Which products are people most likely to be more uncomfortable buying on the Internet? Furniture Books Movies All The best products to sell in B2C e-commerce are: Small products Digital products Specialty products
Fresh products
In which website Global Easy Buy is facilitated? Ebay.com Amazon.com Yepme.com
None of these
Which type deals with auction? B2B B2C
C2B
C2C
Which segment is eBay an example? B2B C2B
C2C
None
Which type of e-commerce focuses on consumers dealing with each other? C2C B2B B2C C2B Which products are people most likely to be comfortable buying on the Internet? All Books PCs CDs The solution for all business needs is EDI ERP
SCM
None
Which is a function of E-commerce marketing advertising
warehousing
ALL
Which is not a function of E-commerce marketing advertising
warehousing
NONE
What is the percentage of customers who visit a Web site and actually buy something called Click-through Spam Conversion rate ? Affiliate programs Which segment do eBay, Amazon.com belong? B2Cs B2Bs
C2Bs
C2Cs
Which of the following is part of the four main types for e-commerce? B2C B2B C2B All Which of the following describes e-commerce? Doing business electronically
Doing business
Sale of goods
All
Which of the following examines information passing through switches, hubs, or routers? Packet sniffer Key logger Log analysis Screen captures tools What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? Reverse auction B2B marketplace Intranet Internet plastic card having the size of a credit card and containing an embedded chip on which digital information is stored Smart cards CRM systems cards E-government ID cards FEDI cards
Materials used in production in a manufacturing company or are placed on the shelf for sale in a retail Direct environment materials Indirect materials EDI None What are materials that are necessary for running a modern corporation, but do not relate to the company’s primary business activities?
Direct materials
Indirect materials
EDI
None
What are ballpoint pens purchased by a clothing company ? Direct materials
Indirect materials
EDI
None
Most individuals are familiar with which form of e-commerce ? B2B
B2C
C2B
C2C
Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser?
Affiliate programs
Click-through
Spam
All
All of the following are techniques B2C e-commerce companies use to attract customers , except: Registering with search Viral marketing Online ads Virtual marketing engines
Digital products are best suited for B2C e-commerce because they: Are commodity like products
mass-customized & personalized
delivered at the time of purchase
All
Which form of e-commerce currently accounts for about 97% of all e-commerce revenues ? B2C
B2B
C2B
C2C
Which of the following are advantages normally associated with B2B e-commerce? Reaches wider Reduction in costs Shorter cycle All audiences time An industry is less attractive for suppliers when the rivalry among existing competitors Low More Less is:High If it is easy for competitors to enter the market, the threat of new entrants is considered: High Low More Less The threat of new entrants is high when it is: Hard for customers to enter the market
Hard for competitors to enter the market
Easy for competitors to enter the market
Easy for customers to enter the market
If the threat of substitute products or services is low it is a(n): Disadvantage to supplier
Advantage to the buyer
Advantage to supplier
None
Which of the following is a method of transferring money from one persons account to electronic check credit card e-transfer none another? An electronic check is one form of what? e-commerce online banking
e-cash
check
If you need to transfer money to another person via the internet, which of the following methods could you use? ALL financial E-bill presentment ELECTRONIC CHQUE
cybermediary PAY Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? financial E-bill presentment ELECTRONIC CHQUE ALL PAY cybermediary A combination of software & information designed to provide security and information for digital wallet pop up ad shopping cart encryption payment is called Name for direct computer-to-computer transfer of transaction information contained in EDI internet e-commerce trans info business doccommerce transfer What sends work assignments through an e-mail system ? Database-based enterprise information portal
Which will not harm
Messaging-based enterprise info portal
computer resources
Database-based workflow system
Messaging-based workflow system
firewall
Virus
Which is not a function of ERP? Warehousing sales
Trojan horse
NONE
scheduling
NONE
Which factor determines when your IT system will be available for knowledge workers to Availability Accessibility Reliability NONE access? Which factor determines who has the right to access different types of IT systems and information? Availability Accessibility Reliability Scalability Which factor ensures your IT systems are functioning correctly and providing accurate information? Reliability Availability Accessibility Scalability Which factor represents how well your system can adapt to increased demands? Availability
Accessibility
Reliability
Scalability
Which factor represents a systems ability to change quickly? Flexibility
Performance
Capacity planning
Benchmark
What is a set of conditions used to measure how well a product or system functions? Flexibility
Performance
Capacity planning
Benchmark
What determines the future IT infrastructure requirements for new equipment and additional network capacity? Capacity planning Flexibility Performance Benchmark What automates business processes? Workflow
ASP
Workflow system
EIP
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? Workflow
EIP
Workflow system
SLA
Which concept suggests that different apps and computer systems should be able to communicate with one another? Interoperability Integration Web services Scalability Which service encompasses all technologies used to transmit and process information on an across a network? Interoperability Scalability Benchmarking Web services
Which process can prevent data from lose due to computer problems or human errors? backup
recovery
benchmarking
data cleansing
Which process is used to reinstall data from a copy when the original data has been lost? recovery backup benchmarking data cleansing Who protects system from external threats? firewall
EDI
ERP
Script kiddies
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?
