540+ E-Commerce Solved MCQs

401.

Reverse logistics is required because

A. Goods are defective
B. Goods are unsold
C. The customers simply change
D. All of the above
Answer» D. All of the above
402.

The purpose of supply chain management is

A. provide customer
B. improve quality of a product
C. integrating supply and demand
D. increase production
Answer» C. integrating supply and demand
403.

Barriers to entry into an industry are likely to be high if:

A. Switching costs are low
B. Differentiation is low
C. Requirement for economies of
D. Access to distribution
Answer» C. Requirement for economies of
404.

A digital signature is required …..
i) to tie an electronic message to the sender’s identity
ii) for non repudiation of communication by a sender

A. i and ii
B. i, ii and iii
C. i, ii, iii and iv
D. ii, iii and iv
Answer» B. i, ii and iii
405.

Which of the following examines information passing through switches, hubs, or routers?

A. Key logger
B. Packet sniffer
C. Log analysis tools
D. Screen captures
Answer» B. Packet sniffer
406.

Which type of e-commerce focuses on consumers dealing with each other?

A. B2B
B. B2C
C. C2B
D. C2C
Answer» D. C2C
407.

Which products are people most likely to be more uncomfortable buying on the Internet?

A. Books
B. Furniture
C. Movies
D. All of the above
Answer» B. Furniture
408.

Which products are people most likely to be comfortable buying on the Internet?

A. Books
B. PCs
C. CDs
D. All of the above
Answer» D. All of the above
409.

Digital products are best suited for B2C e-commerce because they:

A. Are commodity like products
B. Can be mass-customised and personalised
C. Can be delivered at the time of purchase
D. All of the above
Answer» D. All of the above
410.

All of the following are techniques B2C e-commerce companies use to attract customers, except

A. Registering with search engines
B. Viral marketing
C. Online ads
D. Virtual marketing
Answer» D. Virtual marketing
411.

E-commerce involves

A. marketing
B. advertising
C. warehousing
D. all of the above
Answer» D. all of the above
412.

Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?

A. Affiliate programs
B. Click-through
C. Spam
D. All of the above
Answer» B. Click-through
413.

What is the percentage of customers who visit a Web site and actually buy something called?

A. Affiliate programs
B. Click-through
C. Spam
D. Conversion rate
Answer» D. Conversion rate
414.

What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail environment?

A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Answer» A. Direct materials
415.

What are materials that are necessary for running a modern corporation, but do not relate to the company’s primary business activities?

A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Answer» B. Indirect materials
416.

What is another name for materials which cannot be linked to a specific product or process?

A. Direct materials
B. Indirect materials
C. EDI
D. None of the above
Answer» B. Indirect materials
417.

What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?

A. Customer relationship management systems cards
B. E-government identity cards
C. FEDI cards
D. Smart cards
Answer» D. Smart cards
418.

Which form of e-commerce currently accounts for about 97% of all ecommerce revenues?

A. B2B
B. B2C
C. C2B
D. C2C
Answer» A. B2B
419.

Which of the following are advantages normally associated with B2B ecommerce?

A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above
Answer» D. all of the above
420.

If it is easy for competitors to enter the market, the threat of new entrants is considered:

A. High
B. Low
C. More
D. Less
Answer» A. High
421.

An industry is less attractive for suppliers when the rivalry among existing competitors is:

A. High
B. Low
C. More
D. Less
Answer» A. High
422.

Unique value auction mainly applies to?

A. New products
B. Second hand products
C. Engineering products
D. None of the above.
Answer» B. Second hand products
423.

Which of the following is a useful security mechanism when considering business strategy and IT?

A. encryption
B. decryption
C. firewall
D. all the above
Answer» D. all the above
424.

Which of the following statements accurately reflect the impact of technology?

A. Technology has caused buyer power to increase
B. Technology has lessened the entry barriers for many industries
C. Technology has increased the threat of substitute products and services
D. all of the above
Answer» D. all of the above
425.

Which type of products is lesser purchased using e-commerce?

