Those Questions For You On E-Business See It Learn It with Answers
1.Which of the
subsequent describes e-commerce?
a. Doing business electronically
b. Doing business
c. Sale of products
d. All of the above options
Answer: A
2.Which of the subsequent is a component of the four main styles
of e-commerce?
a. B2B
b. B2C
c. C2B
d. All of the higher than
Answer: D
3.Which section do eBay, Amazon.com belong?
a. B2Bs
b. B2Cs
c. C2Bs
d. C2Cs
Answer: B
4.Which type of e-commerce
focuses on shoppers addressing every other?
a. B2B
b. B2C
c. C2B
d. C2C
Answer: D
5.Which section is
eBay AN example?
a. B2B
b. C2B
c. C2C
d. None of the higher than
Answer: D
6.Which type deals with the auction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer: D
7.In which web site international simple get is
facilitated?
a. Ebay.com
b. Amazon.com
c. Yepme.com
d. None of those
Answer: A
8.The best merchandise to sell in B2C e-commerce are:
a. little merchandise
b. Digital merchandise
c. Specialty merchandise
d. contemporary merchandise
Answer: B
9.Which merchandise square measure folks possibly to
be additional uncomfortable shopping for on the Internet?
a. Books
b. Furniture
c. Movies
d. All of the higher than
Answer: B
10. that merchandise square
measure folks possibly to be comfy shopping for on
the Internet?
a. Books
b. PCs
c. CDs
d. All of the higher than
Answer: D
11. Digital merchandise square measure best suited to B2C
e-commerce as a result of they:
a. square measure commodities like merchandise
b. may be mass-customized and personalised
c. may be delivered at the time of purchased
d. All of the higher than
Answer: D
12. the answer for all business wants is
a. EDI
b. ERP
c. SCM
d. None of the higher than
Answer: B
13. All of the subsequent square measure techniques B2C
e-commerce firms use to draw in customers,
except:
a. Registering with search engines
b. infectious agent promoting
c. Online ads
d. Virtual promoting
Answer: D
14. that could be a perform of E-commerce
a. marketing
b. advertising
c. deposit
d. all of the higher than
Answer: D
15. that isn't a perform of E-commerce
a. marketing
b. advertising
c. deposit
d. none of the higher than
Answer: C
16. that term represents a count of the quantity of
individuals UN agency visit one website, click on an advert,
and
are taken to the location of the advertiser?
a. Affiliate programs
b. Click-through
c. Spam
d. All of the higher than
Answer: B
17. what's the proportion of shoppers UN agency visit an
internet website and truly get one thing called?
a. Affiliate programs
b. Click-through
c. Spam
d. Conversion rate
Answer: D
18. What square measure materials utilized in production during
a producing company or square measure placed on the shelf
for sale during a retail environment?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the higher than
Answer: A
19. What square measure materials that square measure necessary
for running a contemporary corporation, however don't relate
to
the company's primary business activities?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the higher than
Answer: B
20. What square measure ballpoint pen pens purchased by a consumer
goods company?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the higher than
Answer: B
21. what's another name for?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the higher than
Answer: B
22. what's the method during which a vendee posts
its interest in shopping for an explicit amount of things,
and
sellers contend for the business by submitting in turn lower
bids till there's just one
seller left?
a. B2B marketplace
b. Intranet
c. Reverse auction
d. Internet
Answer: C
23. What square measure plastic cards the dimensions of
a mastercard that contains AN embedded chip on that digital
information may be stored?
a. client relationship management systems cards
b. E-government identity cards
c. FEDI cards
d. good cards
Answer: D
24. most people square measure conversant in that variety
of e-commerce?
a. B2B
b. B2C
c. C2B
d. C2C
Answer: B
25. that variety of e-commerce presently accounts
for regarding ninety seven of all e-commerce revenues?
a. B2B
b. B2C
c. C2B
d. C2C
Answer: A
26. that of the subsequent square measure benefits ordinarily related
to B2B e-commerce?
