Top 80+ Solved E-Business MCQ Questions Answer
Q. When a transaction is processed online, how can the merchant verify the customer's identity?
a. use secure sockets layers
b. use secure electronic transactions
c. use electronic data interchange
d. use financial electronic data interchange
Q. The practice of forging a return address on an e-mail so that the recipient is fooled intorevealing private information is termed?
a. hacking
b. cracking
c. dumpster diving
d. spoofing
Q. What is a model of a proposed product, service, or system?
a. prototyping
b. prototype
c. proof-of-concept prototype
d. selling prototype
Q. What is an internal organizational Internet that is guarded against outside access by a specialsecurity feature called a firewall (which can be software, hardware, or a combination of thetwo)?
a. client/server network
b. intranet
c. extranet
d. thin client
Q. What is an intranet that is restricted to an organization and certain outsiders, such as customersand suppliers?
a. client/server network
b. intranet
c. extranet
d. thin client
Q. What is a detailed process for recovering information or an IT system in the event of acatastrophic disaster such as a fire or flood?
a. disaster recovery plan
b. hot site
c. cold site
d. disaster recovery cost curve
Q. What is a separate facility that does not have any computer equipment but is a place where theknowledge workers can move after the disaster?
a. disaster recovery plan
b. hot site
c. cold site
d. disaster recovery cost curve
Q. What is a separate and fully equipped facility where the company can move immediately afterthe disaster and resume business?
a. disaster recovery plan
b. hot site
c. cold site
d. disaster recovery cost curve
Q. What charts (1) the cost to your organization of the unavailability of information and technologyand (2) the cost to your organization of recovering from a disaster over time?
a. disaster recovery plan
b. hot site
c. cold site
d. disaster recovery cost curve
Q. Which factor determines when your IT system will be available for knowledge workers toaccess?
a. availability
b. accessibility
c. reliability
d. none of the above
Q. Which factor determines who has the right to access different types of IT systems andinformation?
a. availability
b. accessibility
c. reliability
d. scalability
Q. Which factor ensures your IT systems are functioning correctly and providing accurateinformation?
a. availability
b. accessibility
c. reliability
d. scalability
Q. Which factor represents how well your system can adapt to increased demands?
a. availability
b. accessibility
c. reliability
d. scalability
Q. Which factor represents a system's ability to change quickly?
a. flexibility
b. performance
c. capacity planning
d. benchmark
Q. What is a set of conditions used to measure how well a product or system functions?
a. flexibility
b. performance
c. capacity planning
d. benchmark