MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Commerce
ECommerce
Quiz 9
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Q.1
All of the following are potential benefits of B2B e-commerce except_________.
reduced amount of 'first-mover' advantages
decreased product cycle time
increased opportunities for collaborating with suppliers and distributors
increased production flexibility
Q.2
Which of the following best describes predicted growth in C2C and B2C auction spending?
B2C spending will overtake C2C spending
Both types of spending will increase
C2C spending will decrease while B2C increases
Both types of spending will decline at similar rates
Q.3
Companies can gather information about employees and potential employees from which of the following places?
Job applications
Credit reports
Companies that track Web surfers
All of the above
Q.4
What might identity thieves do with your identity?
Apply for and use credit cards
Apply for a loan
Change their identity
All of the above
Q.5
Which portal business model best describes Yahoo?
general purpose portal
affinity group based vertical market
focused content based vertical market
none of the above
Q.6
The foundation for contemporary supply chain management systems includes all of the following except _________.
supply chain simplification
continuous inventory replenishment
ERP systems
B2B electronic storefronts
Q.7
What is the unauthorized use, duplication, distribution or sale of copyrighted software?
Fair Use Doctrine
Pirated software
Counterfeit software
Privacy
Q.8
What is software you don't want hidden inside a software?
Adware
Trojan‐horse software
Spyware
All of the above
Q.9
The most common and easily understood type of Net marketplace is ______.
e-procurement marketplace
e-distributors
industry consortia
independent exchanges
Q.10
The marketplace for auction sites is best described as __________.
many sites attaining similar levels of profitability
easy to enter due to minimal barriers
populated mostly with small, thriving specialty sites
dominated by a handful of sites with established networks
Q.11
Unsolicited e‐mail is called what?
Junk mail
Spam
Extra mail
None of the above
Q.12
Goods directly involved in the production process are known as _________.
MRO goods
procured goods
indirect goods
direct goods
Q.13
An auction that has multiple winners that all pay the same price is an example of________.
uniform pricing
discriminatory pricing
bid rigging
price matching
Q.14
Cyber slacking consists of what activities?
Visiting “inappropriate” web sites
Visiting news sites
Chatting online with others about non‐work topics
All of the above
Q.15
Which of the following is not a common approach to phishing?
Send an official‐looking e‐mail asking for confidential information
Ask people to fill out and return a fake letter using postal mail
Ask people to click a link in an e‐mail to open a submission form on a web page
All of the above are uncommon approaches to phishing
Q.16
Which of the following portal revenue models involves charging for premium content?
ISP services
General advertising
Subscription fees
Tenancy deals
Q.17
A dynamically priced market that features few buyers and many sellers is a market that exhibits ______.
market neutrality
buyer bias
seller bias
owner bias
Q.18
Which of the following records logons and deletions?
Key logger
Packet sniffer
Log analysis tools
Screen captures
Q.19
The most popular type of auction on eBay is the _________.
Dutch Internet auction
Name Your Own Price auction
English auction
Professional service auction
Q.20
The two main types of Internet-based B2B commerce are_________.
Net marketplaces and private industrial networks
EDI and collaborative commerce
Net marketplaces and collaborative commerce
EDI and private industrial networks
Q.21
What is an electronic representation of cash?
Digital cash
Electronic cash
E‐cash
All of the above
Q.22
What is the name of the new anti‐Spam bill?
No‐Spam
CAN‐Spam
Spam‐Away
Stop Spam
Q.23
The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________.
ECD
EDI
IDE
BCB
Q.24
Which of the following is not a dimension of privacy?
Need for personal space
Need to feel in control of our possessions
Need to feel in control of our personal information
All of the above are dimensions of privacy
Q.25
Which of the following is not considered to be a drawback of Internet auctions?
market inefficiency
trust risks
fulfillment costs
delayed consumption costs
Q.26
Social networking sites primarily earn their revenue through _________.
advertising
subscriptions
donations
service fees
Q.27
Which of the following applies to the implementation of an idea?
Copyright
Intellectual property
Patent
Denial‐of‐service attack
Q.28
A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called?
Phishing
Carding
Brand spoofing
All of the above
Q.29
E‐mail messages may be stored on which of the following computers?
Sender's computer
Sender's server
Recipient's server
All of the above
Q.30
Which of the following is not a primary function of a portal?
navigation of the Web
social networking
commerce
content
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page