a. Shorter cycle times
b. Reduction in prices
c. Reaches wider audiences
d. all of the higher than
Answer: D
27. If the threat of substitute merchandise or services is low it's a(n):
a. Disadvantage to the provider
b. benefits to the client
c. a bonus to the provider
d. None of the higher than
Answer: C
28. The threat of recent entrants is high once it is:
a. onerous for patrons to enter the market
b. onerous for competitors to enter the market
c. simple for competitors to enter the market
d. simple for patrons to enter the market
Answer: C
29. If it's simple for competitors to enter the market, the
threat of recent entrants is considered:
a. High
b. Low
c. More
d. Less
Answer: A
30. AN business is a smaller amount enticing for
suppliers once the competition among existing competitors
is:
a. High
b. Low
c. More
d. Less
Answer: A
31. distinctive price auction principally applies to?
a. New merchandise
b. Second-hand merchandise
c. Engineering merchandise
d. None of the higher than
i. Answer: B
32. Paisapay is expedited in
a. eBay.co.in
b. amazon.com
c. flipkart.com
d. none of the higher than
Answer: A
33. that of the subsequent could be a helpful security
mechanism once considering business strategy and
IT?
a. encryption
b. decryption
c. firewall
d. all the higher than
Answer: D
34. that of the subsequent isn't associated with security
mechanism
a. encryption
b. decryption
c. e-cash
d. all the higher than
Answer: C
35. A product or service that customers have come back to expect
from AN business, that should be
offered by new entrants if they need to contend and
survive, is thought as a(n)?
a. change prices
b. Loyalty programs
c. Entry barriers
d. Affiliate programs
Answer: C
36. that of the subsequent statements accurately mirror the
impact of technology?
a. Technology has caused vendee power to extend
b. Technology has lessened the entry barriers for several industries
c. Technology has increased the threat of substitute merchandise and
services
d. all of the higher than
Answer: D
37. A business can not be all things to all or any folks.
Instead, a business must:
a. establish target customers
b. establish the worth of products/services as perceived by
customers
c. all of the higher than
d. None of the higher than
Answer: C
38. however the transactions occur in e-commerce?
a. mistreatment e-medias
b. mistreatment computers solely
c. mistreatment mobile phones solely
d. None of the higher than
Answer: A
39. which kind of merchandise is lesser purchased mistreatment e-commerce?
a. cars
b. books
c. software
d. none
Answer: A
40. A business competitory {in a|during a|in AN exceedingly|in
a very} artefact like an atmosphere should specialize
in that of the following?
a. Price
b. Ease/speed of delivery
c. easy ordering
d. all of the higher than
Answer: D
41. that of the subsequent refers to making merchandise tailored
to individual customers?
a. customization
b. aggregation
c. Direct materials
d. Reverse auction
Answer: A
42. Materials utilized in the traditional operation of a
business however not associated with the first business
operations square measure referred to as what?
a. Supplies
b. Direct materials
c. Indirect materials
d. Daily stuff
Answer: C
43. Amazon.com is well-known that e-commerce promoting technique?
a. Banner ads
b. Pop-up ads
c. Affiliate programs
d. infectious agent promoting
Answer: C
44. what's the name given to AN interactive business
providing a centralized market wherever several
buyers and suppliers will move for e-commerce or
commerce-related activities?
a. Direct marketplace
b. B2B
c. B2C
d. Electronic marketplace
Answer: D
45. that variety of e-marketplace brings along consumers and
sellers from multiple industries, often
for MRO materials?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer: A
46. that variety of e-marketplace brings along consumers and
sellers from identical industry?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer: B
47. which kind of ad seems on an internet page?
a. pop-under ad
b. Pop-up ad
c. Banner ad
d. Discount ad
Answer: C
48. What form of ad seems on prime of an
internet page?
a. pop-under ad
b. pop-up ad
c. banner ad
d. discount ad
Answer: B
49. What form of ad seems below an internet page?
a. pop-under ad
b. pop-up ad
c. banner ad
d. discount ad
Answer: A
50. Which, if any, of the subsequent styles of ads square
measure folks most willing to tolerate?
a. pop-under ad
b. pop-up ad
c. banner ad
d. none of the higher than
Answer: D
51. that of the
subsequent is associate Internet-based company that
produces it simple for one person to pay
another over the Internet?
a. electronic check
b. electronic bill presentment and payment
c. conversion rates
d. monetary go-between
Answer: D
52. that of the subsequent could be a methodology of
transferring cash from one person's account to
another?
a. electronic check
b. mastercard
c. e-transfer
d. none of the higher than
Answer: A
53. associate electronic check is one sort of what?
a. e-commerce
b. on-line banking
c. e-cash
d. check
54. If you would like to transfer cash to a different person
via the net, that of the subsequent
methods might you use?