Performance
Capacity planning
Benchmarking
Data cleansing
Which of the following statements accurately reflect the impact of technology? caused buyer power to increase
lessened entry increased threat of ALL barriers for many substitute P & S What is a separate facility industries that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? Disaster recovery cost curve
Disaster recovery Hot site plan Which of the following is the primary characteristic of an intranet? People outside the People inside the People outside the organization can’t organization can organization can’t access it access it access it Separate & fully equipped facility where the company move immediately Disasterbusiness recovery cost Hot site Cold site & resume curve
Which of the following is used in B2B to pay for purchases ? EDI E-commerce Financial EDI
Cold site
NONE after the disaster Disaster recovery plan Electronic checks
Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to decrypt data is called the _____ key encryption, private, public encryption, public, private decryption public Secure Sockets Layers does which of the following? creates a secure sends information encrypts ALL private connection to over the internet information a web server When a transaction is processed online, how can the merchant verify the customers
identity? use secure sockets layers
use secure E-transactions
use EDI
use financial EDI
The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information spoofing hacking cracking is termed? dumpster diving What is a model of a proposed product, service, or system? Prototyping
Proof-of-concept Selling prototype prototype What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a Client/server Extranet Thin client combination of the two) ? Intranet network What is an intranet, restricted to an organization & certain outsiders, such as customers Extranet Client/server Intranet Thin client & suppliers ? network What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? Disaster recovery Disaster recovery plan Hot site Cold site cost curve Prototype
What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? Disaster recovery Disaster recovery Hot site Cold site cost curve plan Which is a function of ERP ? Warehousing sales
scheduling
ALL
Who breaks into other peoples computer systems and steals and destroys information? Hackers softwares Hacktivists Script kiddies What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computers CPU and storage for some task you know nothing about? Anonymous Web Web log Clickstream NONE browsing service ERP stands for Enterprise resolution planning
Enterprise reverse planning
Which is not a component of ERP? Legacy systems Bolt on applications Which is not a function of ERP? Human resource Financial management
Enterprise resource planning
NONE
Operational database
Cybersoft
Warehousing
NONE
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic? Denial-of-service Computer virus Worm NONE attack 1 GEOP BYTE = _ _ _ _ BRONTO BYTES , 1 BRONTO BYTE = _ _ _ _ YOTTA BYTES 1 YOTTA BYTE = _ _ _ _ ZETTA BYTES , 1 ZETTA BYTE = _ _ _ _ EXA BYTES 1 EXA BYTE = _ _ _ _ PETA BYTES , 1 PETA BYTE = _ _ _ _ TERRA BYTES 512
1000
256
1024
What floods a Web site with so many requests for service that it slows down or crashes? Denial-of-service attack Computer virus Worm NONE
What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? NONE Denial-of-service Worm Computer virus attack A business cannot be all things to all people. Instead, a business must: Identify the value of None ALL products/services as perceived by Which of the following is ancustomers Internet-based company that makes it easy for one person to pay another over the Internet? electronic bill electronic check conversion rates financial cybermediary presentment and paymenttypes of ads are people most willing to tolerate ? Which, if any, of the following
Identify target customers
pop-under ad
pop-up ad
banner ad
NONE
What type of ad appears under a web page ? pop-under ad pop-up ad
banner ad
discount ad
What type of ad appears on top of a web page ? pop-up ad pop-under ad
banner ad
discount ad
Which type of add appears on a web page ? pop-under ad Pop-up ad
Banner ad
Discount ad
Which form of e-marketplace brings together buyers and sellers from the same industry ? Vertical Horizontal Integrated Inclined Form of e-marketplace brings together buyers and sellers from multiple industries, often Vertical Integrated Inclined forHorizontal MRO materials What is the name given to an interactive business providing a centralized market where many buyers and Electronic ? marketplace Direct marketplace B2B B2C suppliers can come together for e-commerce or commerce-related activities Amazon.com is well-known for which e-commerce marketing technique ? Affiliate programs Banner ads Pop-up ads
Viral marketing
Materials used in the normal operation of a business but not related to primary business operations are called Indirect materials Supplies Direct materials Daily stuff
Which of the following refers to creating products tailored to individual customers ? customization aggregation Direct materials Reverse auction A business competing in a commodity like environment must focus on which of the following ALL Ease speed of Ease of ordering ? Price delivery Which type of products is lesser purchased using e-commerce ? Automobiles Books Softwares None How the transactions occur in e-commerce ? Using mobile phones Using e-medias Using computers None only only A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? Entry barriers Switching costs Loyalty programs Affiliate programs Which of the following is not related to security mechanism e-cash encryption decryption
ALL
Which of the following is a useful security mechanism when considering business strategy encryption decryption firewall all and IT ? Paisapay is facilitated in eBay.co.in amazon.com
flipkart.com
None
Engineering products
None
Unique value auction is mainly applies to ? New products
Second hand products
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness ? Risk management Risk assessment Security None What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets ? Risk assessment Risk management Security None