A. automobiles
B. books
C. softwares
D. none
Answer» A. automobiles
426.

A business competing in a commodity like environment must focus on which of the following?

A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the above
Answer» A. Price
427.

Which of the following refers to creating products tailored to individual customers?

A. customisation
B. aggregation
C. Direct materials
D. Reverse auction
Answer» A. customisation
428.

Materials used in the normal operation of a business but not related to primary business operations are called what?

A. Supplies
B. Direct materials
C. Indirect materials
D. Daily stuff
Answer» C. Indirect materials
429.

What is the name given to an interactive business providing a centralised market where many buyers and suppliers can come together for ecommerce or commerce-related activities?

A. Direct marketplace
B. B2B
C. B2C
D. Electronic marketplace
Answer» D. Electronic marketplace
430.

Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO materials?

A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer» A. horizontal
431.

Which form of e-marketplace brings together buyers and sellers from the same industry?

A. horizontal
B. Vertical
C. Integrated
D. Inclined
Answer» B. Vertical
432.

Which, if any, of the following types of ads are people most willing to tolerate?

A. pop-under ad
B. pop-up ad
C. banner ad
D. none of the above
Answer» D. none of the above
433.

Which of the following is an Internet-based company that makes it easy for one person to pay another over the Internet?

A. electronic check
B. electronic bill presentment and payment
C. conversion rates
D. financial cybermediary
Answer» D. financial cybermediary
434.

Which of the following is a method of transferring money from one persons account to another?

A. electronic check
B. credit card
C. e-transfer
D. none of the above
Answer» A. electronic check
435.

An electronic check is one form of what?

A. e-commerce
B. online banking
C. e-cash
D. check
Answer» C. e-cash
436.

If you need to transfer money to another person via the internet, which of the following methods could you use?

A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Answer» D. all of the above
437.

Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?

A. financial cybermediary
B. electronic check
C. electronic bill presentment and payment
D. all of the above
Answer» C. electronic bill presentment and payment
438.

A combination of software and information designed to provide security and information for payment is called a?

A. digital wallet
B. pop up ad
C. shopping cart
D. encryption
Answer» A. digital wallet
439.

What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents?

A. internet commerce
B. e-commerce
C. transaction information transfer
D. electronic data interchange
Answer» D. electronic data interchange
440.

Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____n key.

A. encryption, decryption
B. private, public
C. encryption, public
D. public, private
Answer» D. public, private
441.

When a transaction is processed online, how can the merchant verify the customers identity?

A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange
Answer» B. use secure electronic transactions
442.

The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?

A. hacking
B. cracking
C. dumpster diving
D. spoofing
Answer» D. spoofing
443.

What is an internal organisational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?

A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer» B. Intranet
444.

What is an intranet that is restricted to an organisation and certain outsiders, such as customers and suppliers?

A. Client/server network
B. Intranet
C. Extranet
D. Thin client
Answer» C. Extranet
445.

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer» A. Disaster recovery plan
446.

What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer» C. Cold site
447.

What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer» B. Hot site
448.

What charts (1) the cost to your organisation of the unavailability of information and technology and (2) the cost to your organisation of recovering from a disaster over time?

A. Disaster recovery plan
B. Hot site
C. Cold site
D. Disaster recovery cost curve
Answer» D. Disaster recovery cost curve
449.

Which factor determines when the IT system will be available for knowledge workers to access?

A. Availability
B. Accessibility
C. Reliability
D. None of the above
Answer» A. Availability
450.

Which factor determines who has the right to access different types of IT systems and information?

A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer» B. Accessibility
451.

Which factor ensures the IT systems are functioning correctly and providing accurate information?

A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer» C. Reliability
452.

Which factor represents how well your system can adapt to increased demands?

A. Availability
B. Accessibility
C. Reliability
D. Scalability
Answer» D. Scalability
453.

Which factor represents a systems ability to change quickly?

A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer» A. Flexibility
454.

What is a set of conditions used to measure how well a product or system functions?

A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer» D. Benchmark
455.

What determines the future IT infrastructure requirements for new equipment and additional network capacity?

