MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Commerce
ECommerce
Quiz 4
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Q.1
All of the following are examples of intelligent agent technology except ________.
automated response systems
automatic shipping confirmation
order status reports
online web bugs
Q.2
What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?
Disaster recovery plan
Hot site
Cold site
Disaster recovery cost curve
Q.3
Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet?
electronic check
electronic bill presentment and payment
conversion rates
financial cybermediary
Q.4
The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.
affiliate marketing
viral marketing
permission marketing
blog marketing
Q.5
Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect.
Bertrand's Law
the Law of Universal Prices
the Law of One Price
the Law of Perfect Commerce
Q.6
What is a model of a proposed product, service, or system?
Prototyping
Prototype
Proof‐of‐concept prototype
Selling prototype
Q.7
Which of the following is not considered to be one of the three phases of e-commerce?
Innovation
Consolidation
Preservation
Reinvention
Q.8
Which factor determines when your IT system will be available for knowledge workers to access?
Availability
Accessibility
Reliability
None of the above
Q.9
Which of the following is used in B2B to pay for purchases?
e‐commerce
financial electronic data interchange
electronic data exchange
electronic checks
Q.10
A security plan begins with a(n) is ______.
security policy
risk assessment
implementation plan
security organization
Q.11
The most prevalent online payment method is ______.
PayPal
checks
credit cards
debit
Q.12
When a transaction is processed online, how can the merchant verify the customer's identity?
use secure sockets layers
use secure electronic transactions
use electronic data interchange
use financial electronic data interchange
Q.13
The most widely used encryption standard is ______.
Advanced Encryption Standard (AES)
Data Encryption Standard (DES)
Universal Encryption Standard (UES)
Optimal Encryption Standard (OES)
Q.14
An electronic check is one form of what?
e‐commerce
online banking
e‐cash
check
Q.15
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
Disaster recovery plan
Hot site
Cold site
Disaster recovery cost curve
Q.16
__________ influence the behavior of others through their personality, skills, or other factors.
Opinion leaders
Direct reference groups
Indirect reference groups
Lifestyle groups
Q.17
What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
Client/server network
Intranet
Extranet
Thin client
Q.18
Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.
encryption, decryption
private, public
encryption, public
public, private
Q.19
The only payment system that is instantly convertible without intermediation is _______.
Credit card
Accumulating balance
Stored value
Cash
Q.20
What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?
US-CERT
OECD
IC3
P3P
Q.21
What type of ad appears on top of a web page?
pop‐under ad
pop‐up ad
banner ad
discount ad
Q.22
The most common type of Internet crime according to the IC3 is ______.
Credit card fraud
Check fraud
Non-delivery
Auction fraud
Q.23
All of the following are major categories of computer viruses except _________.
Macro viruses
File-infecting viruses
Script viruses
Trojan viruses
Q.24
A combination of software and information designed to provide security and information for payment is called a what?
digital wallet
pop up ad
shopping cart
encryption
Q.25
The most common form of securing channels is through ________.
S-HTTP
VPNs
SSL
PPTP
Q.26
When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.
phishing
pharming
a Denial of Service (DoS) attack
spoofing
Q.27
If you need to transfer money to another person via the internet, which of the following methods could you use?
financial cybermediary
electronic check
electronic bill presentment and payment
all of the above
Q.28
A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.
database management system
data warehouse
SQL query
relational database
Q.29
What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
Disaster recovery plan
Hot site
Cold site
Disaster recovery cost curve
Q.30
All of the following are types of data mining except ______.
selective data mining
query-driven data mining
model-driven data mining
rule-based data mining
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page