McqMate
401. |
Reverse logistics is required because |
A. | Goods are defective |
B. | Goods are unsold |
C. | The customers simply change |
D. | All of the above |
Answer» D. All of the above |
402. |
The purpose of supply chain management is |
A. | provide customer |
B. | improve quality of a product |
C. | integrating supply and demand |
D. | increase production |
Answer» C. integrating supply and demand |
403. |
Barriers to entry into an industry are likely to be high if: |
A. | Switching costs are low |
B. | Differentiation is low |
C. | Requirement for economies of |
D. | Access to distribution |
Answer» C. Requirement for economies of |
404. |
A digital signature is required …..
|
A. | i and ii |
B. | i, ii and iii |
C. | i, ii, iii and iv |
D. | ii, iii and iv |
Answer» B. i, ii and iii |
405. |
Which of the following examines information passing through switches, hubs, or routers? |
A. | Key logger |
B. | Packet sniffer |
C. | Log analysis tools |
D. | Screen captures |
Answer» B. Packet sniffer |
406. |
Which type of e-commerce focuses on consumers dealing with each other? |
A. | B2B |
B. | B2C |
C. | C2B |
D. | C2C |
Answer» D. C2C |
407. |
Which products are people most likely to be more uncomfortable buying on the Internet? |
A. | Books |
B. | Furniture |
C. | Movies |
D. | All of the above |
Answer» B. Furniture |
408. |
Which products are people most likely to be comfortable buying on the Internet? |
A. | Books |
B. | PCs |
C. | CDs |
D. | All of the above |
Answer» D. All of the above |
409. |
Digital products are best suited for B2C e-commerce because they: |
A. | Are commodity like products |
B. | Can be mass-customised and personalised |
C. | Can be delivered at the time of purchase |
D. | All of the above |
Answer» D. All of the above |
410. |
All of the following are techniques B2C e-commerce companies use to attract customers, except |
A. | Registering with search engines |
B. | Viral marketing |
C. | Online ads |
D. | Virtual marketing |
Answer» D. Virtual marketing |
411. |
E-commerce involves |
A. | marketing |
B. | advertising |
C. | warehousing |
D. | all of the above |
Answer» D. all of the above |
412. |
Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? |
A. | Affiliate programs |
B. | Click-through |
C. | Spam |
D. | All of the above |
Answer» B. Click-through |
413. |
What is the percentage of customers who visit a Web site and actually buy something called? |
A. | Affiliate programs |
B. | Click-through |
C. | Spam |
D. | Conversion rate |
Answer» D. Conversion rate |
414. |
What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment? |
A. | Direct materials |
B. | Indirect materials |
C. | EDI |
D. | None of the above |
Answer» A. Direct materials |
415. |
What are materials that are necessary for running a modern corporation, but do not relate to the company’s primary business activities? |
A. | Direct materials |
B. | Indirect materials |
C. | EDI |
D. | None of the above |
Answer» B. Indirect materials |
416. |
What is another name for materials which cannot be linked to a specific product or process? |
A. | Direct materials |
B. | Indirect materials |
C. | EDI |
D. | None of the above |
Answer» B. Indirect materials |
417. |
What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? |
A. | Customer relationship management systems cards |
B. | E-government identity cards |
C. | FEDI cards |
D. | Smart cards |
Answer» D. Smart cards |
418. |
Which form of e-commerce currently accounts for about 97% of all ecommerce revenues? |
A. | B2B |
B. | B2C |
C. | C2B |
D. | C2C |
Answer» A. B2B |
419. |
Which of the following are advantages normally associated with B2B ecommerce? |
A. | Shorter cycle times |
B. | Reduction in costs |
C. | Reaches wider audiences |
D. | all of the above |
Answer» D. all of the above |
420. |
If it is easy for competitors to enter the market, the threat of new entrants is considered: |
A. | High |
B. | Low |
C. | More |
D. | Less |
Answer» A. High |
421. |
An industry is less attractive for suppliers when the rivalry among existing competitors is: |
A. | High |
B. | Low |
C. | More |
D. | Less |
Answer» A. High |
422. |