A. Flexibility
B. Performance
C. Capacity planning
D. Benchmark
Answer» C. Capacity planning
456.

What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?

A. Workflow
B. EIP
C. Workflow system
D. SLA
Answer» A. Workflow
457.

Which will not harm computer resources?

A. firewall
B. Virus
C. Trojan horse
D. None of the above
Answer» A. firewall
458.

Which of the following is the primary characteristic of an intranet?

A. People outside the organisation can access it
B. People inside the organisation cant access it
C. People outside the organisation cant access it
D. None of the above
Answer» C. People outside the organisation cant access it
459.

Which concept suggests that different applications and computer systems should be able to communicate with one another?

A. Integration
B. Web services
C. Scalability
D. Interoperability
Answer» D. Interoperability
460.

Which service encompasses all technologies used to transmit and process information on an across a network?

A. Interoperability
B. Scalability
C. Benchmarking
D. Web services
Answer» D. Web services
461.

Which process can prevent data from losing due to computer problems or human errors?

A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» A. backup
462.

Which process is used to reinstall data from a copy when the original data has been lost?

A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» B. recovery
463.

Who breaks into other peoples computer systems and steals and destroys information?

A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies
Answer» A. Hackers
464.

What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about?

A. Web log
B. Clickstream
C. Anonymous Web browsing service
D. None of the above
Answer» D. None of the above
465.

What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic?

A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
Answer» B. Worm
466.

What floods a Web site with so many requests for service that it slows down or crashes?

A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above
Answer» C. Denial-of-service attack
467.

What is the process of evaluating IT assets, their importance to the organisation, and their susceptibility to threats, to measure the risk exposure of these assets?

A. Risk management
B. Risk assessment
C. Security
D. None of the above
Answer» A. Risk management
468.

The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as:

A. Business to Business (B2B).
B. Consumer to Business (C2B).
C. Business to Consumer (B2C).
D. Consumer to Consumer (C2C).
Answer» B. Consumer to Business (C2B).
469.

By electronic commerce we mean:

A. Commerce of electronic goods
B. Commerce which depends on electronics
C. Commerce which is based on the use of internet
D. None of the above
Answer» D. None of the above
470.

E-commerce is

A. B2C
B. B2B
C. C2B
D. All the above
Answer» A. B2C
471.

Advantages of e-commerce are

A. Low cost
B. Economical
C. Productivity gains
D. All the above
Answer» B. Economical
472.

B2B2C is a model of

A. E-commerce
B. E-business
C. Data mining
D. None of the above
Answer» C. Data mining
473.

Mobile commerce is same as

A. E-commerce
B. E-business
C. Data mining
D. None of the above
Answer» B. E-business
474.

The types of Business to Business e-commerce are ................

A. Direct selling and support to Business
B. Industry portals
C. Information sites about a industry
D. All the above
Answer» D. All the above
475.

Which of the following is not the example of business to consumer (B to C) e-commerce?

A. Amazon.com
B. e-bay.com
C. dell.com
D. lastminute.com
Answer» B. e-bay.com
476.

Which driver promote E-commerce

A. Digital Convergence
B. 24/7 availability
C. Profit margins
D. None of the above
Answer» A. Digital Convergence
477.

Advantage of e-com is

A. Lower cost
B. Economy
C. Higher margins
D. All of the above
Answer» A. Lower cost
478.

Which model of e commerce deals with virtual auction?

A. Aggregator Model
B. Info-mediary model
C. Community Model
D. Brokerage Model
Answer» D. Brokerage Model
479.

When you look at e-commerce and e-business, which is the most realistic relationship between these two concepts?

A. E-commerce is broadly equivalent to e-business
B. E-commerce has some overlap with e-business
C. E-commerce is a subset of e-business
D. E-business is a subset of e-commerce
Answer» C. E-commerce is a subset of e-business
480.

Social network sites such as Facebook and Twitter have become increasingly popular for sell-side e-commerce and would normally be considered to be in which category?

A. Portal, publisher or media sites
B. Brand-building sites
C. Transactional e-commerce sites
D. Services-orientated relationship-building websites
Answer» A. Portal, publisher or media sites
481.

