Top 550+ Solved E-Commerce MCQ Questions Answer
Q. The redirection of traffic from a legitimate site to an infringing site is called______________.
a. cybersquatting
b. cyber piracy
c. met tagging
d. key wording
Q. A security plan begins with a(n) is ______________.
a. security policy
b. risk assessment
c. implementation plan
d. security organization
Q. ______________ influence the behavior of others through their personality, skills, orother factors.
a. opinion leaders
b. direct reference groups
c. indirect reference groups
d. lifestyle groups
Q. Creating multiple versions of information goods and selling essentially the sameproduct to different market segments at different prices is called______________.
a. versioning
b. bundling.
c. transitive content
d. price discrimination
Q. Which of the following is a measure of the percentage of purchasers who return to aWeb site within a year?
a. loyalty
b. reach
c. regency
d. unique visitors
Q. ______________ are networks that connect people within a company to each other andto the company network.
a. bitstreams
b. extranets
c. internets
d. intranets
Q. A website offering content created by third party transparently to customers is anexample of ______________.
a. reinter mediation
b. syndication
c. virtual manufacturing
d. build-to-order
Q. E-commerce technologies have improved upon traditional commerce technologies in______________.
a. richness
b. reach
c. both richness and reach
d. neither richness nor reach
Q. All of the following are technologies used to gather information about you onlineexcept ______________.
a. spy ware
b. cookies
c. gmail
d. anonymizers
Q. Which of the following is a new and disruptive Web feature or service?
a. xml
b. diffserv
c. blogs
d. cdma
Q. What Web server functionality allows it verify usernames and passwords and processcertificates and encryption information?
a. processing of http requests
b. file transfer protocol
c. data capture
d. security services
Q. The ability to change the product to better fit the needs of the customer is called______________.
a. customization
b. personalization
c. privacy
d. accessibility
Q. All of the following are major categories of computer viruses except ______________.
a. macro viruses
b. file-infecting viruses
c. script viruses
d. trojan viruses
Q. The most prevalent online payment method is ______________.
a. paypal
b. checks
c. credit cards
d. debit