Unique value auction mainly applies to? |
A. | New products |
B. | Second hand products |
C. | Engineering products |
D. | None of the above. |
Answer» B. Second hand products |
423. |
Which of the following is a useful security mechanism when considering business strategy and IT? |
A. | encryption |
B. | decryption |
C. | firewall |
D. | all the above |
Answer» D. all the above |
424. |
Which of the following statements accurately reflect the impact of technology? |
A. | Technology has caused buyer power to increase |
B. | Technology has lessened the entry barriers for many industries |
C. | Technology has increased the threat of substitute products and services |
D. | all of the above |
Answer» D. all of the above |
425. |
Which type of products is lesser purchased using e-commerce? |
A. | automobiles |
B. | books |
C. | softwares |
D. | none |
Answer» A. automobiles |
426. |
A business competing in a commodity like environment must focus on which of the following? |
A. | Price |
B. | Ease / speed of delivery |
C. | Ease of ordering |
D. | all of the above |
Answer» A. Price |
427. |
Which of the following refers to creating products tailored to individual customers? |
A. | customisation |
B. | aggregation |
C. | Direct materials |
D. | Reverse auction |
Answer» A. customisation |
428. |
Materials used in the normal operation of a business but not related to primary business operations are called what? |
A. | Supplies |
B. | Direct materials |
C. | Indirect materials |
D. | Daily stuff |
Answer» C. Indirect materials |
429. |
What is the name given to an interactive business providing a centralised market where many buyers and suppliers can come together for ecommerce or commerce-related activities? |
A. | Direct marketplace |
B. | B2B |
C. | B2C |
D. | Electronic marketplace |
Answer» D. Electronic marketplace |
430. |
Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO materials? |
A. | horizontal |
B. | Vertical |
C. | Integrated |
D. | Inclined |
Answer» A. horizontal |
431. |
Which form of e-marketplace brings together buyers and sellers from the same industry? |
A. | horizontal |
B. | Vertical |
C. | Integrated |
D. | Inclined |
Answer» B. Vertical |
432. |
Which, if any, of the following types of ads are people most willing to tolerate? |
A. | pop-under ad |
B. | pop-up ad |
C. | banner ad |
D. | none of the above |
Answer» D. none of the above |
433. |
Which of the following is an Internet-based company that makes it easy for one person to pay another over the Internet? |
A. | electronic check |
B. | electronic bill presentment and payment |
C. | conversion rates |
D. | financial cybermediary |
Answer» D. financial cybermediary |
434. |
Which of the following is a method of transferring money from one persons account to another? |
A. | electronic check |
B. | credit card |
C. | e-transfer |
D. | none of the above |
Answer» A. electronic check |
435. |
An electronic check is one form of what? |
A. | e-commerce |
B. | online banking |
C. | e-cash |
D. | check |
Answer» C. e-cash |
436. |
If you need to transfer money to another person via the internet, which of the following methods could you use? |
A. | financial cybermediary |
B. | electronic check |
C. | electronic bill presentment and payment |
D. | all of the above |
Answer» D. all of the above |
437. |
Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? |
A. | financial cybermediary |
B. | electronic check |
C. | electronic bill presentment and payment |
D. | all of the above |
Answer» C. electronic bill presentment and payment |
438. |
A combination of software and information designed to provide security and information for payment is called a? |
A. | digital wallet |
B. | pop up ad |
C. | shopping cart |
D. | encryption |
Answer» A. digital wallet |
439. |
What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents? |
A. | internet commerce |
B. | e-commerce |
C. | transaction information transfer |
D. | electronic data interchange |
Answer» D. electronic data interchange |
440. |
Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____n key. |
A. | encryption, decryption |
B. | private, public |
C. | encryption, public |
D. | public, private |
