You are on page 1of 6

Which products are people most likely to be more uncomfortable buying on the Internet?

Books Furniture Movies All


The best products to sell in B2C e-commerce are:
Small products Digital products Specialty products Fresh products
In which website Global Easy Buy is facilitated?
Ebay.com Amazon.com Yepme.com None of these

Which type deals with auction?


B2B B2C C2B C2C

Which segment is eBay an example?


B2B C2B C2C None

Which type of e-commerce focuses on consumers dealing with each other?


B2B B2C C2B C2C

Which products are people most likely to be comfortable buying on the Internet?
Books PCs CDs All

The solution for all business needs is


EDI ERP SCM None

Which is a function of E-commerce


marketing advertising warehousing ALL

Which is not a function of E-commerce


marketing advertising warehousing NONE

What is the percentage of customers who visit a Web site and actually buy something called
? Affiliate programs Click-through Spam Conversion rate

Which segment do eBay, Amazon.com belong?


B2Bs B2Cs C2Bs C2Cs

Which of the following is part of the four main types for e-commerce?
B2B B2C C2B All
Which of the following describes e-commerce?
Doing business electronically Doing business Sale of goods All

Which of the following examines information passing through switches, hubs, or routers?
Key logger Packet sniffer Log analysis Screen captures
tools
What is the process in which a buyer posts its interest in buying a certain quantity of
items, and sellers compete for the business by submitting successively lower bids until
there is only one seller left?
B2B marketplace Intranet Reverse auction Internet
plastic card having the size of a credit card and containing an embedded chip on which digital
information is stored
CRM systems cards E-government ID cards FEDI cards Smart cards
Materials used in production in a manufacturing company or are placed on the shelf for sale in a
retail
Direct environment
materials Indirect materials EDI None
What are materials that are necessary for running a modern corporation, but do not relate to the
company’s primary business activities?
Direct materials Indirect materials EDI None
What are ballpoint pens purchased by a clothing company ?
Direct materials Indirect materials EDI None
Most individuals are familiar with which form of e-commerce ?
B2B B2C C2B C2C
Which term represents a count of the number of people who visit one site, click on an ad, and are
taken to the site of the advertiser?
Affiliate programs Click-through Spam All

All of the following are techniques B2C e-commerce companies use to attract customers ,
except:
Registering with search
Viral marketing Online ads Virtual marketing
engines

Digital products are best suited for B2C e-commerce because they:
Are commodity like mass-customized & delivered at the All
products personalized time of purchase
Which form of e-commerce currently accounts for about 97% of all e-commerce revenues ?
B2B B2C C2B C2C
Which of the following are advantages normally associated with B2B e-commerce?
Reaches wider Reduction in costs Shorter cycle All
audiences time
An industry is less attractive for suppliers when the rivalry among existing competitors
is:High Low More Less

If it is easy for competitors to enter the market, the threat of new entrants is considered:
High Low More Less
The threat of new entrants is high when it is:
Hard for customers to Hard for competitors Easy for competitors to enter the Easy for customers
enter the market to enter the market market to enter the market

If the threat of substitute products or services is low it is a(n):


Disadvantage to Advantage to the Advantage to
None
supplier buyer supplier

Which of the following is a method of transferring money from one persons account to
another?
electronic check credit card e-transfer none
An electronic check is one form of what?
e-commerce online banking e-cash check
If you need to transfer money to another person via the internet, which of the following methods
could you use?
financial E-bill presentment ELECTRONIC CHQUE ALL
cybermediary PAY
Which of the following permits the transmission of a bill, along with payment of that
bill, to be conducted over the Internet?
financial E-bill presentment
ELECTRONIC CHQUE ALL
cybermediary PAY

A combination of software & information designed to provide security and information for
payment is called
digital wallet pop up ad shopping cart encryption
Name for direct computer-to-computer transfer of transaction information contained in
internet
business doccommerce e-commerce trans info EDI
transfer
What sends work assignments through an e-mail system ?
Database-based Messaging-based Database-based
enterprise information enterprise info Messaging-based workflow system
workflow system
portal portal
Which will not harm computer resources
firewall Virus Trojan horse NONE
Which is not a function of ERP?
Warehousing sales scheduling NONE

