Top 550+ Solved E-Commerce MCQ Questions Answer

From 466 to 480 of 516

Q. …………………..are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.

a. network firewall

b. computer virus

c. both of these

d. none of these

  • b. computer virus

Q. he dimension of e-commerce that enables commerce across national boundaries is called______________.

a. interactivity

b. global reach

c. richness

d. ubiquity

  • b. global reach

Q. The primary source of financing during the early years of e-commerce was______________.

a. bank loans

b. large retail firms

c. venture capital funds

d. initial public offerings

  • c. venture capital funds

Q. The source of revenue in a subscription revenue model is ______________.

a. fees from advertisers in exchange for advertisements

b. fees for business referrals

c. fees from subscribers in exchange for access to content or services

d. fees for enabling or execution a transaction

  • c. fees from subscribers in exchange for access to content or services

Q. Industry structure is defined as ______________.

a. the nature of the players in an industry and their relative bargaining power

b. a set of plans for achieving long term returns on the capital invested in a business firm

c. set of planned activities designed to result in a profit in a marketplace

d. how a company\s product or service fulfills the needs of customers

  • a. the nature of the players in an industry and their relative bargaining power

Q. Which of the following is not a limitation of the current Internet?

a. insufficient capacity throughout the backbone

b. network architecture limitations

c. insufficient reach

d. best-efforts qos

  • c. insufficient reach

Q. The most common type of Internet crime according to the IC3 is ______________.

a. credit card fraud

b. check fraud

c. non-delivery

d. auction fraud

  • d. auction fraud

Q. When hackers flood a Web site with useless traffic to overwhelm the network, it iscalled ______________.

a. phishing

b. pharming

c. a denial of service (dos) attack

d. spoofing

  • c. a denial of service (dos) attack

Q. ______________ influence the behavior of others through their personality, skills, or otherfactors.

a. opinion leaders

b. direct reference groups

c. indirect reference groups

d. lifestyle groups

  • a. opinion leaders

Q. A(n) ______________ represents data as two-dimensional tables with recordsorganized in rows and attributes in columns.

a. database management system

b. data warehouse

c. sql query

d. relational database

  • d. relational database

Q. Which of the following statements about privacy is true?

a. it is a moral right to be left alone

b. only corporations and government need to be concerned about it

c. it has only just recently become a concern

d. it is most easily obtained on the internet

  • a. it is a moral right to be left alone
Subscribe Now

Get All Updates & News