Answer» D. public, private |
441. |
When a transaction is processed online, how can the merchant verify the customers identity? |
A. | use secure sockets layers |
B. | use secure electronic transactions |
C. | use electronic data interchange |
D. | use financial electronic data interchange |
Answer» B. use secure electronic transactions |
442. |
The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed? |
A. | hacking |
B. | cracking |
C. | dumpster diving |
D. | spoofing |
Answer» D. spoofing |
443. |
What is an internal organisational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? |
A. | Client/server network |
B. | Intranet |
C. | Extranet |
D. | Thin client |
Answer» B. Intranet |
444. |
What is an intranet that is restricted to an organisation and certain outsiders, such as customers and suppliers? |
A. | Client/server network |
B. | Intranet |
C. | Extranet |
D. | Thin client |
Answer» C. Extranet |
445. |
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? |
A. | Disaster recovery plan |
B. | Hot site |
C. | Cold site |
D. | Disaster recovery cost curve |
Answer» A. Disaster recovery plan |
446. |
What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? |
A. | Disaster recovery plan |
B. | Hot site |
C. | Cold site |
D. | Disaster recovery cost curve |
Answer» C. Cold site |
447. |
What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? |
A. | Disaster recovery plan |
B. | Hot site |
C. | Cold site |
D. | Disaster recovery cost curve |
Answer» B. Hot site |
448. |
What charts (1) the cost to your organisation of the unavailability of information and technology and (2) the cost to your organisation of recovering from a disaster over time? |
A. | Disaster recovery plan |
B. | Hot site |
C. | Cold site |
D. | Disaster recovery cost curve |
Answer» D. Disaster recovery cost curve |
449. |
Which factor determines when the IT system will be available for knowledge workers to access? |
A. | Availability |
B. | Accessibility |
C. | Reliability |
D. | None of the above |
Answer» A. Availability |
450. |
Which factor determines who has the right to access different types of IT systems and information? |
A. | Availability |
B. | Accessibility |
C. | Reliability |
D. | Scalability |
Answer» B. Accessibility |
451. |
Which factor ensures the IT systems are functioning correctly and providing accurate information? |
A. | Availability |
B. | Accessibility |
C. | Reliability |
D. | Scalability |
Answer» C. Reliability |
452. |
Which factor represents how well your system can adapt to increased demands? |
A. | Availability |
B. | Accessibility |
C. | Reliability |
D. | Scalability |
Answer» D. Scalability |
453. |
Which factor represents a systems ability to change quickly? |
A. | Flexibility |
B. | Performance |
C. | Capacity planning |
D. | Benchmark |
Answer» A. Flexibility |
454. |
What is a set of conditions used to measure how well a product or system functions? |
A. | Flexibility |
B. | Performance |
C. | Capacity planning |
D. | Benchmark |
Answer» D. Benchmark |
455. |
What determines the future IT infrastructure requirements for new equipment and additional network capacity? |
A. | Flexibility |
B. | Performance |
C. | Capacity planning |
D. | Benchmark |
Answer» C. Capacity planning |
456. |
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? |
A. | Workflow |
B. | EIP |
C. | Workflow system |
D. | SLA |
Answer» A. Workflow |
457. |
Which will not harm computer resources? |
A. | firewall |
B. | Virus |
C. | Trojan horse |
D. | None of the above |
Answer» A. firewall |
458. |
Which of the following is the primary characteristic of an intranet? |
A. | People outside the organisation can access it |
B. | People inside the organisation cant access it |
C. | People outside the organisation cant access it |
D. | None of the above |
Answer» C. People outside the organisation cant access it |
459. |
Which concept suggests that different applications and computer systems should be able to communicate with one another? |
A. | Integration |
B. | Web services |
C. | Scalability |
D. | Interoperability |
Answer» D. Interoperability |
460. |
