Q.1
Which type of products is lesser purchased using eCommerce?
Q.2
What checks out your computer or network for potential weaknesses?
Q.3
The virus that are commonly found in word documents are called __________.
Q.4
The virus that are attached with vb and java files are called.
Q.5
Which factor represents how well your system can adapt to increased demands?
Q.6
E-business can be defined as_______.
Q.7
The combination of technical and legal means for protecting digital content from unlimited reproduction without permission is known as __________.
Q.8
Which of the following to viruses harm?
Q.9
What is the most commonly offered interactive feature of newspaper Web sites?
Q.10
The viruses spreads through __________.
Q.11
Which factor represents a system's ability to change quickly?
Q.12
The set of applications and technologies that allow users to create, edit, and distribute content online is known as______.
Q.13
What is a set of conditions used to measure how well a product or system functions?
Q.14
How the transactions occur in e‐commerce?
Q.15
A _________ describes the flow of information at your e-commerce site and the infrastructure that will be used in the system.
Q.16
Which of the following can a virus do?
Q.17
All of the following are factors in optimizing Web site performance except _________.
Q.18
A business competing in a commodity like environment must focus on which of the following?
Q.19
After television, the next largest major player in the commercial entertainment industry is _________.
Q.20
Internet users account for about ________ of the world's population.
Q.21
Which of the following statements accurately reflect the impact of technology?
Q.22
Which of the following is a useful security mechanism when considering business strategy and IT?
Q.23
All of the following are examples of 2G wireless phone technologies except _________.
Q.24
Which of the following describes e‐commerce?
Q.25
Which of the following was the first commercial Web browser?
Q.26
A business cannot be all things to all people. Instead, a business must:
Q.27
All of the following are steps in the systems development life cycle except ______.
Q.28
Which of the following is not related to security mechanism?
Q.29
All of the following are wireless Internet access network technologies except ________.
Q.30
A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)?
0 h : 0 m : 1 s