Which factor determines when your IT system will be available for knowledge workers to
access?
Availability Accessibility Reliability NONE
Which factor determines who has the right to access different types of IT systems and
information?
Availability Accessibility Reliability Scalability
Which factor ensures your IT systems are functioning correctly and providing accurate
information?
Availability Accessibility Reliability Scalability
Which factor represents how well your system can adapt to increased demands?
Availability Accessibility Reliability Scalability

Which factor represents a systems ability to change quickly?


Flexibility Performance Capacity planning Benchmark
What is a set of conditions used to measure how well a product or system functions?
Flexibility Performance Capacity planning Benchmark

What determines the future IT infrastructure requirements for new equipment and
additional network capacity?
Flexibility Performance Capacity planning Benchmark
What automates business processes?
Workflow ASP Workflow system EIP
What defines all of the steps or business rules, from beginning to end, required for a process to
run correctly?
Workflow EIP Workflow system SLA
Which concept suggests that different apps and computer systems should be able to communicate with
one another?
Integration Web services Scalability Interoperability

Which service encompasses all technologies used to transmit and process information on an across
a network?
Interoperability Scalability Benchmarking Web services

Which process can prevent data from lose due to computer problems or human errors?
backup recovery benchmarking data cleansing
Which process is used to reinstall data from a copy when the original data has been lost?
backup recovery benchmarking data cleansing
Who protects system from external threats?
firewall EDI ERP Script kiddies
What describes a process of continuously measuring results and comparing those results to optimal
performance so that actual performance may be improved?
Performance Capacity planning Benchmarking Data cleansing
Which of the following statements accurately reflect the impact of technology?
caused buyer power to lessened entry increased threat of ALL
increase barriers for many substitute P & S
What is a separate facility industries
that does not have any computer equipment but is a place where the
knowledge workers can move after the disaster?
Disaster recovery cost Disaster recovery Hot site Cold site
curve
plan
Which of the following is the primary characteristic of an intranet?
People outside the People inside the People outside the organization can’t
organization can organization can’t access it
NONE
access it access it
Separate & fully equipped facility where the company move immediately after the disaster
Disasterbusiness
& resume recovery cost Hot site Cold site Disaster recovery
curve
plan
Which of the following is used in B2B to pay for purchases ?
E-commerce Financial EDI EDI Electronic checks
Public key encryption uses multiple keys. One key is used to encrypt data, while
another is used to decrypt data. The key used to encrypt data is called the _____ key,
while the key used to decrypt data is called the _____ key
encryption, private, public encryption, public, private
decryption public
Secure Sockets Layers does which of the following?
creates a secure encrypts sends information ALL
private connection to information over the internet
a web
When server
a transaction is processed online, how can the merchant verify the customers
identity?
use secure sockets use secure
use EDI use financial EDI
layers E-transactions

The practice of forging a return address on an e-mail so that the recipient is fooled
into revealing private information
hacking cracking is termed? dumpster diving spoofing

What is a model of a proposed product, service, or system?


Prototyping Prototype Proof-of-concept Selling prototype
prototype
What is an internal organizational Internet that is guarded against outside access by a
special security feature called a firewall (which can be software, hardware, or a
Client/server
combination of the two) ? Intranet Extranet Thin client
network
What is an intranet, restricted to an organization & certain outsiders, such as customers
Client/server
& suppliers ? Intranet Extranet Thin client
network
What is a detailed process for recovering information or an IT system in the event of a
catastrophic disaster such as a fire or flood?
Disaster recovery plan Hot site Cold site Disaster recovery
cost curve
What charts (1) the cost to your organization of the unavailability of information and
technology and (2) the cost to your organization of recovering from a disaster over time?
Disaster recovery Disaster recovery Hot site Cold site
cost curve
plan
Which is a function of ERP ?
Warehousing sales scheduling ALL

Who breaks into other peoples computer systems and steals and destroys information?
Hackers softwares Hacktivists Script kiddies
What is software that comes hidden in free downloadable software and tracks your online
movements, mines the information stored on your computer, or uses your computers CPU and
storage for some task you know nothing about?
Web log Clickstream Anonymous Web NONE
browsing service
ERP stands for
Enterprise Enterprise reverse
Enterprise resource planning NONE
resolution planning planning

Which is not a component of ERP?