Which service encompasses all technologies used to transmit and process information on an across a network? |
A. | Interoperability |
B. | Scalability |
C. | Benchmarking |
D. | Web services |
Answer» D. Web services |
461. |
Which process can prevent data from losing due to computer problems or human errors? |
A. | backup |
B. | recovery |
C. | benchmarking |
D. | data cleansing |
Answer» A. backup |
462. |
Which process is used to reinstall data from a copy when the original data has been lost? |
A. | backup |
B. | recovery |
C. | benchmarking |
D. | data cleansing |
Answer» B. recovery |
463. |
Who breaks into other peoples computer systems and steals and destroys information? |
A. | Hackers |
B. | softwares |
C. | Hacktivists |
D. | Script kiddies |
Answer» A. Hackers |
464. |
What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about? |
A. | Web log |
B. | Clickstream |
C. | Anonymous Web browsing service |
D. | None of the above |
Answer» D. None of the above |
465. |
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic? |
A. | Computer virus |
B. | Worm |
C. | Denial-of-service attack |
D. | None of the above |
Answer» B. Worm |
466. |
What floods a Web site with so many requests for service that it slows down or crashes? |
A. | Computer virus |
B. | Worm |
C. | Denial-of-service attack |
D. | None of the above |
Answer» C. Denial-of-service attack |
467. |
What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to threats, to measure the risk exposure of these assets? |
A. | Risk management |
B. | Risk assessment |
C. | Security |
D. | None of the above |
Answer» A. Risk management |
468. |
The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as: |
A. | Business to Business (B2B). |
B. | Consumer to Business (C2B). |
C. | Business to Consumer (B2C). |
D. | Consumer to Consumer (C2C). |
Answer» B. Consumer to Business (C2B). |
469. |
By electronic commerce we mean: |
A. | Commerce of electronic goods |
B. | Commerce which depends on electronics |
C. | Commerce which is based on the use of internet |
D. | None of the above |
Answer» D. None of the above |
470. |
E-commerce is |
A. | B2C |
B. | B2B |
C. | C2B |
D. | All the above |
Answer» A. B2C |
471. |
Advantages of e-commerce are |
A. | Low cost |
B. | Economical |
C. | Productivity gains |
D. | All the above |
Answer» B. Economical |
472. |
B2B2C is a model of |
A. | E-commerce |
B. | E-business |
C. | Data mining |
D. | None of the above |
Answer» C. Data mining |
473. |
Mobile commerce is same as |
A. | E-commerce |
B. | E-business |
C. | Data mining |
D. | None of the above |
Answer» B. E-business |
474. |
The types of Business to Business e-commerce are ................ |
A. | Direct selling and support to Business |
B. | Industry portals |
C. | Information sites about a industry |
D. | All the above |
Answer» D. All the above |
475. |
Which of the following is not the example of business to consumer (B to C) e-commerce? |
A. | Amazon.com |
B. | e-bay.com |
C. | dell.com |
D. | lastminute.com |
Answer» B. e-bay.com |
476. |
Which driver promote E-commerce |
A. | Digital Convergence |
B. | 24/7 availability |
C. | Profit margins |
D. | None of the above |
Answer» A. Digital Convergence |
477. |
Advantage of e-com is |
A. | Lower cost |
B. | Economy |
C. | Higher margins |
D. | All of the above |
Answer» A. Lower cost |
478. |
Which model of e commerce deals with virtual auction? |
A. | Aggregator Model |
B. | Info-mediary model |
C. | Community Model |
D. | Brokerage Model |
Answer» D. Brokerage Model |
479. |
When you look at e-commerce and e-business, which is the most realistic relationship between these two concepts? |
A. | E-commerce is broadly equivalent to e-business |
B. | E-commerce has some overlap with e-business |
C. | E-commerce is a subset of e-business |
D. | E-business is a subset of e-commerce |
Answer» C. E-commerce is a subset of e-business |
480. |
Social network sites such as Facebook and Twitter have become increasingly popular for sell-side e-commerce and would normally be considered to be in which category? |
A. | Portal, publisher or media sites |
B. | Brand-building sites |
C. | Transactional e-commerce sites |
D. | Services-orientated relationship-building websites |