a. monetary go-between
b. electronic check
c. electronic bill presentment and payment
d. all of the higher than
Answer: D
55. that of the subsequent permits the transmission of a
bill, along side payment of that bill, to be
conducted over the Internet?
a. monetary go-between
b. electronic check
c. electronic bill presentment and payment
d. all of the higher than
Answer: C
56. a mix of package and knowledge designed to
supply security and knowledge for
payment is termed a what?
a. digital billfold
b. pop up ad
c. pushcart
d. encryption
Answer: A
57. what's the name for direct computer-to-computer transfer of dealing info
contained in normal business documents?
a. net commerce
b. e-commerce
c. dealing info transfer
d. electronic knowledge interchange
Answer: D
58. that of the subsequent is employed in B2B to purchase purchases?
a. e-commerce
b. monetary electronic knowledge interchange
c. electronic knowledge changed
d. electronic checks
Answer: B
59. Public key coding uses multiple keys. One key's accustomed cipher knowledge, whereas another is
employed
to rewrite knowledge. The key accustomed cipher knowledge is
termed the podium key, whereas the key accustomed
decrypt knowledge is termed the podium key.
a. encryption, decryption
b. private, public
c. encryption, public
d. public, private
Answer: D
60. Secure Sockets Layers do that of the following?
a. creates a secure, personal affiliation to an online server
b. encrypts info
c. sends info over the net
d. all of the higher than
Answer: D
61. once the dealing is processed on-line, however will the businessperson verify
the customer's identity?
a. use secure sockets layers
b. use secure electronic transactions
c. use electronic knowledge interchange
d. use monetary electronic knowledge interchange
Answer: B
62. The follow of shaping a {return
address|address|destination|name associated address} on an e-mail so the
recipient is fooled into
revealing personal info is termed?
a. hacking
b. cracking
c. container diving
d. spoofing
Answer: D
63. what's a model of a planned product, service, or
system?
a. Prototyping
b. Prototype
c. Proof-of-concept paradigm
d. merchandising paradigm
Answer: B
64. what's an enclosed structure net that's guarded
against outside access by a special
security feature known as a firewall (which is package,
hardware, or a mix of the
two)?
a. Client/server network
b. Intranet
c. Extranet
d. skinny shopper
Answer: B
65. what's associate computer network that's restricted
to a company and bound outsiders, like customers
and suppliers?
a. Client/server network
b. Intranet
c. Extranet
d. skinny shopper
Answer: C
66. what's the elaborated method for convalescent info or associate IT
system within the event of a
a harmful disaster like a hearth or flood?
a. Disaster recovery set up
b. Hot site
c. Cold site
d. Disaster recovery value curve
Answer: A
67. what's a separate facility that doesn't have any laptop instrumentality however could
be a place wherever the
knowledge staff will move once the disaster?
a. Disaster recovery set up
b. Hot site
c. Cold site
d. Disaster recovery value curve
Answer: C
68. what's a separate and totally equipped facility wherever the
corporate will move now once
the disaster and resume business?
a. Disaster recovery set up
b. Hot site
c. Cold site
d. Disaster recovery value curve
Answer: B
69. What charts (1) the value to your organization of the inaccessibility of
knowledge and technology
and (2) the value to your organization of convalescent from
a disaster over time?
a. Disaster recovery set up
b. Hot site
c. Cold site
d. Disaster recovery value curve
Answer: D
70. that issue determines once your IT system are out
there for information staff to
access?
a. handiness
b. Accessibility
c. dependability
d. None of the higher than
Answer: A
71. that issue determines WHO has the proper to
access differing types of IT systems and
information?
a. handiness
b. Accessibility
c. dependability
d. quantifiability
Answer: B
72. that issue ensures your IT systems square measure functioning properly and
providing correct
information?
a. handiness
b. Accessibility
c. dependability
d. quantifiability
Answer: C
73. that issue represents however well your
system will adapt to inflated demands?
a. handiness
b. Accessibility
c. dependability
d. quantifiability
Answer: D
74. that issue represents a system's ability to vary quickly?
a. Flexibility
b. Performance
c. capability designing
d. Benchmark
Answer: A
75. what's a collection of conditions accustomed live however well
a product or system functions?