A summary of how a company will generate a profit identifying its core product, target customers, position in the online marketplace, and projections for revenue and costs is known as:

A. Value chain and marketplace positioning
B. Value proposition
C. Online business model
D. Revenue model and cost base
Answer» C. Online business model
482.

While search engines index registered sites which users search by inputting key words, which type of intermediary updates its content typically through text but can include video or audio delivered through RSS feeds?

A. Directory
B. Publisher site
C. Blog
D. Access portal
Answer» C. Blog
483.

What are Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and Google Chrome examples of?

A. Web servers
B. Web browsers
C. Web application servers
D. All of the above
Answer» B. Web browsers
484.

A hardened firewall host on an Intranet is

A. a software which runs in any of the computers in the intranet
B. a software which runs on a special reserved computer on the intranet
C. a stripped-down computer connected to the intranet
D. a mainframe connected to the intranet to ensure security
Answer» B. a software which runs on a special reserved computer on the intranet
485.

Advantages of B2C commerce are
(i) Business gets a wide reach to customers
(ii) Payment for services easy
(iii) Shop can be open 24 hours a day seven days a week
(iv) Privacy of transaction always maintained

A. i and ii
B. ii and iii
C. i and iii
D. iii and iv
Answer» C. i and iii
486.

Disadvantages of e-Commerce in India are
(i) internet access is not universally available
(ii) credit card payment security is not yet guaranteed
(iii) transactions are de-personalized and human contact is missing
(iv) cyberlaws are not in place

A. i and ii
B. ii and iii
C. i, ii, iii
D. i, ii, iii, iv
Answer» C. i, ii, iii
487.

Most common uses of the Internet and the Web include communicating, shopping,

A. searching, entertainment, and education
B. e-commerce, e-mail, and searching
C. e-mail, entertainment, and education
D. e -commerce, e-mail, and education
Answer» A. searching, entertainment, and education
488.

The __________ is the multimedia interface to resources available on the Internet.

A. Web
B. ISP
C. browser
D. URL
Answer» A. Web
489.

The multimedia interface to the resources available on the Net is called the

A. World Wide Web
B. Internet
C. GUI interface
D. Server
Answer» A. World Wide Web
490.

Rules for exchanging data between computers are called

A. programs
B. procedures
C. protocols
D. hyperlinks
Answer» C. protocols
491.

Moving from one Web site to another is called

A. jumping
B. moving
C. surfing
D. applying
Answer» C. surfing
492.

____________ are networks that connect people within a company to each other and to the company network.

A. Internets
B. Intranets
C. Extranets
D. Components
Answer» B. Intranets
493.

E-money is a ……………. medium for making payments

A. Digital
B. Electronic
C. Both (a) and (b)
D. None of the above
Answer» A. Digital
494.

Acid testis a set of properties of money transfer that include

A. Atomicity and isolation
B. Consistency and durability
C. Both (a) and (b)
D. None of the above
Answer» C. Both (a) and (b)
495.

In…………………., each transaction must be independent

A. Consistency
B. Isolation
C. Durability
D. None of the above
Answer» B. Isolation
496.

In ICES test, C means

A. Consistency
B. Complexity
C. Conservation
D. None of the above
Answer» A. Consistency
497.

Electronic payment is a financial transaction made …………. the use of paper documents

A. With
B. Without
C. Both (a) and (b)
D. None of the above
Answer» B. Without
498.

Electronic payment media can be grouped into

A. Trusted third party type
B. Notational fund transfers related type
C. Authentication type
D. All the above
Answer» D. All the above
499.

………………is a type of EPS

A. Credit card
B. Debit card
C. Smart card
D. All the above
Answer» D. All the above
500.

Smart card is same as…….

A. Credit card
B. Debit card
C. Both (a) and (b)
D. None of the above
Answer» C. Both (a) and (b)
Tags
Question and answers in E-Commerce, E-Commerce multiple choice questions and answers, E-Commerce Important MCQs, Solved MCQs for E-Commerce, E-Commerce MCQs with answers PDF download