Answer» A. Portal, publisher or media sites |
481. |
A summary of how a company will generate a profit identifying its core product, target customers, position in the online marketplace, and projections for revenue and costs is known as: |
A. | Value chain and marketplace positioning |
B. | Value proposition |
C. | Online business model |
D. | Revenue model and cost base |
Answer» C. Online business model |
482. |
While search engines index registered sites which users search by inputting key words, which type of intermediary updates its content typically through text but can include video or audio delivered through RSS feeds? |
A. | Directory |
B. | Publisher site |
C. | Blog |
D. | Access portal |
Answer» C. Blog |
483. |
What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and Google Chrome examples of? |
A. | Web servers |
B. | Web browsers |
C. | Web application servers |
D. | All of the above |
Answer» B. Web browsers |
484. |
A hardened firewall host on an Intranet is |
A. | a software which runs in any of the computers in the intranet |
B. | a software which runs on a special reserved computer on the intranet |
C. | a stripped-down computer connected to the intranet |
D. | a mainframe connected to the intranet to ensure security |
Answer» B. a software which runs on a special reserved computer on the intranet |
485. |
Advantages of B2C commerce are
|
A. | i and ii |
B. | ii and iii |
C. | i and iii |
D. | iii and iv |
Answer» C. i and iii |
486. |
Disadvantages of e-Commerce in India are
|
A. | i and ii |
B. | ii and iii |
C. | i, ii, iii |
D. | i, ii, iii, iv |
Answer» C. i, ii, iii |
487. |
Most common uses of the Internet and the Web include communicating, shopping, |
A. | searching, entertainment, and education |
B. | e-commerce, e-mail, and searching |
C. | e-mail, entertainment, and education |
D. | e -commerce, e-mail, and education |
Answer» A. searching, entertainment, and education |
488. |
The __________ is the multimedia interface to resources available on the Internet. |
A. | Web |
B. | ISP |
C. | browser |
D. | URL |
Answer» A. Web |
489. |
The multimedia interface to the resources available on the Net is called the |
A. | World Wide Web |
B. | Internet |
C. | GUI interface |
D. | Server |
Answer» A. World Wide Web |
490. |
Rules for exchanging data between computers are called |
A. | programs |
B. | procedures |
C. | protocols |
D. | hyperlinks |
Answer» C. protocols |
491. |
Moving from one Web site to another is called |
A. | jumping |
B. | moving |
C. | surfing |
D. | applying |
Answer» C. surfing |
492. |
____________ are networks that connect people within a company to each other and to the company network. |
A. | Internets |
B. | Intranets |
C. | Extranets |
D. | Components |
Answer» B. Intranets |
493. |
E-money is a ……………. medium for making payments |
A. | Digital |
B. | Electronic |
C. | Both (a) and (b) |
D. | None of the above |
Answer» A. Digital |
494. |
Acid testis a set of properties of money transfer that include |
A. | Atomicity and isolation |
B. | Consistency and durability |
C. | Both (a) and (b) |
D. | None of the above |
Answer» C. Both (a) and (b) |
495. |
In…………………., each transaction must be independent |
A. | Consistency |
B. | Isolation |
C. | Durability |
D. | None of the above |
Answer» B. Isolation |
496. |
In ICES test, C means |
A. | Consistency |
B. | Complexity |
C. | Conservation |
D. | None of the above |
Answer» A. Consistency |
497. |
Electronic payment is a financial transaction made …………. the use of paper documents |
A. | With |
B. | Without |
C. | Both (a) and (b) |
D. | None of the above |
Answer» B. Without |
498. |
Electronic payment media can be grouped into |
A. | Trusted third party type |
B. | Notational fund transfers related type |
C. | Authentication type |
D. | All the above |
Answer» D. All the above |
499. |
………………is a type of EPS |
A. | Credit card |
B. | Debit card |
C. | Smart card |
D. | All the above |
Answer» D. All the above |
500. |
Smart card is same as……. |
A. | Credit card |
B. | Debit card |
C. | Both (a) and (b) |
D. | None of the above |
Answer» C. Both (a) and (b) |
Done Reading?