a. Flexibility
b. Performance
c. capability designing
d. Benchmark
Answer: D
76. What determines the longer term IT infrastructure needs for
brand spanking new instrumentality and extra
network capacity?
a. Flexibility
b. Performance
c. capability designing
d. Benchmark
Answer: C
77. What automates business processes?
a. Workflow
b. ASP
c. progress system
d. EIP
Answer: C
78. What defines all of the steps or business rules, from setting out to finish, needed for
a method to
run correctly?
a. Workflow
b. EIP
c. progress system
d. SLA
Answer: A
79. What sends work assignments through associate e-mail system?
a. Database-based enterprise info portal
b. Messaging-based enterprise info portal
c. Database-based progress system
d. Messaging-based progress system
Answer: D
80. which can not hurt laptop resources
a. firewall
b. Virus
c. Trojan horsed. None of the higher than
Answer: A
81. that isn't a operate of ERP?
a. repositing
b. sales
c. scheduling
d. None of the higher than
Answer: D
82. that is that the operate of ERP?
a. repositing
b. sales
c. scheduling
d. all of the higher than
Answer: D
83. that of the subsequent is that the primary
characteristic of associate intranet?
a. individuals outside the organization will access it
b. individuals within the organization cannot access
it
c. individuals outside the organization cannot access it
d. None of the higher than
Answer: C
84. that thought suggests that completely different applications
and laptop systems ought to be ready to
communicate with one another?
a. Integration
b. net services
c. quantifiability
d. ability
Answer: D
85. that service encompasses all technologies accustomed transmit
and method the knowledge across a network?
a. ability
b. quantifiability
c. Benchmarking
d. net services
Answer: D
86. that method will forestall knowledge from
loss thanks to laptop issues or human errors?
a. backup
b. recovery
c. benchmarking
d. knowledge cleansing
Answer: A
87. that method is employed to put in knowledge from a
replica once the initial knowledge has been lost?
a. backup
b. recovery
c. benchmarking
d. knowledge cleansing
Answer: B
88. What describes a method of unceasingly measurement results
and comparison those results to
optimal performance so actual performance could also be improved?
a. Performance
b. capability designing
c. Benchmarking
d. knowledge cleansing
Answer: C
89. WHO protects the system from external threats?
a. firewall
b. EDI
c. ERP
d. Script kiddies
Answer: A
90. WHO breaks into different people's laptop systems
and steals and destroys information?
a. Hackers
b. software
c. Hacktivists
d. Script kiddies
Answer: a
91. what's package that comes hidden in free downloadable package and
tracks your on-line
movements, mines the knowledge hold on on your laptop, or
uses your computer's CPU and
storage for a few of the tasks you recognize nothing about?
a. Weblog
b. Clickstream
c. Anonymous net browsing service
d. None of the higher than
Answer: D
92. ERP stands for
a. Enterprise resolution designing
b. Enterprise reverse designing
c. Enterprise resource designing
d. None of the higher than
Answer: C
93. that isn't a part of ERP?
a. heritage systems
b. Bolt-on applications
c. Operational databases
d. Cybersoft
Answer: D
94. that isn't a operate of ERP?
a. Human resource management
b. financial
c. repositing
d. None of the higher than
Answer: D
95. what's a sort of virus that spreads itself, not simply from
file to file, however from laptop to
computer via e-mail and different net traffic?
a. trojan horse
b. Worm
c. Denial-of-service attack
d. None of the higher than
Answer: B
96. What floods an online web site with such a big amount
of requests for service that it slows down or crashes?
a. trojan horse
b. Worm
c. Denial-of-service attack
d. None of the higher than
Answer: C
97. What harnesses far-flung computers along by approach of the
net or a virtual personal network
to share CPU power, databases, and information storage?
a. trojan horse
b. Worm
c. Denial-of-service attack
d. None of the higher than
Answer: D
98. What consists of the identification of risks or threats, the implementation
of security measures,
and the observance of these measures for effectiveness?
a. Risk management
b. Risk assessment
c. Security
d. None of the higher than
Answer: A
99. what's the method of evaluating IT assets, their importance
to the organization, and their
susceptibility to threats, to live the chance exposure of
those assets?
a. Risk management
b. Risk assessment
c. Security
d. None of the higher than
Answer: B
100. what's the method of creating a replica of the
knowledge hold on on a computer?
a. Backup
b. Anti-virus
c. Firewall
d. Biometrics
Answer: A
0 Comments