Professional Documents
Culture Documents
Which products are people most likely to be comfortable buying on the Internet?
Books PCs CDs All
What is the percentage of customers who visit a Web site and actually buy something called
? Affiliate programs Click-through Spam Conversion rate
Which of the following is part of the four main types for e-commerce?
B2B B2C C2B All
Which of the following describes e-commerce?
Doing business electronically Doing business Sale of goods All
Which of the following examines information passing through switches, hubs, or routers?
Key logger Packet sniffer Log analysis Screen captures
tools
What is the process in which a buyer posts its interest in buying a certain quantity of
items, and sellers compete for the business by submitting successively lower bids until
there is only one seller left?
B2B marketplace Intranet Reverse auction Internet
plastic card having the size of a credit card and containing an embedded chip on which digital
information is stored
CRM systems cards E-government ID cards FEDI cards Smart cards
Materials used in production in a manufacturing company or are placed on the shelf for sale in a
retail
Direct environment
materials Indirect materials EDI None
What are materials that are necessary for running a modern corporation, but do not relate to the
company’s primary business activities?
Direct materials Indirect materials EDI None
What are ballpoint pens purchased by a clothing company ?
Direct materials Indirect materials EDI None
Most individuals are familiar with which form of e-commerce ?
B2B B2C C2B C2C
Which term represents a count of the number of people who visit one site, click on an ad, and are
taken to the site of the advertiser?
Affiliate programs Click-through Spam All
All of the following are techniques B2C e-commerce companies use to attract customers ,
except:
Registering with search
Viral marketing Online ads Virtual marketing
engines
Digital products are best suited for B2C e-commerce because they:
Are commodity like mass-customized & delivered at the All
products personalized time of purchase
Which form of e-commerce currently accounts for about 97% of all e-commerce revenues ?
B2B B2C C2B C2C
Which of the following are advantages normally associated with B2B e-commerce?
Reaches wider Reduction in costs Shorter cycle All
audiences time
An industry is less attractive for suppliers when the rivalry among existing competitors
is:High Low More Less
If it is easy for competitors to enter the market, the threat of new entrants is considered:
High Low More Less
The threat of new entrants is high when it is:
Hard for customers to Hard for competitors Easy for competitors to enter the Easy for customers
enter the market to enter the market market to enter the market
Which of the following is a method of transferring money from one persons account to
another?
electronic check credit card e-transfer none
An electronic check is one form of what?
e-commerce online banking e-cash check
If you need to transfer money to another person via the internet, which of the following methods
could you use?
financial E-bill presentment ELECTRONIC CHQUE ALL
cybermediary PAY
Which of the following permits the transmission of a bill, along with payment of that
bill, to be conducted over the Internet?
financial E-bill presentment
ELECTRONIC CHQUE ALL
cybermediary PAY
A combination of software & information designed to provide security and information for
payment is called
digital wallet pop up ad shopping cart encryption
Name for direct computer-to-computer transfer of transaction information contained in
internet
business doccommerce e-commerce trans info EDI
transfer
What sends work assignments through an e-mail system ?
Database-based Messaging-based Database-based
enterprise information enterprise info Messaging-based workflow system
workflow system
portal portal
Which will not harm computer resources
firewall Virus Trojan horse NONE
Which is not a function of ERP?
Warehousing sales scheduling NONE
Which factor determines when your IT system will be available for knowledge workers to
access?
Availability Accessibility Reliability NONE
Which factor determines who has the right to access different types of IT systems and
information?
Availability Accessibility Reliability Scalability
Which factor ensures your IT systems are functioning correctly and providing accurate
information?
Availability Accessibility Reliability Scalability
Which factor represents how well your system can adapt to increased demands?
Availability Accessibility Reliability Scalability
What determines the future IT infrastructure requirements for new equipment and
additional network capacity?
Flexibility Performance Capacity planning Benchmark
What automates business processes?