Legacy systems Bolt on Operational Cybersoft
applications database
Which is not a function of ERP?
Human resource Financial Warehousing NONE
management
What is a type of virus that spreads itself, not just from file to file, but from computer
to computer via e-mail and other Internet traffic?
Denial-of-service Computer virus Worm NONE
attack
1 GEOP BYTE = _ _ _ _ BRONTO BYTES , 1 BRONTO BYTE = _ _ _ _ YOTTA BYTES
1 YOTTA BYTE = _ _ _ _ ZETTA BYTES , 1 ZETTA BYTE = _ _ _ _ EXA BYTES
1 EXA BYTE = _ _ _ _ PETA BYTES , 1 PETA BYTE = _ _ _ _ TERRA BYTES
512 1000 256 1024

What floods a Web site with so many requests for service that it slows down or crashes?
Denial-of-service attack Computer virus Worm NONE
What harnesses far-flung computers together by way of the Internet or a virtual private
network to share CPU power, databases, and database storage?
Denial-of-service Worm Computer virus NONE
attack
A business cannot be all things to all people. Instead, a business must:

Identify target Identify the value of


products/services as ALL None
customers
perceived by
Which of the following is ancustomers
Internet-based company that makes it easy for one person to pay
another over the Internet?
electronic check electronic bill conversion rates financial cybermediary
presentment and
paymenttypes of ads are people most willing to tolerate ?
Which, if any, of the following
pop-under ad pop-up ad banner ad NONE

What type of ad appears under a web page ?


pop-under ad pop-up ad banner ad discount ad
What type of ad appears on top of a web page ?
pop-under ad pop-up ad banner ad discount ad
Which type of add appears on a web page ?
pop-under ad Pop-up ad Banner ad Discount ad
Which form of e-marketplace brings together buyers and sellers from the same industry ?
Horizontal Vertical Integrated Inclined
Form of e-marketplace brings together buyers and sellers from multiple industries, often
forHorizontal
MRO materials Vertical Integrated Inclined
What is the name given to an interactive business providing a centralized market where
many buyers and
Direct marketplace
suppliers B2B
can come together B2C
for e-commerce or commerce-related activities
Electronic ?
marketplace

Amazon.com is well-known for which e-commerce marketing technique ?


Banner ads Pop-up ads Affiliate programs Viral marketing
Materials used in the normal operation of a business but not related to primary business operations
are called
Supplies Direct materials Indirect materials Daily stuff
Which of the following refers to creating products tailored to individual customers ?
customization aggregation Direct materials Reverse auction

A business competing in a commodity like environment must focus on which of the following
? Price Ease speed of Ease of ordering ALL
delivery
Which type of products is lesser purchased using e-commerce ?
Automobiles Books Softwares None
How the transactions occur in e-commerce ?
Using e-medias Using computers Using mobile phones None
only
only
A product or service that customers have come to expect from an industry, which must be
offered by new entrants if they wish to compete and survive, is known as a(n)?
Switching costs Loyalty programs Entry barriers Affiliate programs

Which of the following is not related to security mechanism


encryption decryption e-cash ALL
Which of the following is a useful security mechanism when considering business strategy
encryption
and IT ? decryption firewall all

Paisapay is facilitated in
eBay.co.in amazon.com flipkart.com None
Unique value auction is mainly applies to ?
Engineering
New products Second hand products None
products
What consists of the identification of risks or threats, the implementation of security
measures, and the monitoring of those measures for effectiveness ?
Risk management Risk assessment Security None
What is the process of evaluating IT assets, their importance to the organization, and
their susceptibility to threats, to measure the risk exposure of these assets ?
Risk management Risk assessment Security None

You might also like