Top 550+ Solved E-Commerce MCQ Questions Answer
Q. …………………..are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.
a. network firewall
b. computer virus
c. both of these
d. none of these
Q. he dimension of e-commerce that enables commerce across national boundaries is called______________.
a. interactivity
b. global reach
c. richness
d. ubiquity
Q. The primary source of financing during the early years of e-commerce was______________.
a. bank loans
b. large retail firms
c. venture capital funds
d. initial public offerings
Q. The source of revenue in a subscription revenue model is ______________.
a. fees from advertisers in exchange for advertisements
b. fees for business referrals
c. fees from subscribers in exchange for access to content or services
d. fees for enabling or execution a transaction
Q. Industry structure is defined as ______________.
a. the nature of the players in an industry and their relative bargaining power
b. a set of plans for achieving long term returns on the capital invested in a business firm
c. set of planned activities designed to result in a profit in a marketplace
d. how a company\s product or service fulfills the needs of customers
Q. The component of TCP/IP that provides the Internet's addressing scheme and isresponsible for the actual delivery of packets is ______________.
a. tcp
b. ip
c. the network layer
d. the application layer
Q. Which of the following is not a limitation of the current Internet?
a. insufficient capacity throughout the backbone
b. network architecture limitations
c. insufficient reach
d. best-efforts qos
Q. Internet users account for about ______________ of the world's population.
a. 7%
b. 17%
c. 27%
d. 47%
Q. The most common type of Internet crime according to the IC3 is ______________.
a. credit card fraud
b. check fraud
c. non-delivery
d. auction fraud
Q. When hackers flood a Web site with useless traffic to overwhelm the network, it iscalled ______________.
a. phishing
b. pharming
c. a denial of service (dos) attack
d. spoofing
Q. ______________ influence the behavior of others through their personality, skills, or otherfactors.
a. opinion leaders
b. direct reference groups
c. indirect reference groups
d. lifestyle groups
Q. A(n) ______________ represents data as two-dimensional tables with recordsorganized in rows and attributes in columns.
a. database management system
b. data warehouse
c. sql query
d. relational database
Q. Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.
a. versioning
b. bundling.
c. transactive content
d. price discrimination
Q. Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?
a. loyalty
b. reach
c. recency
d. unique visitors
Q. Which of the following statements about privacy is true?
a. it is a moral right to be left alone
b. only corporations and government need to be concerned about it
c. it has only just recently become a concern
d. it is most easily obtained on the internet