Workflow ASP Workflow system EIP
What defines all of the steps or business rules, from beginning to end, required for a process to
run correctly?
Workflow EIP Workflow system SLA
Which concept suggests that different apps and computer systems should be able to communicate with
one another?
Integration Web services Scalability Interoperability
Which service encompasses all technologies used to transmit and process information on an across
a network?
Interoperability Scalability Benchmarking Web services
Which process can prevent data from lose due to computer problems or human errors?
backup recovery benchmarking data cleansing
Which process is used to reinstall data from a copy when the original data has been lost?
backup recovery benchmarking data cleansing
Who protects system from external threats?
firewall EDI ERP Script kiddies
What describes a process of continuously measuring results and comparing those results to optimal
performance so that actual performance may be improved?
Performance Capacity planning Benchmarking Data cleansing
Which of the following statements accurately reflect the impact of technology?
caused buyer power to lessened entry increased threat of ALL
increase barriers for many substitute P & S
What is a separate facility industries
that does not have any computer equipment but is a place where the
knowledge workers can move after the disaster?
Disaster recovery cost Disaster recovery Hot site Cold site
curve
plan
Which of the following is the primary characteristic of an intranet?
People outside the People inside the People outside the organization can’t
organization can organization can’t access it
NONE
access it access it
Separate & fully equipped facility where the company move immediately after the disaster
Disasterbusiness
& resume recovery cost Hot site Cold site Disaster recovery
curve
plan
Which of the following is used in B2B to pay for purchases ?
E-commerce Financial EDI EDI Electronic checks
Public key encryption uses multiple keys. One key is used to encrypt data, while
another is used to decrypt data. The key used to encrypt data is called the _____ key,
while the key used to decrypt data is called the _____ key
encryption, private, public encryption, public, private
decryption public
Secure Sockets Layers does which of the following?
creates a secure encrypts sends information ALL
private connection to information over the internet
a web
When server
a transaction is processed online, how can the merchant verify the customers
identity?
use secure sockets use secure
use EDI use financial EDI
layers E-transactions
The practice of forging a return address on an e-mail so that the recipient is fooled
into revealing private information
hacking cracking is termed? dumpster diving spoofing
Who breaks into other peoples computer systems and steals and destroys information?
Hackers softwares Hacktivists Script kiddies
What is software that comes hidden in free downloadable software and tracks your online
movements, mines the information stored on your computer, or uses your computers CPU and
storage for some task you know nothing about?
Web log Clickstream Anonymous Web NONE
browsing service
ERP stands for
Enterprise Enterprise reverse
Enterprise resource planning NONE
resolution planning planning
What floods a Web site with so many requests for service that it slows down or crashes?
Denial-of-service attack Computer virus Worm NONE
What harnesses far-flung computers together by way of the Internet or a virtual private
network to share CPU power, databases, and database storage?
Denial-of-service Worm Computer virus NONE
attack
A business cannot be all things to all people. Instead, a business must:
A business competing in a commodity like environment must focus on which of the following
? Price Ease speed of Ease of ordering ALL
delivery
Which type of products is lesser purchased using e-commerce ?
Automobiles Books Softwares None
How the transactions occur in e-commerce ?
Using e-medias Using computers Using mobile phones None
only
only
A product or service that customers have come to expect from an industry, which must be
offered by new entrants if they wish to compete and survive, is known as a(n)?
Switching costs Loyalty programs Entry barriers Affiliate programs
Paisapay is facilitated in
eBay.co.in amazon.com flipkart.com None
Unique value auction is mainly applies to ?
Engineering
New products Second hand products None
products
What consists of the identification of risks or threats, the implementation of security
measures, and the monitoring of those measures for effectiveness ?
Risk management Risk assessment Security None
What is the process of evaluating IT assets, their importance to the organization, and
their susceptibility to threats, to measure the risk exposure of these assets ?
Risk management Risk assessment Security None