Q.1
All of the following are potential benefits of B2B e-commerce except_________.
Q.2
Which of the following best describes predicted growth in C2C and B2C auction spending?
Q.3
Companies can gather information about employees and potential employees from which of the following places?
Q.4
What might identity thieves do with your identity?
Q.5
Which portal business model best describes Yahoo?
Q.6
The foundation for contemporary supply chain management systems includes all of the following except _________.
Q.7
What is the unauthorized use, duplication, distribution or sale of copyrighted software?
Q.8
What is software you don't want hidden inside a software?
Q.9
The most common and easily understood type of Net marketplace is ______.
Q.10
The marketplace for auction sites is best described as __________.
Q.11
Unsolicited e‐mail is called what?
Q.12
Goods directly involved in the production process are known as _________.
Q.13
An auction that has multiple winners that all pay the same price is an example of________.
Q.14
Cyber slacking consists of what activities?
Q.15
Which of the following is not a common approach to phishing?
Q.16
Which of the following portal revenue models involves charging for premium content?
Q.17
A dynamically priced market that features few buyers and many sellers is a market that exhibits ______.
Q.18
Which of the following records logons and deletions?
Q.19
The most popular type of auction on eBay is the _________.
Q.20
The two main types of Internet-based B2B commerce are_________.
Q.21
What is an electronic representation of cash?
Q.22
What is the name of the new anti‐Spam bill?
Q.23
The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________.
Q.24
Which of the following is not a dimension of privacy?
Q.25
Which of the following is not considered to be a drawback of Internet auctions?
Q.26
Social networking sites primarily earn their revenue through _________.
Q.27
Which of the following applies to the implementation of an idea?
Q.28
A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called?
Q.29
E‐mail messages may be stored on which of the following computers?
Q.30
Which of the following is not a primary function of a portal?
0 h : 0 m : 1 s