerate?
Correct : D. none of the above
33. Which of the following is an Internet-based company that makes it easy
for one person to pay another over the Internet?
Correct : D. financial cybermediary
34. Which of the following is a method of transferring money from one
persons account to another?
Correct : A. electronic check
35. An electronic check is one form of what?
Correct : C. e-cash
36. If you need to transfer money to another person via the internet, which of
the following methods could you use?
Correct : D. all of the above
37. Which of the following permits the transmission of a bill, along with
payment of that bill, to be conducted over the Internet?
Correct : C. electronic bill presentment and payment
38. A combination of software and information designed to provide security
and information for payment is called a?
Correct : A. digital wallet
39. What is the name for direct computer-to-computer transfer of transaction
information contained in standard business documents?
Correct : D. electronic data interchange
40. Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____n key.
Correct : D. public, private
41. When a transaction is processed online, how can the merchant verify the
customers identity?
Correct : B. use secure electronic transactions
42. The practice of forging a return address on an e-mail so that the recipient
is fooled into revealing private information is termed?
Correct : D. spoofing
43. What is an internal organisational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
Correct : B. Intranet
44. What is an intranet that is restricted to an organisation and certain
outsiders, such as customers and suppliers?
Correct : C. Extranet
45. What is a detailed process for recovering information or an IT system in
the event of a catastrophic disaster such as a fire or flood?
Correct : A. Disaster recovery plan
46. What is a separate facility that does not have any computer equipment
but is a place where the knowledge workers can move after the disaster?
Correct : C. Cold site
47. What is a separate and fully equipped facility where the company can
move immediately after the disaster and resume business?
Correct : B. Hot site
48. What charts (1) the cost to your organisation of the unavailability of
information and technology and (2) the cost to your organisation of recovering from a disaster over time?
Correct : D. Disaster recovery cost curve
49. Which factor determines when the IT system will be available for
knowledge workers to access?
Correct : A. Availability
50. Which factor determines who has the right to access different types of IT
systems and information?
Correct : B. Accessibility
51. Which factor ensures the IT systems are functioning correctly and
providing accurate information?
Correct : C. Reliability
52. Which factor represents how well your system can adapt to increased
demands?
Correct : D. Scalability
53. Which factor represents a systems ability to change quickly?
Correct : A. Flexibility
54. What is a set of conditions used to measure how well a product or
system functions?
Correct : D. Benchmark
55. What determines the future IT infrastructure requirements for new
equipment and additional network capacity?
Correct : C. Capacity planning
56. What defines all of the steps or business rules, from beginning to end,
required for a process to run correctly?
Correct : A. Workflow
57. Which will not harm computer resources?
Correct : A. firewall
58. Which of the following is the primary characteristic of an intranet?
Correct : C. People outside the organisation cant access it
59. Which concept suggests that different applications and computer
systems should be able to communicate with one another?
Correct : D. Interoperability
60. Which service encompasses all technologies used to transmit and
process information on an across a network?
Correct : D. Web services
61. Which process can prevent data from losing due to computer problems
or human errors?
Correct : A. backup
62. Which process is used to reinstall data from a copy when the original
data has been lost?
Correct : B. recovery
63. Who breaks into other peoples computer systems and steals and
destroys information?
Correct : A. Hackers
64. What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about?
Correct : D. None of the above
65. What is a type of virus that spreads itself, not just from file to file, but
from computer to computer via e-mail and other Internet traffic?
Correct : B. Worm
66. What floods a Web site with so many requests for service that it slows
down or crashes?
Correct : C. Denial-of-service attack
67. What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to threats, to measure the risk exposure of these assets?
Correct : A. Risk management
68. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as:
Correct : B. Consumer to Business (C2B).
69. By electronic commerce we mean:
Correct : D. None of the above
70. E-commerce is
Correct : A. B2C
71. Advantages of e-commerce are
Correct : B. Economical
72. B2B2C is a model of
Correct : C. Data mining
73. Mobile commerce is same as
Correct : B. E-business
74. The types of Business to Business e-commerce are ................
Correct : D. All the above
75. Which of the following is not the example of business to consumer (B to C) e-commerce?
Correct : B. e-bay.com
76. Which driver promote E-commerce
Correct : A. Digital Convergence
77. Advantage of e-com is
Correct : A. Lower cost
78. Which model of e commerce deals with virtual auction?
Correct : D. Brokerage Model
79. When you look at e-commerce and e-business, which is the most realistic relationship between these two concepts?
Correct : C. E-commerce is a subset of e-business
80. Social network sites such as Facebook and Twitter have become increasingly popular for sell-side e-commerce and would normally be considered to be in which category?
Correct : A. Portal, publisher or media sites
81. A summary of how a company will generate a profit identifying its core product, target customers, position in the online marketplace, and projections for revenue and costs is known as:
Correct : C. Online business model
82. While search engines index registered sites which users search by inputting key words, which type of intermediary updates its content typically through text but can include video or audio delivered through RSS feeds?
Correct : C. Blog
83. What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and Google
Chrome examples of?
Correct : B. Web browsers
84. A hardened firewall host on an Intranet is
Correct : B. a software which runs on a special reserved computer on the intranet
85. Advantages of B2C commerce are
(i) Business gets a wide reach to customers
(ii) Payment for services easy
(iii) Shop can be open 24 hours a day seven days a week
(iv) Privacy of transaction always maintained
Correct : C. i and iii
86. Disadvantages of e-Commerce in India are
(i) internet access is not universally available
(ii) credit card payment security is not yet guaranteed
(iii) transactions are de-personalized and human contact is missing
(iv) cyberlaws are not in place
Correct : C. i, ii, iii
87. Most common uses of the Internet and the Web include communicating, shopping,
Correct : A. searching, entertainment, and education
88. The __________ is the multimedia interface to resources available on the Internet.
Correct : A. Web
89. The multimedia interface to the resources available on the Net is called the
Correct : A. World Wide Web
90. Rules for exchanging data between computers are called
Correct : C. protocols
91. Moving from one Web site to another is called
Correct : C. surfing
92. ____________ are networks that connect people within a company to each other and to the
company network.
Correct : B. Intranets
93. E-money is a ……………. medium for making payments
Correct : A. Digital
94. Acid testis a set of properties of money transfer that include
Correct : C. Both (a) and (b)
95. In…………………., each transaction must be independent
Correct : B. Isolation
96. In ICES test, C means
Correct : A. Consistency
97. Electronic payment is a financial transaction made …………. the use of paper documents